Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_12df79fd-5566-4227-a39f-b2e696a09ba8.json
(copy)
|
JSON data
|
dropped
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_12df79fd-5566-4227-a39f-b2e696a09ba8.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\0ed21c8e-b4c0-4445-8bf0-9d4606b046bd.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\52892a56-6d10-427a-8799-e10dfb633a9d.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\591721c1-e61c-4d85-9ddb-6ededb71b99c.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\73477df1-8bb9-444b-9253-757dd6447d3d.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\7f43e22f-98b3-4f78-80b3-24ba525515bd.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\9bf01528-f4e1-4e4b-813b-f67d74280c15.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\773f0ae2-6495-488d-8010-d9bd987607c8.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\blocklist (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4E270-1BF4.pma
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4E271-1BB4.pma
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4E283-178C.pma
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4E28C-2300.pma
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\CrashpadMetrics-active.pma
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\0198b17d-f3f0-4bac-a341-1103e521fdaf.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\0bfc34f2-d00e-4a03-b40c-18460ad553e7.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\3381edbd-21b4-4e38-a745-73007fa471b2.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\58a708aa-9998-47e6-a036-26cf3e07ca18.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\7cd76ade-8065-4879-86e6-1902af2a3e0b.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\7e5dd8ce-7881-442e-8fa6-97c2d705422f.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\8e889217-ffb9-44c3-a147-b51ca9e66152.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\93f98136-5cd9-4d23-a169-09b4cf94b0d7.tmp
|
ASCII text, with very long lines (1597), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\9af04b97-2995-4ac5-880c-6504fff53eeb.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000003.log
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AssistanceHome\AssistanceHomeSQLite
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 3, cookie 0x1, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DIPS
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeEDrop\EdgeEDropSQLite.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 14, database pages 8, cookie 0xe, schema 4, UTF-8,
version-valid-for 14
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeHubAppUsage\EdgeHubAppUsageSQLite.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x5, schema 4, UTF-8,
version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\domains_config.json
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\ExtensionActivityComp
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 1, cookie 0x1, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\ExtensionActivityEdge
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 8, cookie 0x8, schema 4, UTF-8,
version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\_metadata\computed_hashes.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Favicons
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 10, cookie
0x8, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, 1st free page 10, free
pages 4, cookie 0x45, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History-journal
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps (copy)
|
ASCII text, with very long lines (1597), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps Icons
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 12, cookie 0x3, schema 4, UTF-8,
version-valid-for 6
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG.old
(copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 28, cookie
0x1d, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network Action Predictor
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 11, cookie 0x6, schema 4, UTF-8,
version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\10bb6def-3343-461d-9e4c-f9dc59c0b92a.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\34945187-6f73-4848-ab48-8014470bfbe1.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\6afa0521-d822-4326-9979-8b381a72080b.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\8caf8765-ef4c-4033-a257-bba869d3eee8.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\9e47564c-2da5-4119-bcf0-70b24c5a5244.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 9, database pages 5, cookie 0x5, schema 4, UTF-8,
version-valid-for 9
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2c2aa.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF3ad19.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Reporting and NEL
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 9, cookie 0x4, schema 4, UTF-8,
version-valid-for 6
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF2a128.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF2b4fe.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF2c2aa.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF3ce1f.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Trust Tokens
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8,
version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\a9c628a4-21ce-41d6-8f75-f6e50ba55c85.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\dd2e8947-4e92-464f-8b7c-0b1214b414bc.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\dee4f9f4-7be4-49d5-a547-a9799686e89d.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Nurturing\campaign_history
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 5, cookie 0x2, schema 4, UTF-8,
version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF2df2b.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF31677.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF341ad.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF39bc4.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PreferredApps
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF2dbfe.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF30f72.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Session_13369701236535882
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Shortcuts
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG.old
(copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\3191fc58-6279-48b1-96e5-099388dc6d29.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\4308a775-6142-4be1-ba05-372726dbd711.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\6e82dbf2-dbb4-4468-a81e-59a4e65aa48c.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Network
Persistent State
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Network
Persistent State~RF3b835.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Reporting
and NEL
|
SQLite 3.x database, last written using SQLite version 3035005, file counter 4, database pages 9, cookie 0x4, schema 4, UTF-8,
version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT
Auditing Pending Reports (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT
Auditing Pending Reports~RF2b4fe.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Sdch
Dictionaries (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Trust
Tokens
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8,
version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\e5f6eb23-9454-437c-831c-2c6eae32ff7a.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG.old
(copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Top Sites
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 7, 1st free page 5, free pages
2, cookie 0x5, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Visited Links
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 5, database pages 89, cookie
0x66, schema 4, UTF-8, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebAssistDatabase
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 7, cookie
0xb, schema 4, UTF-8, version-valid-for 10
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\QuotaManager
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 10, cookie 0x7, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\a45dd03f-bb69-4a2f-bc91-f0b42fb7d550.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\arbitration_service_config.json
|
ASCII text, with very long lines (3951), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\b4d6d50b-e5ef-46a1-afe8-cfdad7c2a6e4.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\databases\Databases.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x4, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\heavy_ad_intervention_opt_out.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 4, cookie 0x2, schema 4, UTF-8,
version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000003.log
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Browser
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF28591.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF285d0.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF28b8c.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF28b9c.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2b193.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2d0d3.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2d140.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2f0ee.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2f12c.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF39b18.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3c218.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3f780.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Nurturing\campaign_history
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x2, schema 4, UTF-8,
version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSynchronousLookupUris
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSynchronousLookupUris_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings_2.0-0
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris_636976985063396749.rel.v2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ac4c068a-f213-4a8f-8f12-164acb06a853.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\c6299525-3dd7-4cce-8715-b68f1acfb89e.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\d75fd1bc-1512-4e7e-9fcb-fd94f5f53ebc.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\f0a68b17-9e6b-4563-93c3-f21d4a12157a.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\f5268a82-b52b-4112-afa7-2beb8b21035a.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\cf7513a936f7effbb38627e56f8d1fce10eb12cc.tbres
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\446fc8fa-ed92-49fc-8f17-a2fae354feed.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\4e137540-24a0-4d01-b60a-a3a355f9555b.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\50f06052-9ca3-4ca6-b2b3-3c337183e680.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5d71001e-c392-4e76-b6fe-f29a2f6ced2b.tmp
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1366x720, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\630fc655-6cf3-4ffc-bc4f-ca5e3af2a073.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 41902
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\8ecf1a82-61d4-4dfa-a4a1-4e0ba71065e9.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\cv_debug.log
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\d77717d3-e20b-487e-b335-68455a67efd4.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 695310
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
|
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\8ecf1a82-61d4-4dfa-a4a1-4e0ba71065e9.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\128.png
|
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\af\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\am\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\ar\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\az\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\be\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\bg\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\bn\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\ca\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\cs\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\cy\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\da\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\de\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\el\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\en\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\en_CA\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\en_GB\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\en_US\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\es\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\es_419\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\et\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\eu\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\fa\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\fi\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\fil\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\fr\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\fr_CA\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\gl\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\gu\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\hi\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\hr\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\hu\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\hy\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\id\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\is\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\it\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\iw\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\ja\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\ka\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\kk\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\km\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\kn\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\ko\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\lo\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\lt\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\lv\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\ml\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\mn\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\mr\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\ms\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\my\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\ne\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\nl\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\no\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\pa\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\pl\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\pt_BR\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\pt_PT\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\ro\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\ru\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\si\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\sk\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\sl\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\sr\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\sv\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\sw\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\ta\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\te\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\th\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\tr\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\uk\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\ur\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\vi\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\zh_CN\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\zh_HK\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\zh_TW\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\zu\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_metadata\verified_contents.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\dasherSettingSchema.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\manifest.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\offscreendocument.html
|
HTML document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\offscreendocument_main.js
|
ASCII text, with very long lines (4369)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\page_embed_script.js
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\service_worker_bin_prod.js
|
ASCII text, with very long lines (4369)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1692143573\4e137540-24a0-4d01-b60a-a3a355f9555b.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1692143573\CRX_INSTALL\_metadata\verified_contents.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1692143573\CRX_INSTALL\content.js
|
Unicode text, UTF-8 text, with very long lines (8031), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1692143573\CRX_INSTALL\content_new.js
|
Unicode text, UTF-8 text, with very long lines (8604), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1692143573\CRX_INSTALL\manifest.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpaddon
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
|
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database
pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
|
ASCII text, with very long lines (1809), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
|
ASCII text, with very long lines (1809), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
|
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database
pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
|
Mozilla lz4 compressed data, originally 5952 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
|
Mozilla lz4 compressed data, originally 5952 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
|
Mozilla lz4 compressed data, originally 5952 bytes
|
modified
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
|
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database
pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
|
JSON data
|
dropped
|
There are 337 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=2028,i,249939025956985432,7264132615848075061,262144
/prefetch:3
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=2056,i,14702557000730863942,17466838615074778728,262144
/prefetch:3
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService
--lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6344 --field-trial-handle=2056,i,14702557000730863942,17466838615074778728,262144
/prefetch:8
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor
--lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=6524 --field-trial-handle=2056,i,14702557000730863942,17466838615074778728,262144
/prefetch:8
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7296 --field-trial-handle=2056,i,14702557000730863942,17466838615074778728,262144
/prefetch:8
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7296 --field-trial-handle=2056,i,14702557000730863942,17466838615074778728,262144
/prefetch:8
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2324 --field-trial-handle=2096,i,9877581988244495231,1586528081353476286,262144
/prefetch:3
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2276 --field-trial-handle=2068,i,8933014677616933808,2190198672335111100,262144
/prefetch:3
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker
--lang=en-GB --service-sandbox-type=search_indexer --message-loop-type-ui --mojo-platform-channel-handle=7416 --field-trial-handle=2056,i,14702557000730863942,17466838615074778728,262144
/prefetch:8
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
--attempting-deelevation
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2272 -parentBuildID 20230927232528 -prefsHandle 2180
-prefMapHandle 2172 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser"
- {ff184538-9ec4-40f1-a485-b9958cfa9ec0} 4208 "\\.\pipe\gecko-crash-server-pipe.4208" 26789c6f110 socket
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4460 -parentBuildID 20230927232528 -prefsHandle 4452
-prefMapHandle 4448 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d8d1b33f-8176-45ae-b472-b7c5dd6dabe6}
4208 "\\.\pipe\gecko-crash-server-pipe.4208" 2679bee0510 rdd
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5460 -parentBuildID 20230927232528 -sandboxingKind 0
-prefsHandle 5528 -prefMapHandle 5516 -prefsLen 34094 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla
Firefox\browser" - {96304a8a-3b32-4829-afcc-9c45cdc9719b} 4208 "\\.\pipe\gecko-crash-server-pipe.4208" 267a375cf10 utility
|
There are 10 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=40249-e88c401e1b1f2242d9e4
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
|
unknown
|
||
http://detectportal.firefox.com/
|
unknown
|
||
https://www.msn.comZ
|
unknown
|
||
http://www.fontbureau.com/de=t
|
unknown
|
||
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
|
unknown
|
||
http://www.mozilla.com0
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggest
|
unknown
|
||
https://csp.withgoogle.com/csp/report-to/apps-themes
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
|
unknown
|
||
https://spocs.getpocket.com/spocs
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://screenshots.firefox.com
|
unknown
|
||
https://www.youtube.com
|
unknown
|
||
https://completion.amazon.com/search/complete?q=
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
|
unknown
|
||
https://ads.stickyadstv.com/firefox-etp
|
unknown
|
||
https://www.instagram.com
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
|
unknown
|
||
https://monitor.firefox.com/breach-details/
|
unknown
|
||
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/
|
unknown
|
||
https://profiler.firefox.com/
|
unknown
|
||
https://www.msn.com
|
unknown
|
||
https://outlook.live.com/mail/inbox?isExtension=true&sharedHeader=1&nlp=1&client_flight=outlookedge
|
unknown
|
||
https://outlook.office.com/mail/compose?isExtension=true
|
unknown
|
||
https://github.com/mozilla-services/screenshots
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/addon/
|
unknown
|
||
https://tracking-protection-issues.herokuapp.com/new
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
|
unknown
|
||
https://i.y.qq.com/n2/m/index.html
|
unknown
|
||
https://www.deezer.com/
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
https://web.telegram.org/
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
|
unknown
|
||
https://api.accounts.firefox.com/v1
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
|
unknown
|
||
https://fpn.firefox.com
|
unknown
|
||
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://exslt.org/dates-and-times
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://excel.new?from=EdgeM365Shoreline
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://www.google.com/favicon.ico
|
142.251.35.164
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
|
unknown
|
||
https://bzib.nelreports.net/api/report?cat=bingbusiness
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
|
unknown
|
||
http://127.0.0.1:
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
|
unknown
|
||
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
|
unknown
|
||
https://bugzilla.mo
|
unknown
|
||
https://mitmdetection.services.mozilla.com/
|
unknown
|
||
https://amazon.com
|
unknown
|
||
https://static.adsafeprotected.com/firefox-etp-js
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
https://chrome.google.com/webstore/
|
unknown
|
||
https://spocs.getpocket.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
|
unknown
|
||
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
|
unknown
|
||
https://clients2.googleusercontent.com/crx/blobs/AY4GWKBMNax_FQrZEVzNkO_0mu3UShnzR6AihR_EPjVIUOT_pwZzkWCpOk8YKIu0qnIq_YObWXuPyiJ7NA0nDjMHUEYIIEknsNvJHXuPd0MqxESzoxi9xiMyJKNwZiVV1yEAxlKa5UVe61sINARQ7fO9dE0bkfP_W4GG/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_80_1_0.crx
|
142.250.185.161
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
|
unknown
|
||
https://monitor.firefox.com/user/breach-stats?includeResolved=true
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
|
unknown
|
||
https://www.office.com
|
unknown
|
||
https://outlook.live.com/mail/0/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/search/?guid=default-theme%40mozilla.org%2Caddons-
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
|
unknown
|
||
http://www.inbox.lv/rfc2368/?value=%su
|
unknown
|
||
https://monitor.firefox.com/user/dashboard
|
unknown
|
||
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
|
unknown
|
||
https://tidal.com/
|
unknown
|
||
https://monitor.firefox.com/about
|
unknown
|
||
http://mozilla.org/MPL/2.0/.
|
unknown
|
||
https://account.bellmedia.c
|
unknown
|
||
https://www.tsn.caG9
|
unknown
|
||
https://gaana.com/
|
unknown
|
||
https://login.microsoftonline.com
|
unknown
|
||
https://coverage.mozilla.org
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://csp.withgoogle.com/csp/report-to/AccountsSignInUi
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://outlook.live.com/mail/compose?isExtension=true
|
unknown
|
||
https://infra.spec.whatwg.org/#ascii-whitespace
|
unknown
|
||
https://blocked.cdn.mozilla.net/
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
example.org
|
93.184.215.14
|
||
chrome.cloudflare-dns.com
|
172.64.41.3
|
||
prod.classify-client.prod.webservices.mozgcp.net
|
35.190.72.216
|
||
prod.balrog.prod.cloudops.mozgcp.net
|
35.244.181.201
|
||
prod.detectportal.prod.cloudops.mozgcp.net
|
34.107.221.82
|
||
services.addons.mozilla.org
|
18.65.39.4
|
||
prod.remote-settings.prod.webservices.mozgcp.net
|
34.149.100.209
|
||
sni1gl.wpc.nucdn.net
|
152.199.21.175
|
||
contile.services.mozilla.com
|
34.117.188.166
|
||
s-part-0029.t-0009.t-msedge.net
|
13.107.246.57
|
||
prod.content-signature-chains.prod.webservices.mozgcp.net
|
34.160.144.191
|
||
us-west1.prod.sumo.prod.webservices.mozgcp.net
|
34.149.128.2
|
||
ipv4only.arpa
|
192.0.0.171
|
||
prod.ads.prod.webservices.mozgcp.net
|
34.117.188.166
|
||
push.services.mozilla.com
|
34.107.243.93
|
||
googlehosted.l.googleusercontent.com
|
142.250.185.161
|
||
telemetry-incoming.r53-2.services.mozilla.com
|
34.120.208.123
|
||
spocs.getpocket.com
|
unknown
|
||
detectportal.firefox.com
|
unknown
|
||
clients2.googleusercontent.com
|
unknown
|
||
bzib.nelreports.net
|
unknown
|
||
content-signature-2.cdn.mozilla.net
|
unknown
|
||
support.mozilla.org
|
unknown
|
||
firefox.settings.services.mozilla.com
|
unknown
|
||
shavar.services.mozilla.com
|
unknown
|
There are 15 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
13.107.246.40
|
unknown
|
United States
|
||
23.55.235.170
|
unknown
|
United States
|
||
142.251.40.106
|
unknown
|
United States
|
||
152.195.19.97
|
unknown
|
United States
|
||
192.168.2.4
|
unknown
|
unknown
|
||
34.117.188.166
|
contile.services.mozilla.com
|
United States
|
||
142.250.185.161
|
googlehosted.l.googleusercontent.com
|
United States
|
||
172.64.41.3
|
chrome.cloudflare-dns.com
|
United States
|
||
34.120.208.123
|
telemetry-incoming.r53-2.services.mozilla.com
|
United States
|
||
104.70.121.171
|
unknown
|
United States
|
||
13.107.246.57
|
s-part-0029.t-0009.t-msedge.net
|
United States
|
||
34.149.100.209
|
prod.remote-settings.prod.webservices.mozgcp.net
|
United States
|
||
18.65.39.4
|
services.addons.mozilla.org
|
United States
|
||
34.107.243.93
|
push.services.mozilla.com
|
United States
|
||
34.107.221.82
|
prod.detectportal.prod.cloudops.mozgcp.net
|
United States
|
||
35.244.181.201
|
prod.balrog.prod.cloudops.mozgcp.net
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
20.96.153.111
|
unknown
|
United States
|
||
35.190.72.216
|
prod.classify-client.prod.webservices.mozgcp.net
|
United States
|
||
34.160.144.191
|
prod.content-signature-chains.prod.webservices.mozgcp.net
|
United States
|
||
142.250.72.110
|
unknown
|
United States
|
||
142.251.35.164
|
unknown
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
172.253.115.84
|
unknown
|
United States
|
There are 14 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
|
C:\Program Files\Mozilla Firefox|AppLastRunTime
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
media.cdm.origin_data
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PrefsLightweight
|
lw_13bbe73648289fe96dfa1aa1bf23b3da
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
|
freseenversion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
|
freseen
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
|
is_dse_recommended
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
|
is_startup_page_recommended
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
|
lastrun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66616
|
WindowTabManagerFileMappingId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\Clients\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\Commands\on-logon-autolaunch
|
Enabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
MicrosoftEdgeAutoLaunch_C366A24065C39A1BE76E148DC2D0A868
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles\Default
|
ShortcutName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles\Default
|
ProfileErrorState
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles
|
EnhancedLinkOpeningDefault
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ahfgeienlihckogmohjhadlkjgocpleb
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ahokoikenoafgppiblgpenaaaolecifn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
bhmhibnbialendcafinliemndanacfaj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
bobbggphonhgdonfdibkfipfepfcildj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ceaifoolopnigfpidlheoagpheiplgii
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
cjneempfhkonkkbcmnfdibgobmhbagaj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dabfebgaghanlbehmkmaflipiohdimmc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dcaajljecejllikfgbhjdgeognacjkkp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dgiklkfkllikcanfonkcabmbdfmgleag
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dmbljphlfghcnbohaoffiedmodfmkmol
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ehlmnljdoejdahfjdfobmpfancoibmig
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
eijpepilkjkofamihbmjcnihgpbebafj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
enkoeamdnimieoooocohgbdajhhkajko
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
fikbjbembnmfhppjfnmfkahdhfohhjmg
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
fjngpfnaikknjdhkckmncgicobbkcnle
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gbihlnbpmfkodghomcinpblknjhneknc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gbmoeijgfngecijpcnbooedokgafmmji
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gecfnmoodchdkebjjffmdcmeghkflpib
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gekagaaiohabmaknhkbaofhhedhelemf
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ghbmnnjooekpmoecnnnilnnbdlolhkhi
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ghglcnachgghkhbafjogogiggghcpjig
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hciemgmhplhpinoohcjpafmncmjapioh
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hloomjjkinpbjldhobfkfdamkmikjmdo
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hmlhageoffiiefnmojcgoagebofoifpl
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
iglcjdemknebjbklcgkfaebgojjphkec
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ihmafllikibpmigkcoadcmckbfhibefp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jbleckejnaboogigodiafflhkajdmpcl
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jdiccldimpdaibmpdkjnbmckianbfold
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jlipacegilfgfpgkefbjcncbfcoeecgj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jpfjdekhebcolnfkpicpciaknbgcdcbm
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kfihiegbjaloebkmglnjnljoljgkkchm
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
khffkadolmfbdgahbabbhipadklfmhgf
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kjncpkplfnolibapodobnnjfgmjmiaba
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kkobcodijbdelbnhbfkkfncbeildnpie
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kmojgmpmopiiagdfbilgognmlegkonbk
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ncbjelpjchkpbikbpkcchkhkblodoama
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nkbndigcebkoaejohleckhekfmcecfja
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nnpnekncnhiglbokoiffmejlimgmgoam
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ofefcgjbeghpigppfmkologfjadafddi
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
olkdlefmaniacnmgofabnpmomgcpdaip
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
olmhchkiafniffcaiciiomfdplnmklak
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
pencekojiebcjhifbkfdncgmmooepclc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ppnnjfpaneghjbcepgedmlcgmfgkjhah
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ahfgeienlihckogmohjhadlkjgocpleb
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ahokoikenoafgppiblgpenaaaolecifn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
bhmhibnbialendcafinliemndanacfaj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
bobbggphonhgdonfdibkfipfepfcildj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ceaifoolopnigfpidlheoagpheiplgii
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
cjneempfhkonkkbcmnfdibgobmhbagaj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dabfebgaghanlbehmkmaflipiohdimmc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dcaajljecejllikfgbhjdgeognacjkkp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dgiklkfkllikcanfonkcabmbdfmgleag
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dmbljphlfghcnbohaoffiedmodfmkmol
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ehlmnljdoejdahfjdfobmpfancoibmig
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
eijpepilkjkofamihbmjcnihgpbebafj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
enkoeamdnimieoooocohgbdajhhkajko
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
fikbjbembnmfhppjfnmfkahdhfohhjmg
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
fjngpfnaikknjdhkckmncgicobbkcnle
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gbihlnbpmfkodghomcinpblknjhneknc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gbmoeijgfngecijpcnbooedokgafmmji
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gecfnmoodchdkebjjffmdcmeghkflpib
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gekagaaiohabmaknhkbaofhhedhelemf
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ghbmnnjooekpmoecnnnilnnbdlolhkhi
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ghglcnachgghkhbafjogogiggghcpjig
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hciemgmhplhpinoohcjpafmncmjapioh
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hloomjjkinpbjldhobfkfdamkmikjmdo
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hmlhageoffiiefnmojcgoagebofoifpl
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
iglcjdemknebjbklcgkfaebgojjphkec
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ihmafllikibpmigkcoadcmckbfhibefp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jbleckejnaboogigodiafflhkajdmpcl
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jdiccldimpdaibmpdkjnbmckianbfold
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jlipacegilfgfpgkefbjcncbfcoeecgj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jpfjdekhebcolnfkpicpciaknbgcdcbm
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kfihiegbjaloebkmglnjnljoljgkkchm
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
khffkadolmfbdgahbabbhipadklfmhgf
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kjncpkplfnolibapodobnnjfgmjmiaba
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kkobcodijbdelbnhbfkkfncbeildnpie
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kmojgmpmopiiagdfbilgognmlegkonbk
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ncbjelpjchkpbikbpkcchkhkblodoama
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nkbndigcebkoaejohleckhekfmcecfja
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nnpnekncnhiglbokoiffmejlimgmgoam
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ofefcgjbeghpigppfmkologfjadafddi
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
olkdlefmaniacnmgofabnpmomgcpdaip
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
olmhchkiafniffcaiciiomfdplnmklak
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
pencekojiebcjhifbkfdncgmmooepclc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ppnnjfpaneghjbcepgedmlcgmfgkjhah
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ahfgeienlihckogmohjhadlkjgocpleb
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ahokoikenoafgppiblgpenaaaolecifn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
bhmhibnbialendcafinliemndanacfaj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
bobbggphonhgdonfdibkfipfepfcildj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ceaifoolopnigfpidlheoagpheiplgii
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
cjneempfhkonkkbcmnfdibgobmhbagaj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dabfebgaghanlbehmkmaflipiohdimmc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dcaajljecejllikfgbhjdgeognacjkkp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dgiklkfkllikcanfonkcabmbdfmgleag
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dmbljphlfghcnbohaoffiedmodfmkmol
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ehlmnljdoejdahfjdfobmpfancoibmig
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
eijpepilkjkofamihbmjcnihgpbebafj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
enkoeamdnimieoooocohgbdajhhkajko
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
fikbjbembnmfhppjfnmfkahdhfohhjmg
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
fjngpfnaikknjdhkckmncgicobbkcnle
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gbihlnbpmfkodghomcinpblknjhneknc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gbmoeijgfngecijpcnbooedokgafmmji
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gecfnmoodchdkebjjffmdcmeghkflpib
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gekagaaiohabmaknhkbaofhhedhelemf
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ghbmnnjooekpmoecnnnilnnbdlolhkhi
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ghglcnachgghkhbafjogogiggghcpjig
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hciemgmhplhpinoohcjpafmncmjapioh
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hloomjjkinpbjldhobfkfdamkmikjmdo
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hmlhageoffiiefnmojcgoagebofoifpl
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
iglcjdemknebjbklcgkfaebgojjphkec
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ihmafllikibpmigkcoadcmckbfhibefp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jbleckejnaboogigodiafflhkajdmpcl
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jdiccldimpdaibmpdkjnbmckianbfold
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jlipacegilfgfpgkefbjcncbfcoeecgj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jmjflgjpcpepeafmmgdpfkogkghcpiha
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jpfjdekhebcolnfkpicpciaknbgcdcbm
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kfihiegbjaloebkmglnjnljoljgkkchm
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
khffkadolmfbdgahbabbhipadklfmhgf
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kjncpkplfnolibapodobnnjfgmjmiaba
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kkobcodijbdelbnhbfkkfncbeildnpie
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kmojgmpmopiiagdfbilgognmlegkonbk
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ncbjelpjchkpbikbpkcchkhkblodoama
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nkbndigcebkoaejohleckhekfmcecfja
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nnpnekncnhiglbokoiffmejlimgmgoam
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ofefcgjbeghpigppfmkologfjadafddi
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
olkdlefmaniacnmgofabnpmomgcpdaip
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
olmhchkiafniffcaiciiomfdplnmklak
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
pencekojiebcjhifbkfdncgmmooepclc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ppnnjfpaneghjbcepgedmlcgmfgkjhah
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
software_reporter.reporting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
media.storage_id_salt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_startup_urls
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
settings_reset_prompt.prompt_wave
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
edge.services.account_id
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
software_reporter.prompt_seed
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_homepage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
edge.services.last_username
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
default_search_provider_data.template_url_data
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
safebrowsing.incidents_sent
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
pinned_tabs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
search_provider_overrides
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
edge.services.last_account_id
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
software_reporter.prompt_version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
session.startup_urls
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
session.restore_on_startup
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_default_search
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
browser.show_home_button
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
homepage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
homepage_is_newtabpage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66616
|
WindowTabManagerFileMappingId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66616
|
WindowTabManagerFileMappingId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66616
|
WindowTabManagerFileMappingId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66616
|
WindowTabManagerFileMappingId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
|
lastrun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
|
lastrun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
There are 197 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2679C5DC000
|
trusted library allocation
|
page read and write
|
||
2679BF53000
|
trusted library allocation
|
page read and write
|
||
2679BF96000
|
trusted library allocation
|
page read and write
|
||
2679C693000
|
trusted library allocation
|
page read and write
|
||
1B0FC3C24000
|
trusted library allocation
|
page read and write
|
||
267A5751000
|
heap
|
page read and write
|
||
2679C512000
|
trusted library allocation
|
page read and write
|
||
2679C0FA000
|
trusted library allocation
|
page read and write
|
||
267A3AFB000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
2679C321000
|
trusted library allocation
|
page read and write
|
||
2679D07E000
|
trusted library allocation
|
page read and write
|
||
267A60B9000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
267A3D50000
|
trusted library allocation
|
page read and write
|
||
21AD9E10000
|
trusted library allocation
|
page read and write
|
||
2679A0EC000
|
trusted library allocation
|
page read and write
|
||
2679C424000
|
trusted library allocation
|
page read and write
|
||
267A60A1000
|
trusted library allocation
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
2679DB9F000
|
trusted library allocation
|
page read and write
|
||
267A2C6E000
|
trusted library allocation
|
page read and write
|
||
267A35CA000
|
trusted library allocation
|
page read and write
|
||
26796D3A000
|
heap
|
page read and write
|
||
17F9EDAC000
|
heap
|
page read and write
|
||
26796BDE000
|
trusted library allocation
|
page read and write
|
||
267A35BE000
|
trusted library allocation
|
page read and write
|
||
26799DE8000
|
trusted library allocation
|
page read and write
|
||
2679ADF8000
|
trusted library allocation
|
page read and write
|
||
26797F4A000
|
trusted library allocation
|
page read and write
|
||
26798137000
|
trusted library allocation
|
page read and write
|
||
99C6BB000
|
stack
|
page read and write
|
||
267A39EF000
|
trusted library allocation
|
page read and write
|
||
267A60B9000
|
trusted library allocation
|
page read and write
|
||
267A5241000
|
trusted library allocation
|
page read and write
|
||
2679C47A000
|
trusted library allocation
|
page read and write
|
||
1EC881A9000
|
heap
|
page read and write
|
||
26797F58000
|
trusted library allocation
|
page read and write
|
||
2679C674000
|
trusted library allocation
|
page read and write
|
||
26796D5A000
|
heap
|
page read and write
|
||
2679D06F000
|
trusted library allocation
|
page read and write
|
||
21AD9A9E000
|
remote allocation
|
page execute read
|
||
26796D52000
|
heap
|
page read and write
|
||
26795378000
|
trusted library allocation
|
page read and write
|
||
21AD9E5B000
|
trusted library allocation
|
page read and write
|
||
21AD9C82000
|
unclassified section
|
page read and write
|
||
267A39AE000
|
trusted library allocation
|
page read and write
|
||
2679A0EC000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
2679C517000
|
trusted library allocation
|
page read and write
|
||
26799F30000
|
trusted library allocation
|
page read and write
|
||
267A38C5000
|
trusted library allocation
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
267955EC000
|
trusted library allocation
|
page read and write
|
||
26799FF0000
|
trusted library allocation
|
page read and write
|
||
2679B1CC000
|
trusted library allocation
|
page read and write
|
||
2679B845000
|
trusted library allocation
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
2679C6E4000
|
trusted library allocation
|
page read and write
|
||
2679C6C7000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
26796BFC000
|
trusted library allocation
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
4BDE000
|
stack
|
page read and write
|
||
26796B67000
|
trusted library allocation
|
page read and write
|
||
26797C69000
|
trusted library allocation
|
page read and write
|
||
26795A18000
|
trusted library allocation
|
page read and write
|
||
267A39F1000
|
trusted library allocation
|
page read and write
|
||
267973F0000
|
trusted library allocation
|
page read and write
|
||
2679B1B7000
|
trusted library allocation
|
page read and write
|
||
2679D05B000
|
trusted library allocation
|
page read and write
|
||
267A3D2A000
|
trusted library allocation
|
page read and write
|
||
1EC87DEB000
|
heap
|
page read and write
|
||
267A605C000
|
trusted library allocation
|
page read and write
|
||
26799FAE000
|
trusted library allocation
|
page read and write
|
||
267A56E1000
|
heap
|
page read and write
|
||
267A5EDF000
|
trusted library allocation
|
page read and write
|
||
26796D5A000
|
heap
|
page read and write
|
||
267A35CA000
|
trusted library allocation
|
page read and write
|
||
2679C090000
|
trusted library allocation
|
page read and write
|
||
26796D42000
|
heap
|
page read and write
|
||
2679C08C000
|
trusted library allocation
|
page read and write
|
||
99F27E000
|
stack
|
page read and write
|
||
26796BDE000
|
trusted library allocation
|
page read and write
|
||
1EC87310000
|
heap
|
page readonly
|
||
26799D8A000
|
trusted library allocation
|
page read and write
|
||
26799FF4000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
26798154000
|
trusted library allocation
|
page read and write
|
||
2679BF9F000
|
trusted library allocation
|
page read and write
|
||
26796D5C000
|
heap
|
page read and write
|
||
2679A6E5000
|
trusted library allocation
|
page read and write
|
||
2679BFBE000
|
trusted library allocation
|
page read and write
|
||
2679B1C4000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
2679C693000
|
trusted library allocation
|
page read and write
|
||
26797F81000
|
trusted library allocation
|
page read and write
|
||
26796D5A000
|
heap
|
page read and write
|
||
1EC87DEB000
|
heap
|
page read and write
|
||
267A56E1000
|
heap
|
page read and write
|
||
26795D39000
|
trusted library allocation
|
page read and write
|
||
17F9D140000
|
heap
|
page read and write
|
||
1DB6B153000
|
heap
|
page read and write
|
||
2679DB8B000
|
trusted library allocation
|
page read and write
|
||
2679BCCD000
|
trusted library allocation
|
page read and write
|
||
2679DC48000
|
trusted library allocation
|
page read and write
|
||
26797F93000
|
trusted library allocation
|
page read and write
|
||
26796D51000
|
heap
|
page read and write
|
||
267A3150000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
267A38D9000
|
trusted library allocation
|
page read and write
|
||
267A36A9000
|
trusted library allocation
|
page read and write
|
||
5440000
|
heap
|
page read and write
|
||
2679BF8D000
|
trusted library allocation
|
page read and write
|
||
26796D7A000
|
heap
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
26799D41000
|
trusted library allocation
|
page read and write
|
||
26799DEA000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
2679C48C000
|
trusted library allocation
|
page read and write
|
||
26799D7B000
|
trusted library allocation
|
page read and write
|
||
2679BD92000
|
trusted library allocation
|
page read and write
|
||
26796D84000
|
heap
|
page read and write
|
||
2679D012000
|
trusted library allocation
|
page read and write
|
||
267A38FC000
|
trusted library allocation
|
page read and write
|
||
2679C6C9000
|
trusted library allocation
|
page read and write
|
||
26799C07000
|
heap
|
page read and write
|
||
26799D5B000
|
trusted library allocation
|
page read and write
|
||
26799FF4000
|
trusted library allocation
|
page read and write
|
||
26796D4E000
|
heap
|
page read and write
|
||
26799C2D000
|
heap
|
page read and write
|
||
267A2C39000
|
trusted library allocation
|
page read and write
|
||
26796D51000
|
heap
|
page read and write
|
||
2679BDC1000
|
trusted library allocation
|
page read and write
|
||
2679C5C8000
|
trusted library allocation
|
page read and write
|
||
26797C6D000
|
trusted library allocation
|
page read and write
|
||
267973D2000
|
trusted library allocation
|
page read and write
|
||
26797C81000
|
trusted library allocation
|
page read and write
|
||
267A39F3000
|
trusted library allocation
|
page read and write
|
||
267973F8000
|
trusted library allocation
|
page read and write
|
||
267A3182000
|
trusted library allocation
|
page read and write
|
||
26799C09000
|
heap
|
page read and write
|
||
26797333000
|
trusted library allocation
|
page read and write
|
||
2679A2CE000
|
trusted library allocation
|
page read and write
|
||
2679DC68000
|
trusted library allocation
|
page read and write
|
||
267A60A4000
|
trusted library allocation
|
page read and write
|
||
26795A7E000
|
trusted library allocation
|
page read and write
|
||
26796D2B000
|
heap
|
page read and write
|
||
267A571F000
|
heap
|
page read and write
|
||
26796D3D000
|
heap
|
page read and write
|
||
1DB6AFF7000
|
remote allocation
|
page execute read
|
||
26796D5A000
|
heap
|
page read and write
|
||
2679A0F1000
|
trusted library allocation
|
page read and write
|
||
1EC87340000
|
trusted library section
|
page readonly
|
||
26796D36000
|
heap
|
page read and write
|
||
26795DB2000
|
trusted library allocation
|
page read and write
|
||
26799F27000
|
trusted library allocation
|
page read and write
|
||
267A2C6B000
|
trusted library allocation
|
page read and write
|
||
267A2C39000
|
trusted library allocation
|
page read and write
|
||
267981BE000
|
trusted library allocation
|
page read and write
|
||
26799E22000
|
trusted library allocation
|
page read and write
|
||
2679BF41000
|
trusted library allocation
|
page read and write
|
||
2679D077000
|
trusted library allocation
|
page read and write
|
||
26795A93000
|
trusted library allocation
|
page read and write
|
||
26799E22000
|
trusted library allocation
|
page read and write
|
||
26797C85000
|
trusted library allocation
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
267A39C8000
|
trusted library allocation
|
page read and write
|
||
2679C490000
|
trusted library allocation
|
page read and write
|
||
2679D0BD000
|
trusted library allocation
|
page read and write
|
||
2679C3F4000
|
trusted library allocation
|
page read and write
|
||
267A2CF6000
|
trusted library allocation
|
page read and write
|
||
2679C5D2000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
267A38F2000
|
trusted library allocation
|
page read and write
|
||
267A38E9000
|
trusted library allocation
|
page read and write
|
||
267972DB000
|
trusted library allocation
|
page read and write
|
||
2679B1CC000
|
trusted library allocation
|
page read and write
|
||
2679D0DE000
|
trusted library allocation
|
page read and write
|
||
2679D04B000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
26798168000
|
trusted library allocation
|
page read and write
|
||
267A6080000
|
trusted library allocation
|
page read and write
|
||
267972F7000
|
trusted library allocation
|
page read and write
|
||
26795DFC000
|
trusted library allocation
|
page read and write
|
||
1EC87DE3000
|
heap
|
page read and write
|
||
26797FCE000
|
trusted library allocation
|
page read and write
|
||
267A60B9000
|
trusted library allocation
|
page read and write
|
||
26796BB6000
|
trusted library allocation
|
page read and write
|
||
267972DE000
|
trusted library allocation
|
page read and write
|
||
2679C584000
|
trusted library allocation
|
page read and write
|
||
2679C62D000
|
trusted library allocation
|
page read and write
|
||
2679DC68000
|
trusted library allocation
|
page read and write
|
||
2679C4AC000
|
trusted library allocation
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
2679A2A7000
|
trusted library allocation
|
page read and write
|
||
267A36E7000
|
trusted library allocation
|
page read and write
|
||
26796A52000
|
trusted library allocation
|
page read and write
|
||
267A602E000
|
trusted library allocation
|
page read and write
|
||
267973F0000
|
trusted library allocation
|
page read and write
|
||
2679BDD0000
|
trusted library allocation
|
page read and write
|
||
2679C0F6000
|
trusted library allocation
|
page read and write
|
||
2679BBE6000
|
trusted library allocation
|
page read and write
|
||
26795DD3000
|
trusted library allocation
|
page read and write
|
||
26799FE0000
|
trusted library allocation
|
page read and write
|
||
267A38D9000
|
trusted library allocation
|
page read and write
|
||
2F6E67E000
|
stack
|
page read and write
|
||
26796B2B000
|
trusted library allocation
|
page read and write
|
||
2679C490000
|
trusted library allocation
|
page read and write
|
||
1EC87DA1000
|
heap
|
page read and write
|
||
2679DBE6000
|
trusted library allocation
|
page read and write
|
||
267955E4000
|
trusted library allocation
|
page read and write
|
||
2679D0B2000
|
trusted library allocation
|
page read and write
|
||
2679C6EF000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
26799DB8000
|
trusted library allocation
|
page read and write
|
||
1EC88185000
|
heap
|
page read and write
|
||
267A3579000
|
trusted library allocation
|
page read and write
|
||
26796D30000
|
heap
|
page read and write
|
||
6C732FE000
|
unkown
|
page readonly
|
||
26797311000
|
trusted library allocation
|
page read and write
|
||
267A3851000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
2679DBE4000
|
trusted library allocation
|
page read and write
|
||
26796BDA000
|
trusted library allocation
|
page read and write
|
||
26796D54000
|
heap
|
page read and write
|
||
267A3879000
|
trusted library allocation
|
page read and write
|
||
26799F92000
|
trusted library allocation
|
page read and write
|
||
26799D5B000
|
trusted library allocation
|
page read and write
|
||
2679C0EB000
|
trusted library allocation
|
page read and write
|
||
14F8000
|
heap
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
2679C58A000
|
trusted library allocation
|
page read and write
|
||
2679C68E000
|
trusted library allocation
|
page read and write
|
||
267A3888000
|
trusted library allocation
|
page read and write
|
||
26799FF4000
|
trusted library allocation
|
page read and write
|
||
267A62ED000
|
trusted library allocation
|
page read and write
|
||
21ADA01D000
|
trusted library allocation
|
page read and write
|
||
26799D5A000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
2679A6A2000
|
trusted library allocation
|
page read and write
|
||
267972AD000
|
trusted library allocation
|
page read and write
|
||
2679A263000
|
trusted library allocation
|
page read and write
|
||
26799D93000
|
trusted library allocation
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
267A381B000
|
trusted library allocation
|
page read and write
|
||
26799C0D000
|
heap
|
page read and write
|
||
267986EB000
|
trusted library allocation
|
page read and write
|
||
1EC87D00000
|
heap
|
page read and write
|
||
267A3690000
|
trusted library allocation
|
page read and write
|
||
267972DB000
|
trusted library allocation
|
page read and write
|
||
2679DC68000
|
trusted library allocation
|
page read and write
|
||
26796CAA000
|
trusted library allocation
|
page read and write
|
||
26797C9F000
|
trusted library allocation
|
page read and write
|
||
26797FD8000
|
trusted library allocation
|
page read and write
|
||
1EC87DE6000
|
heap
|
page read and write
|
||
2679A697000
|
trusted library allocation
|
page read and write
|
||
2679B150000
|
trusted library allocation
|
page read and write
|
||
267A2C5A000
|
trusted library allocation
|
page read and write
|
||
26796D5A000
|
heap
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
26796B73000
|
trusted library allocation
|
page read and write
|
||
2679A6A2000
|
trusted library allocation
|
page read and write
|
||
267A3D50000
|
trusted library allocation
|
page read and write
|
||
26795DBF000
|
trusted library allocation
|
page read and write
|
||
267A3853000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
2679DBE8000
|
trusted library allocation
|
page read and write
|
||
26799C0B000
|
heap
|
page read and write
|
||
267A3649000
|
trusted library allocation
|
page read and write
|
||
1EC87DF2000
|
heap
|
page read and write
|
||
26797F81000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
267A2C77000
|
trusted library allocation
|
page read and write
|
||
2679DBFE000
|
trusted library allocation
|
page read and write
|
||
21ADA007000
|
trusted library allocation
|
page read and write
|
||
267A38F5000
|
trusted library allocation
|
page read and write
|
||
26799FFB000
|
trusted library allocation
|
page read and write
|
||
267A3AE7000
|
trusted library allocation
|
page read and write
|
||
267A2CE2000
|
trusted library allocation
|
page read and write
|
||
21AD9AAA000
|
heap
|
page read and write
|
||
26795DE6000
|
trusted library allocation
|
page read and write
|
||
1002000
|
unkown
|
page readonly
|
||
2679BDC1000
|
trusted library allocation
|
page read and write
|
||
267A314C000
|
trusted library allocation
|
page read and write
|
||
2679BEC8000
|
trusted library allocation
|
page read and write
|
||
26796D84000
|
heap
|
page read and write
|
||
26796D41000
|
heap
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
1EC88197000
|
heap
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
2679BE92000
|
trusted library allocation
|
page read and write
|
||
1EC87090000
|
heap
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
1EC87D6C000
|
heap
|
page read and write
|
||
1FE4470A000
|
trusted library allocation
|
page read and write
|
||
2679C0F1000
|
trusted library allocation
|
page read and write
|
||
267A3584000
|
trusted library allocation
|
page read and write
|
||
26797FA2000
|
trusted library allocation
|
page read and write
|
||
2679DC68000
|
trusted library allocation
|
page read and write
|
||
F41000
|
unkown
|
page execute read
|
||
267A35B5000
|
trusted library allocation
|
page read and write
|
||
1EC87DEB000
|
heap
|
page read and write
|
||
26798189000
|
trusted library allocation
|
page read and write
|
||
267981AE000
|
trusted library allocation
|
page read and write
|
||
2679B843000
|
trusted library allocation
|
page read and write
|
||
26797F7D000
|
trusted library allocation
|
page read and write
|
||
267A3DA1000
|
trusted library allocation
|
page read and write
|
||
26799C27000
|
heap
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
267981E5000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
26799FF9000
|
trusted library allocation
|
page read and write
|
||
2679C6BF000
|
trusted library allocation
|
page read and write
|
||
2679AE07000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
26797F8A000
|
trusted library allocation
|
page read and write
|
||
26796D5C000
|
heap
|
page read and write
|
||
2679C4FC000
|
trusted library allocation
|
page read and write
|
||
26799D85000
|
trusted library allocation
|
page read and write
|
||
2679BDB7000
|
trusted library allocation
|
page read and write
|
||
26799FE6000
|
trusted library allocation
|
page read and write
|
||
26799DC8000
|
trusted library allocation
|
page read and write
|
||
267A3171000
|
trusted library allocation
|
page read and write
|
||
26799934000
|
trusted library allocation
|
page read and write
|
||
267953B3000
|
trusted library allocation
|
page read and write
|
||
267A36E6000
|
trusted library allocation
|
page read and write
|
||
26799873000
|
trusted library allocation
|
page read and write
|
||
267A2C9B000
|
trusted library allocation
|
page read and write
|
||
2679AAFE000
|
trusted library allocation
|
page read and write
|
||
267A388B000
|
trusted library allocation
|
page read and write
|
||
140B000
|
stack
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
26796D80000
|
heap
|
page read and write
|
||
2679C3EE000
|
trusted library allocation
|
page read and write
|
||
26797336000
|
trusted library allocation
|
page read and write
|
||
267A3960000
|
trusted library allocation
|
page read and write
|
||
2679B85A000
|
trusted library allocation
|
page read and write
|
||
267A2CF3000
|
trusted library allocation
|
page read and write
|
||
267A3848000
|
trusted library allocation
|
page read and write
|
||
2679B8CC000
|
trusted library allocation
|
page read and write
|
||
267A2C79000
|
trusted library allocation
|
page read and write
|
||
26799FE0000
|
trusted library allocation
|
page read and write
|
||
267A40A6000
|
trusted library allocation
|
page read and write
|
||
267A2C7D000
|
trusted library allocation
|
page read and write
|
||
1EC87DFC000
|
heap
|
page read and write
|
||
2679C6F6000
|
trusted library allocation
|
page read and write
|
||
2679C0BF000
|
trusted library allocation
|
page read and write
|
||
267A389B000
|
trusted library allocation
|
page read and write
|
||
267A3188000
|
trusted library allocation
|
page read and write
|
||
26797FFE000
|
trusted library allocation
|
page read and write
|
||
267A3642000
|
trusted library allocation
|
page read and write
|
||
267A35B1000
|
trusted library allocation
|
page read and write
|
||
1DB6B378000
|
trusted library allocation
|
page read and write
|
||
26796D39000
|
heap
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
267953CC000
|
trusted library allocation
|
page read and write
|
||
267A3AD5000
|
trusted library allocation
|
page read and write
|
||
2679DBE0000
|
trusted library allocation
|
page read and write
|
||
26799D8A000
|
trusted library allocation
|
page read and write
|
||
1DB6B311000
|
trusted library allocation
|
page read and write
|
||
2679D09A000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
13FE000
|
stack
|
page read and write
|
||
2679DBA2000
|
trusted library allocation
|
page read and write
|
||
267A6091000
|
trusted library allocation
|
page read and write
|
||
2679C0BC000
|
trusted library allocation
|
page read and write
|
||
2679C356000
|
trusted library allocation
|
page read and write
|
||
26796A9A000
|
trusted library allocation
|
page read and write
|
||
2679BBD3000
|
trusted library allocation
|
page read and write
|
||
26798178000
|
trusted library allocation
|
page read and write
|
||
26795381000
|
trusted library allocation
|
page read and write
|
||
267973FB000
|
trusted library allocation
|
page read and write
|
||
1450000
|
trusted library allocation
|
page read and write
|
||
1EC87DF1000
|
heap
|
page read and write
|
||
26796CEB000
|
trusted library allocation
|
page read and write
|
||
2679AAE4000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
2679C092000
|
trusted library allocation
|
page read and write
|
||
26796A6A000
|
trusted library allocation
|
page read and write
|
||
26799D9D000
|
trusted library allocation
|
page read and write
|
||
2679BE92000
|
trusted library allocation
|
page read and write
|
||
2679AE05000
|
trusted library allocation
|
page read and write
|
||
2679D09E000
|
trusted library allocation
|
page read and write
|
||
267A3DCF000
|
trusted library allocation
|
page read and write
|
||
267A39D4000
|
trusted library allocation
|
page read and write
|
||
26795A1E000
|
trusted library allocation
|
page read and write
|
||
2679993B000
|
trusted library allocation
|
page read and write
|
||
26799EF9000
|
trusted library allocation
|
page read and write
|
||
2679C0D6000
|
trusted library allocation
|
page read and write
|
||
2679817D000
|
trusted library allocation
|
page read and write
|
||
1EC88160000
|
heap
|
page read and write
|
||
1DB6B4B0000
|
heap
|
page read and write
|
||
267A3142000
|
trusted library allocation
|
page read and write
|
||
26797C6A000
|
trusted library allocation
|
page read and write
|
||
267A3D55000
|
trusted library allocation
|
page read and write
|
||
1EC87D8A000
|
heap
|
page read and write
|
||
26799FEE000
|
trusted library allocation
|
page read and write
|
||
1DB6B3B9000
|
trusted library allocation
|
page read and write
|
||
26797FD8000
|
trusted library allocation
|
page read and write
|
||
26796D59000
|
heap
|
page read and write
|
||
267953BF000
|
trusted library allocation
|
page read and write
|
||
267A39F3000
|
trusted library allocation
|
page read and write
|
||
267A38EE000
|
trusted library allocation
|
page read and write
|
||
2679C5A4000
|
trusted library allocation
|
page read and write
|
||
3D237C004000
|
trusted library allocation
|
page read and write
|
||
2679A2E2000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
26796D3D000
|
heap
|
page read and write
|
||
2679AAEC000
|
trusted library allocation
|
page read and write
|
||
267A2C5D000
|
trusted library allocation
|
page read and write
|
||
26796D3E000
|
heap
|
page read and write
|
||
21AD9AA0000
|
heap
|
page read and write
|
||
26799DEE000
|
trusted library allocation
|
page read and write
|
||
2679A064000
|
trusted library allocation
|
page read and write
|
||
267A3AF2000
|
trusted library allocation
|
page read and write
|
||
2F6EE7E000
|
unkown
|
page readonly
|
||
2679BF43000
|
trusted library allocation
|
page read and write
|
||
26796D5A000
|
heap
|
page read and write
|
||
26797E08000
|
trusted library allocation
|
page read and write
|
||
2679C445000
|
trusted library allocation
|
page read and write
|
||
26796A2B000
|
trusted library allocation
|
page read and write
|
||
26797F58000
|
trusted library allocation
|
page read and write
|
||
2679C0CA000
|
trusted library allocation
|
page read and write
|
||
2679C47E000
|
trusted library allocation
|
page read and write
|
||
2679DBE2000
|
trusted library allocation
|
page read and write
|
||
2679C0EB000
|
trusted library allocation
|
page read and write
|
||
2679C6C9000
|
trusted library allocation
|
page read and write
|
||
26795DE6000
|
trusted library allocation
|
page read and write
|
||
267981DC000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
2679A263000
|
trusted library allocation
|
page read and write
|
||
267A316B000
|
trusted library allocation
|
page read and write
|
||
267981DF000
|
trusted library allocation
|
page read and write
|
||
2679B18B000
|
trusted library allocation
|
page read and write
|
||
26796D3B000
|
heap
|
page read and write
|
||
2679DBE2000
|
trusted library allocation
|
page read and write
|
||
1EC87D7D000
|
heap
|
page read and write
|
||
26797C64000
|
trusted library allocation
|
page read and write
|
||
26799C09000
|
heap
|
page read and write
|
||
26799951000
|
trusted library allocation
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
26799E5D000
|
trusted library allocation
|
page read and write
|
||
26796B15000
|
trusted library allocation
|
page read and write
|
||
26799885000
|
trusted library allocation
|
page read and write
|
||
2679B831000
|
trusted library allocation
|
page read and write
|
||
26799FF4000
|
trusted library allocation
|
page read and write
|
||
26795352000
|
trusted library allocation
|
page read and write
|
||
2679C5D2000
|
trusted library allocation
|
page read and write
|
||
2679DBE0000
|
trusted library allocation
|
page read and write
|
||
26799D3B000
|
trusted library allocation
|
page read and write
|
||
26796C96000
|
trusted library allocation
|
page read and write
|
||
26799FEE000
|
trusted library allocation
|
page read and write
|
||
267A4088000
|
trusted library allocation
|
page read and write
|
||
1EC881B6000
|
heap
|
page read and write
|
||
2679C4C2000
|
trusted library allocation
|
page read and write
|
||
2679BE2D000
|
trusted library allocation
|
page read and write
|
||
267A60CB000
|
trusted library allocation
|
page read and write
|
||
26796C31000
|
trusted library allocation
|
page read and write
|
||
2679BD8D000
|
trusted library allocation
|
page read and write
|
||
26799D51000
|
trusted library allocation
|
page read and write
|
||
1DB6B130000
|
heap
|
page read and write
|
||
26799DC7000
|
trusted library allocation
|
page read and write
|
||
2679BB8B000
|
trusted library allocation
|
page read and write
|
||
26797F81000
|
trusted library allocation
|
page read and write
|
||
2A17FFE000
|
stack
|
page read and write
|
||
2679DB8C000
|
trusted library allocation
|
page read and write
|
||
2679C582000
|
trusted library allocation
|
page read and write
|
||
267959F6000
|
trusted library allocation
|
page read and write
|
||
2679DBAD000
|
trusted library allocation
|
page read and write
|
||
267A38C5000
|
trusted library allocation
|
page read and write
|
||
2679B1D3000
|
trusted library allocation
|
page read and write
|
||
2679A263000
|
trusted library allocation
|
page read and write
|
||
2679989C000
|
trusted library allocation
|
page read and write
|
||
2679BCAB000
|
trusted library allocation
|
page read and write
|
||
267A3841000
|
trusted library allocation
|
page read and write
|
||
26799C1F000
|
heap
|
page read and write
|
||
2679B843000
|
trusted library allocation
|
page read and write
|
||
26796D51000
|
heap
|
page read and write
|
||
26797FCE000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
267A38E0000
|
trusted library allocation
|
page read and write
|
||
2679BABF000
|
trusted library allocation
|
page read and write
|
||
26796D30000
|
heap
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
26795DC6000
|
trusted library allocation
|
page read and write
|
||
2F6CBFE000
|
unkown
|
page readonly
|
||
267A38E9000
|
trusted library allocation
|
page read and write
|
||
1EC88164000
|
heap
|
page read and write
|
||
26799E82000
|
trusted library allocation
|
page read and write
|
||
2679B1DF000
|
trusted library allocation
|
page read and write
|
||
2679991A000
|
trusted library allocation
|
page read and write
|
||
6C709FE000
|
stack
|
page read and write
|
||
26799EFD000
|
trusted library allocation
|
page read and write
|
||
2679C5D6000
|
trusted library allocation
|
page read and write
|
||
21AD9EAB000
|
trusted library allocation
|
page read and write
|
||
1EC87423000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
2679A6CB000
|
trusted library allocation
|
page read and write
|
||
2679DB92000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
2679BFB4000
|
trusted library allocation
|
page read and write
|
||
2679C0D6000
|
trusted library allocation
|
page read and write
|
||
26796D46000
|
heap
|
page read and write
|
||
1EC87403000
|
trusted library allocation
|
page read and write
|
||
1EC87DF1000
|
heap
|
page read and write
|
||
26795DF4000
|
trusted library allocation
|
page read and write
|
||
2679BD87000
|
trusted library allocation
|
page read and write
|
||
1FE44400000
|
heap
|
page read and write
|
||
267A605A000
|
trusted library allocation
|
page read and write
|
||
2679C44B000
|
trusted library allocation
|
page read and write
|
||
2679DBE4000
|
trusted library allocation
|
page read and write
|
||
26796D84000
|
heap
|
page read and write
|
||
267A316D000
|
trusted library allocation
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
2679989E000
|
trusted library allocation
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
1EC87418000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
2679BEBF000
|
trusted library allocation
|
page read and write
|
||
2679DBDE000
|
trusted library allocation
|
page read and write
|
||
26796D7C000
|
heap
|
page read and write
|
||
267981D6000
|
trusted library allocation
|
page read and write
|
||
2679C48C000
|
trusted library allocation
|
page read and write
|
||
267973F0000
|
trusted library allocation
|
page read and write
|
||
2679A6FE000
|
trusted library allocation
|
page read and write
|
||
2679BCB3000
|
trusted library allocation
|
page read and write
|
||
2679AAF6000
|
trusted library allocation
|
page read and write
|
||
267981C0000
|
trusted library allocation
|
page read and write
|
||
267A35FD000
|
trusted library allocation
|
page read and write
|
||
2679C496000
|
trusted library allocation
|
page read and write
|
||
267972DE000
|
trusted library allocation
|
page read and write
|
||
26797FC1000
|
trusted library allocation
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
1EC8745C000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
2679BD83000
|
trusted library allocation
|
page read and write
|
||
2679A2FD000
|
trusted library allocation
|
page read and write
|
||
2679727A000
|
trusted library allocation
|
page read and write
|
||
26796D84000
|
heap
|
page read and write
|
||
1DB6B303000
|
trusted library allocation
|
page read and write
|
||
267A5EE3000
|
trusted library allocation
|
page read and write
|
||
2679BC71000
|
trusted library allocation
|
page read and write
|
||
267A3627000
|
trusted library allocation
|
page read and write
|
||
267A3AED000
|
trusted library allocation
|
page read and write
|
||
267A3159000
|
trusted library allocation
|
page read and write
|
||
26797FA3000
|
trusted library allocation
|
page read and write
|
||
1FE44707000
|
trusted library allocation
|
page read and write
|
||
2679BFF7000
|
trusted library allocation
|
page read and write
|
||
2679A2FB000
|
trusted library allocation
|
page read and write
|
||
26796D57000
|
heap
|
page read and write
|
||
267981DF000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
267A2C3D000
|
trusted library allocation
|
page read and write
|
||
26799C53000
|
heap
|
page read and write
|
||
267A60A4000
|
trusted library allocation
|
page read and write
|
||
26799DE8000
|
trusted library allocation
|
page read and write
|
||
267A38EB000
|
trusted library allocation
|
page read and write
|
||
267998D5000
|
trusted library allocation
|
page read and write
|
||
2679AD26000
|
trusted library allocation
|
page read and write
|
||
2679B8F8000
|
trusted library allocation
|
page read and write
|
||
26799C26000
|
heap
|
page read and write
|
||
1EC87DFC000
|
heap
|
page read and write
|
||
2679C094000
|
trusted library allocation
|
page read and write
|
||
26798178000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
1EC87DE8000
|
heap
|
page read and write
|
||
2679A074000
|
trusted library allocation
|
page read and write
|
||
2679BD81000
|
trusted library allocation
|
page read and write
|
||
26797D08000
|
trusted library allocation
|
page read and write
|
||
26799DC5000
|
trusted library allocation
|
page read and write
|
||
2679B863000
|
trusted library allocation
|
page read and write
|
||
2679C5AE000
|
trusted library allocation
|
page read and write
|
||
26796BF3000
|
trusted library allocation
|
page read and write
|
||
267A605C000
|
trusted library allocation
|
page read and write
|
||
26799FE0000
|
trusted library allocation
|
page read and write
|
||
99C7FE000
|
unkown
|
page readonly
|
||
267A56E1000
|
heap
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
267A5EAB000
|
trusted library allocation
|
page read and write
|
||
267A3697000
|
trusted library allocation
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
26797F9F000
|
trusted library allocation
|
page read and write
|
||
1DB6AF80000
|
unclassified section
|
page readonly
|
||
267A38FC000
|
trusted library allocation
|
page read and write
|
||
267A6023000
|
trusted library allocation
|
page read and write
|
||
21AD9E03000
|
trusted library allocation
|
page read and write
|
||
267A4090000
|
trusted library allocation
|
page read and write
|
||
267A2C6B000
|
trusted library allocation
|
page read and write
|
||
2679C351000
|
trusted library allocation
|
page read and write
|
||
2679BABF000
|
trusted library allocation
|
page read and write
|
||
26799934000
|
trusted library allocation
|
page read and write
|
||
2679C415000
|
trusted library allocation
|
page read and write
|
||
267A6023000
|
trusted library allocation
|
page read and write
|
||
26795DBD000
|
trusted library allocation
|
page read and write
|
||
26799FF4000
|
trusted library allocation
|
page read and write
|
||
26797FB1000
|
trusted library allocation
|
page read and write
|
||
2679B8CC000
|
trusted library allocation
|
page read and write
|
||
26798165000
|
trusted library allocation
|
page read and write
|
||
2679C59C000
|
trusted library allocation
|
page read and write
|
||
267A6023000
|
trusted library allocation
|
page read and write
|
||
267A2CCB000
|
trusted library allocation
|
page read and write
|
||
26796A41000
|
trusted library allocation
|
page read and write
|
||
2679699E000
|
trusted library allocation
|
page read and write
|
||
1EC87A23000
|
heap
|
page read and write
|
||
2679BD5D000
|
trusted library allocation
|
page read and write
|
||
1DB6B376000
|
trusted library allocation
|
page read and write
|
||
2679C697000
|
trusted library allocation
|
page read and write
|
||
2F6DDBE000
|
stack
|
page read and write
|
||
26798659000
|
trusted library allocation
|
page read and write
|
||
26795AF0000
|
trusted library allocation
|
page read and write
|
||
2679C08E000
|
trusted library allocation
|
page read and write
|
||
2679BEBB000
|
trusted library allocation
|
page read and write
|
||
99C6FE000
|
unkown
|
page readonly
|
||
26796D7A000
|
heap
|
page read and write
|
||
26796D39000
|
heap
|
page read and write
|
||
26797C98000
|
trusted library allocation
|
page read and write
|
||
2679B1DF000
|
trusted library allocation
|
page read and write
|
||
26796D51000
|
heap
|
page read and write
|
||
26799FFA000
|
trusted library allocation
|
page read and write
|
||
26797F6A000
|
trusted library allocation
|
page read and write
|
||
2679B881000
|
trusted library allocation
|
page read and write
|
||
26795A13000
|
trusted library allocation
|
page read and write
|
||
26795D63000
|
trusted library allocation
|
page read and write
|
||
267A605A000
|
trusted library allocation
|
page read and write
|
||
26796CDC000
|
trusted library allocation
|
page read and write
|
||
26796B87000
|
trusted library allocation
|
page read and write
|
||
2679BBF0000
|
trusted library allocation
|
page read and write
|
||
26796D5C000
|
heap
|
page read and write
|
||
26797286000
|
trusted library allocation
|
page read and write
|
||
541D000
|
stack
|
page read and write
|
||
26796D39000
|
heap
|
page read and write
|
||
2679699E000
|
trusted library allocation
|
page read and write
|
||
267A38E2000
|
trusted library allocation
|
page read and write
|
||
2679A08F000
|
trusted library allocation
|
page read and write
|
||
2679C456000
|
trusted library allocation
|
page read and write
|
||
26797C9F000
|
trusted library allocation
|
page read and write
|
||
26796D57000
|
heap
|
page read and write
|
||
267A389B000
|
trusted library allocation
|
page read and write
|
||
2679C092000
|
trusted library allocation
|
page read and write
|
||
267981D6000
|
trusted library allocation
|
page read and write
|
||
267A40A2000
|
trusted library allocation
|
page read and write
|
||
26799FE6000
|
trusted library allocation
|
page read and write
|
||
267954B5000
|
trusted library allocation
|
page read and write
|
||
26796D5C000
|
heap
|
page read and write
|
||
26796BFA000
|
trusted library allocation
|
page read and write
|
||
2679C3EE000
|
trusted library allocation
|
page read and write
|
||
26797C9F000
|
trusted library allocation
|
page read and write
|
||
17F9D2F0000
|
heap
|
page read and write
|
||
26796D7A000
|
heap
|
page read and write
|
||
2679C063000
|
trusted library allocation
|
page read and write
|
||
267A2C93000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
2679C055000
|
trusted library allocation
|
page read and write
|
||
26799FF0000
|
trusted library allocation
|
page read and write
|
||
267A60B9000
|
trusted library allocation
|
page read and write
|
||
2679BD5A000
|
trusted library allocation
|
page read and write
|
||
26796D80000
|
heap
|
page read and write
|
||
1EC87D01000
|
heap
|
page read and write
|
||
2679BC71000
|
trusted library allocation
|
page read and write
|
||
267A2C3C000
|
trusted library allocation
|
page read and write
|
||
26799C09000
|
heap
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
26799835000
|
trusted library allocation
|
page read and write
|
||
2679BE07000
|
trusted library allocation
|
page read and write
|
||
2679BFC7000
|
trusted library allocation
|
page read and write
|
||
267A3DCC000
|
trusted library allocation
|
page read and write
|
||
2679BE32000
|
trusted library allocation
|
page read and write
|
||
1DB6B3F6000
|
trusted library allocation
|
page read and write
|
||
267A2C66000
|
trusted library allocation
|
page read and write
|
||
26796B3A000
|
trusted library allocation
|
page read and write
|
||
26799C53000
|
heap
|
page read and write
|
||
26799FF0000
|
trusted library allocation
|
page read and write
|
||
267A313A000
|
trusted library allocation
|
page read and write
|
||
2679C5D0000
|
trusted library allocation
|
page read and write
|
||
26799C09000
|
heap
|
page read and write
|
||
2679DBE4000
|
trusted library allocation
|
page read and write
|
||
267A3882000
|
trusted library allocation
|
page read and write
|
||
26799C53000
|
heap
|
page read and write
|
||
2679A070000
|
trusted library allocation
|
page read and write
|
||
1EC873E8000
|
unkown
|
page execute read
|
||
2679AAC3000
|
trusted library allocation
|
page read and write
|
||
26799FE6000
|
trusted library allocation
|
page read and write
|
||
26799D8C000
|
trusted library allocation
|
page read and write
|
||
17F9D160000
|
heap
|
page read and write
|
||
2679C4AC000
|
trusted library allocation
|
page read and write
|
||
267A60A1000
|
trusted library allocation
|
page read and write
|
||
2679869E000
|
trusted library allocation
|
page read and write
|
||
2679ADD8000
|
trusted library allocation
|
page read and write
|
||
26797F8A000
|
trusted library allocation
|
page read and write
|
||
267A605C000
|
trusted library allocation
|
page read and write
|
||
26796D53000
|
heap
|
page read and write
|
||
21AD9EE9000
|
trusted library allocation
|
page read and write
|
||
2679C6A4000
|
trusted library allocation
|
page read and write
|
||
26796D39000
|
heap
|
page read and write
|
||
267A3DE6000
|
trusted library allocation
|
page read and write
|
||
2679819A000
|
trusted library allocation
|
page read and write
|
||
267A2C93000
|
trusted library allocation
|
page read and write
|
||
267986A1000
|
trusted library allocation
|
page read and write
|
||
267954F1000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
26799D35000
|
trusted library allocation
|
page read and write
|
||
2679735F000
|
trusted library allocation
|
page read and write
|
||
26799EF9000
|
trusted library allocation
|
page read and write
|
||
26797356000
|
trusted library allocation
|
page read and write
|
||
17F9D300000
|
trusted library allocation
|
page read and write
|
||
26797C77000
|
trusted library allocation
|
page read and write
|
||
26799E5D000
|
trusted library allocation
|
page read and write
|
||
267A38A4000
|
trusted library allocation
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
26797C81000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
267A60CB000
|
trusted library allocation
|
page read and write
|
||
26797310000
|
trusted library allocation
|
page read and write
|
||
2679BDFD000
|
trusted library allocation
|
page read and write
|
||
2679819A000
|
trusted library allocation
|
page read and write
|
||
267A3D99000
|
trusted library allocation
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
267954AD000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
26796D3C000
|
heap
|
page read and write
|
||
26799D1F000
|
trusted library allocation
|
page read and write
|
||
26796B9E000
|
trusted library allocation
|
page read and write
|
||
26799FF0000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
26799D70000
|
trusted library allocation
|
page read and write
|
||
2679C575000
|
trusted library allocation
|
page read and write
|
||
2679DBEA000
|
trusted library allocation
|
page read and write
|
||
267A3DCC000
|
trusted library allocation
|
page read and write
|
||
267A40C5000
|
trusted library allocation
|
page read and write
|
||
2679D0DE000
|
trusted library allocation
|
page read and write
|
||
2A177FB000
|
stack
|
page read and write
|
||
2679B8CC000
|
trusted library allocation
|
page read and write
|
||
267A6023000
|
trusted library allocation
|
page read and write
|
||
267A40A2000
|
trusted library allocation
|
page read and write
|
||
6C712BE000
|
stack
|
page read and write
|
||
1EC87DE0000
|
heap
|
page read and write
|
||
2F6D57E000
|
stack
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
26795DCD000
|
trusted library allocation
|
page read and write
|
||
22D6000
|
heap
|
page read and write
|
||
2679BBE6000
|
trusted library allocation
|
page read and write
|
||
267A2C7C000
|
trusted library allocation
|
page read and write
|
||
2679DBEC000
|
trusted library allocation
|
page read and write
|
||
2679C0CF000
|
trusted library allocation
|
page read and write
|
||
2679C69E000
|
trusted library allocation
|
page read and write
|
||
2679BDCE000
|
trusted library allocation
|
page read and write
|
||
2679D0D4000
|
trusted library allocation
|
page read and write
|
||
2679B184000
|
trusted library allocation
|
page read and write
|
||
2679A2D7000
|
trusted library allocation
|
page read and write
|
||
26796D3D000
|
heap
|
page read and write
|
||
1FE44600000
|
trusted library allocation
|
page read and write
|
||
2679B8CC000
|
trusted library allocation
|
page read and write
|
||
1EC873D7000
|
unkown
|
page execute read
|
||
2679C6E2000
|
trusted library allocation
|
page read and write
|
||
2679B8E4000
|
trusted library allocation
|
page read and write
|
||
267A39E4000
|
trusted library allocation
|
page read and write
|
||
267A35DB000
|
trusted library allocation
|
page read and write
|
||
4FDF000
|
stack
|
page read and write
|
||
26796CC1000
|
trusted library allocation
|
page read and write
|
||
267A2CF3000
|
trusted library allocation
|
page read and write
|
||
2679C445000
|
trusted library allocation
|
page read and write
|
||
2679C0DB000
|
trusted library allocation
|
page read and write
|
||
267953C6000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
2679C496000
|
trusted library allocation
|
page read and write
|
||
26799FF0000
|
trusted library allocation
|
page read and write
|
||
2679C48C000
|
trusted library allocation
|
page read and write
|
||
267A62E9000
|
trusted library allocation
|
page read and write
|
||
2679C41E000
|
trusted library allocation
|
page read and write
|
||
2679ADFD000
|
trusted library allocation
|
page read and write
|
||
1EC870F0000
|
heap
|
page read and write
|
||
26797FAE000
|
trusted library allocation
|
page read and write
|
||
2679BDF6000
|
trusted library allocation
|
page read and write
|
||
26797FDB000
|
trusted library allocation
|
page read and write
|
||
2679BCAB000
|
trusted library allocation
|
page read and write
|
||
2679A6BF000
|
trusted library allocation
|
page read and write
|
||
267A362F000
|
trusted library allocation
|
page read and write
|
||
267A3D47000
|
trusted library allocation
|
page read and write
|
||
2679DBAD000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
1FE44420000
|
heap
|
page read and write
|
||
26797FB3000
|
trusted library allocation
|
page read and write
|
||
1EC870FA000
|
heap
|
page read and write
|
||
2679D07C000
|
trusted library allocation
|
page read and write
|
||
2F6DE7E000
|
unkown
|
page readonly
|
||
2679A074000
|
trusted library allocation
|
page read and write
|
||
267A3D47000
|
trusted library allocation
|
page read and write
|
||
1FE44440000
|
heap
|
page read and write
|
||
2679B168000
|
trusted library allocation
|
page read and write
|
||
2679C68A000
|
trusted library allocation
|
page read and write
|
||
26796BDA000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
2679A0F1000
|
trusted library allocation
|
page read and write
|
||
26797F60000
|
trusted library allocation
|
page read and write
|
||
267A38D4000
|
trusted library allocation
|
page read and write
|
||
26796D7C000
|
heap
|
page read and write
|
||
267A3DF1000
|
trusted library allocation
|
page read and write
|
||
26796D48000
|
heap
|
page read and write
|
||
26799D3E000
|
trusted library allocation
|
page read and write
|
||
267A3AED000
|
trusted library allocation
|
page read and write
|
||
21ADA032000
|
trusted library allocation
|
page read and write
|
||
267A3D47000
|
trusted library allocation
|
page read and write
|
||
99C77E000
|
unkown
|
page readonly
|
||
26796D41000
|
heap
|
page read and write
|
||
26795DD4000
|
trusted library allocation
|
page read and write
|
||
26797C98000
|
trusted library allocation
|
page read and write
|
||
2679B863000
|
trusted library allocation
|
page read and write
|
||
2679C52D000
|
trusted library allocation
|
page read and write
|
||
2679D04F000
|
trusted library allocation
|
page read and write
|
||
26796CBE000
|
trusted library allocation
|
page read and write
|
||
26796D2B000
|
heap
|
page read and write
|
||
1EC88181000
|
heap
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
26795398000
|
trusted library allocation
|
page read and write
|
||
26797FD5000
|
trusted library allocation
|
page read and write
|
||
26799FE6000
|
trusted library allocation
|
page read and write
|
||
26796D48000
|
heap
|
page read and write
|
||
26799942000
|
trusted library allocation
|
page read and write
|
||
267A2CFE000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
2679C4BF000
|
trusted library allocation
|
page read and write
|
||
267A56E1000
|
heap
|
page read and write
|
||
1EC881A9000
|
heap
|
page read and write
|
||
26797FFE000
|
trusted library allocation
|
page read and write
|
||
26796D3A000
|
heap
|
page read and write
|
||
2679D07E000
|
trusted library allocation
|
page read and write
|
||
26796A79000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
1DB6B4B4000
|
heap
|
page read and write
|
||
26795B00000
|
trusted library allocation
|
page read and write
|
||
2679A070000
|
trusted library allocation
|
page read and write
|
||
2679D06F000
|
trusted library allocation
|
page read and write
|
||
1EC87DF1000
|
heap
|
page read and write
|
||
2679BE24000
|
trusted library allocation
|
page read and write
|
||
26796D80000
|
heap
|
page read and write
|
||
267981EE000
|
trusted library allocation
|
page read and write
|
||
26796D51000
|
heap
|
page read and write
|
||
1FE44700000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
2679DC3C000
|
trusted library allocation
|
page read and write
|
||
26797232000
|
trusted library allocation
|
page read and write
|
||
26796A49000
|
trusted library allocation
|
page read and write
|
||
2679BE07000
|
trusted library allocation
|
page read and write
|
||
21AD9E7E000
|
trusted library allocation
|
page read and write
|
||
267A5716000
|
heap
|
page read and write
|
||
26796B73000
|
trusted library allocation
|
page read and write
|
||
2679987E000
|
trusted library allocation
|
page read and write
|
||
267A38E0000
|
trusted library allocation
|
page read and write
|
||
26796D41000
|
heap
|
page read and write
|
||
2679ADFC000
|
trusted library allocation
|
page read and write
|
||
26799C25000
|
heap
|
page read and write
|
||
2679C55D000
|
trusted library allocation
|
page read and write
|
||
267A395C000
|
trusted library allocation
|
page read and write
|
||
26796CA1000
|
trusted library allocation
|
page read and write
|
||
26797C98000
|
trusted library allocation
|
page read and write
|
||
26796D33000
|
heap
|
page read and write
|
||
9A027E000
|
stack
|
page read and write
|
||
1B0FC3C1E000
|
trusted library allocation
|
page read and write
|
||
26799FF0000
|
trusted library allocation
|
page read and write
|
||
2679993E000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
501C000
|
stack
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
267A39D4000
|
trusted library allocation
|
page read and write
|
||
2679DBAD000
|
trusted library allocation
|
page read and write
|
||
2679BE2D000
|
trusted library allocation
|
page read and write
|
||
2F6CC3C000
|
stack
|
page read and write
|
||
26796D3B000
|
heap
|
page read and write
|
||
2679BA88000
|
trusted library allocation
|
page read and write
|
||
26799D19000
|
trusted library allocation
|
page read and write
|
||
26799FF0000
|
trusted library allocation
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
2679817B000
|
trusted library allocation
|
page read and write
|
||
26799C0B000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
2679B1D3000
|
trusted library allocation
|
page read and write
|
||
267973C7000
|
trusted library allocation
|
page read and write
|
||
2679BDC9000
|
trusted library allocation
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
6B79B1E000
|
trusted library allocation
|
page read and write
|
||
267A2CF6000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
26797F72000
|
trusted library allocation
|
page read and write
|
||
267A6068000
|
trusted library allocation
|
page read and write
|
||
2F6F67E000
|
stack
|
page read and write
|
||
2679C67D000
|
trusted library allocation
|
page read and write
|
||
267A35DB000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
2679C684000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
26797CC8000
|
trusted library allocation
|
page read and write
|
||
21AD9E79000
|
trusted library allocation
|
page read and write
|
||
1EC87050000
|
unclassified section
|
page readonly
|
||
26799C26000
|
heap
|
page read and write
|
||
26796BC6000
|
trusted library allocation
|
page read and write
|
||
267A3169000
|
trusted library allocation
|
page read and write
|
||
26796D2B000
|
heap
|
page read and write
|
||
26797F4A000
|
trusted library allocation
|
page read and write
|
||
2679A2FB000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
1EC873F0000
|
trusted library allocation
|
page read and write
|
||
267972AD000
|
trusted library allocation
|
page read and write
|
||
26799942000
|
trusted library allocation
|
page read and write
|
||
267986FC000
|
trusted library allocation
|
page read and write
|
||
26796D46000
|
heap
|
page read and write
|
||
1EC881B6000
|
heap
|
page read and write
|
||
2679C44B000
|
trusted library allocation
|
page read and write
|
||
2679BE92000
|
trusted library allocation
|
page read and write
|
||
2679C4F7000
|
trusted library allocation
|
page read and write
|
||
2679BE27000
|
trusted library allocation
|
page read and write
|
||
267972E5000
|
trusted library allocation
|
page read and write
|
||
267973F8000
|
trusted library allocation
|
page read and write
|
||
267A60B9000
|
trusted library allocation
|
page read and write
|
||
26799896000
|
trusted library allocation
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
2679BE3C000
|
trusted library allocation
|
page read and write
|
||
26796BFC000
|
trusted library allocation
|
page read and write
|
||
267A6023000
|
trusted library allocation
|
page read and write
|
||
26799FC3000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
21AD9E60000
|
trusted library allocation
|
page read and write
|
||
1EC8704D000
|
remote allocation
|
page execute read
|
||
2679DBDE000
|
trusted library allocation
|
page read and write
|
||
267A2C6E000
|
trusted library allocation
|
page read and write
|
||
267973F1000
|
trusted library allocation
|
page read and write
|
||
26796D2B000
|
heap
|
page read and write
|
||
2679C0F6000
|
trusted library allocation
|
page read and write
|
||
2679C6E0000
|
trusted library allocation
|
page read and write
|
||
267A38F5000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
2679D096000
|
trusted library allocation
|
page read and write
|
||
2679BA31000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
2679A263000
|
trusted library allocation
|
page read and write
|
||
26797FCF000
|
trusted library allocation
|
page read and write
|
||
2679C0EB000
|
trusted library allocation
|
page read and write
|
||
2679B873000
|
trusted library allocation
|
page read and write
|
||
26796D57000
|
heap
|
page read and write
|
||
2679B18B000
|
trusted library allocation
|
page read and write
|
||
2679C0F3000
|
trusted library allocation
|
page read and write
|
||
2679C6E9000
|
trusted library allocation
|
page read and write
|
||
26797294000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
1DB6B35D000
|
trusted library allocation
|
page read and write
|
||
1DB6B349000
|
trusted library allocation
|
page read and write
|
||
2679C35F000
|
trusted library allocation
|
page read and write
|
||
267A388B000
|
trusted library allocation
|
page read and write
|
||
2679B84B000
|
trusted library allocation
|
page read and write
|
||
2679C6F6000
|
trusted library allocation
|
page read and write
|
||
2679C096000
|
trusted library allocation
|
page read and write
|
||
267A36F2000
|
trusted library allocation
|
page read and write
|
||
2679BD5A000
|
trusted library allocation
|
page read and write
|
||
2679B871000
|
trusted library allocation
|
page read and write
|
||
2679BE79000
|
trusted library allocation
|
page read and write
|
||
26796CDC000
|
trusted library allocation
|
page read and write
|
||
2679C63A000
|
trusted library allocation
|
page read and write
|
||
267A35C6000
|
trusted library allocation
|
page read and write
|
||
2679BE3C000
|
trusted library allocation
|
page read and write
|
||
1EC881B6000
|
heap
|
page read and write
|
||
267A315F000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
267A38D4000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
267A39AA000
|
trusted library allocation
|
page read and write
|
||
26797C9F000
|
trusted library allocation
|
page read and write
|
||
26796D3B000
|
heap
|
page read and write
|
||
26797F8A000
|
trusted library allocation
|
page read and write
|
||
26796D2E000
|
heap
|
page read and write
|
||
26796D33000
|
heap
|
page read and write
|
||
267A2C80000
|
trusted library allocation
|
page read and write
|
||
26796BC2000
|
trusted library allocation
|
page read and write
|
||
21AD9A10000
|
unclassified section
|
page readonly
|
||
267A35B1000
|
trusted library allocation
|
page read and write
|
||
26797233000
|
trusted library allocation
|
page read and write
|
||
21AD9C44000
|
heap
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
2679C5BA000
|
trusted library allocation
|
page read and write
|
||
267A2C35000
|
trusted library allocation
|
page read and write
|
||
2679B83A000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
26795DF4000
|
trusted library allocation
|
page read and write
|
||
2679D01A000
|
trusted library allocation
|
page read and write
|
||
26796A79000
|
trusted library allocation
|
page read and write
|
||
2679A2E2000
|
trusted library allocation
|
page read and write
|
||
2679BCAB000
|
trusted library allocation
|
page read and write
|
||
267A3582000
|
trusted library allocation
|
page read and write
|
||
1EC87DB9000
|
heap
|
page read and write
|
||
26796B97000
|
trusted library allocation
|
page read and write
|
||
26797232000
|
trusted library allocation
|
page read and write
|
||
2679BE79000
|
trusted library allocation
|
page read and write
|
||
26797C98000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
26799D35000
|
trusted library allocation
|
page read and write
|
||
267A39E4000
|
trusted library allocation
|
page read and write
|
||
267A523D000
|
trusted library allocation
|
page read and write
|
||
26799FA7000
|
trusted library allocation
|
page read and write
|
||
2679819A000
|
trusted library allocation
|
page read and write
|
||
26795DF4000
|
trusted library allocation
|
page read and write
|
||
26795DBD000
|
trusted library allocation
|
page read and write
|
||
1014000
|
unkown
|
page readonly
|
||
2679AAFA000
|
trusted library allocation
|
page read and write
|
||
2679A6BF000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
26797363000
|
trusted library allocation
|
page read and write
|
||
26796B78000
|
trusted library allocation
|
page read and write
|
||
21ADA00F000
|
trusted library allocation
|
page read and write
|
||
2679800A000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
267A2C7D000
|
trusted library allocation
|
page read and write
|
||
1EC87DEB000
|
heap
|
page read and write
|
||
26798189000
|
trusted library allocation
|
page read and write
|
||
2679A6B3000
|
trusted library allocation
|
page read and write
|
||
1DB6B330000
|
trusted library allocation
|
page read and write
|
||
28E8BA51000
|
trusted library allocation
|
page execute read
|
||
26796D32000
|
heap
|
page read and write
|
||
26796D54000
|
heap
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
21AD9E47000
|
trusted library allocation
|
page read and write
|
||
26796D39000
|
heap
|
page read and write
|
||
267A384A000
|
trusted library allocation
|
page read and write
|
||
267A40B9000
|
trusted library allocation
|
page read and write
|
||
267A38EE000
|
trusted library allocation
|
page read and write
|
||
26795D25000
|
trusted library allocation
|
page read and write
|
||
267969E7000
|
trusted library allocation
|
page read and write
|
||
2679BBF6000
|
trusted library allocation
|
page read and write
|
||
2679D0DC000
|
trusted library allocation
|
page read and write
|
||
267981D6000
|
trusted library allocation
|
page read and write
|
||
2679C625000
|
trusted library allocation
|
page read and write
|
||
267A313D000
|
trusted library allocation
|
page read and write
|
||
26797FC1000
|
trusted library allocation
|
page read and write
|
||
26799DC8000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
2679BCCD000
|
trusted library allocation
|
page read and write
|
||
2679DBE8000
|
trusted library allocation
|
page read and write
|
||
267A5DDA000
|
trusted library allocation
|
page read and write
|
||
1FE444B9000
|
heap
|
page read and write
|
||
26799DFD000
|
trusted library allocation
|
page read and write
|
||
2679C450000
|
trusted library allocation
|
page read and write
|
||
267973F6000
|
trusted library allocation
|
page read and write
|
||
2679987E000
|
trusted library allocation
|
page read and write
|
||
26797C98000
|
trusted library allocation
|
page read and write
|
||
267A5244000
|
trusted library allocation
|
page read and write
|
||
267A2C3D000
|
trusted library allocation
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
1DB6B387000
|
trusted library allocation
|
page read and write
|
||
267A3D3B000
|
trusted library allocation
|
page read and write
|
||
267A38EE000
|
trusted library allocation
|
page read and write
|
||
26797C4D000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
2679B18B000
|
trusted library allocation
|
page read and write
|
||
2679AABB000
|
trusted library allocation
|
page read and write
|
||
2F6CD7E000
|
unkown
|
page readonly
|
||
2679C6A4000
|
trusted library allocation
|
page read and write
|
||
2679C571000
|
trusted library allocation
|
page read and write
|
||
26795DB2000
|
trusted library allocation
|
page read and write
|
||
26797F8F000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
267A39FE000
|
trusted library allocation
|
page read and write
|
||
267A39E7000
|
trusted library allocation
|
page read and write
|
||
2679AAB8000
|
trusted library allocation
|
page read and write
|
||
267A573C000
|
heap
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
2679C090000
|
trusted library allocation
|
page read and write
|
||
267A3DCC000
|
trusted library allocation
|
page read and write
|
||
267998D5000
|
trusted library allocation
|
page read and write
|
||
2679AAFE000
|
trusted library allocation
|
page read and write
|
||
2679C528000
|
trusted library allocation
|
page read and write
|
||
21AD9E23000
|
trusted library allocation
|
page read and write
|
||
26799892000
|
trusted library allocation
|
page read and write
|
||
2679C0F6000
|
trusted library allocation
|
page read and write
|
||
267A3654000
|
trusted library allocation
|
page read and write
|
||
2679C59C000
|
trusted library allocation
|
page read and write
|
||
26795D12000
|
trusted library allocation
|
page read and write
|
||
2679A0A4000
|
trusted library allocation
|
page read and write
|
||
2679B1A4000
|
trusted library allocation
|
page read and write
|
||
2679BE2D000
|
trusted library allocation
|
page read and write
|
||
2679D080000
|
trusted library allocation
|
page read and write
|
||
2679AAF0000
|
trusted library allocation
|
page read and write
|
||
1EC87448000
|
trusted library allocation
|
page read and write
|
||
2679B168000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
267A38E6000
|
trusted library allocation
|
page read and write
|
||
F40000
|
unkown
|
page readonly
|
||
26796D33000
|
heap
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
26796B9E000
|
trusted library allocation
|
page read and write
|
||
267955F1000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
2679DBEA000
|
trusted library allocation
|
page read and write
|
||
26797C9F000
|
trusted library allocation
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
1EC874FE000
|
trusted library allocation
|
page read and write
|
||
267A60A1000
|
trusted library allocation
|
page read and write
|
||
267A2CD2000
|
trusted library allocation
|
page read and write
|
||
26797F4A000
|
trusted library allocation
|
page read and write
|
||
2679C664000
|
trusted library allocation
|
page read and write
|
||
21AD9C10000
|
heap
|
page read and write
|
||
26796D3A000
|
heap
|
page read and write
|
||
267A35C6000
|
trusted library allocation
|
page read and write
|
||
267972AC000
|
trusted library allocation
|
page read and write
|
||
26797FAE000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
26795388000
|
trusted library allocation
|
page read and write
|
||
2679C490000
|
trusted library allocation
|
page read and write
|
||
267A3148000
|
trusted library allocation
|
page read and write
|
||
2679BE2D000
|
trusted library allocation
|
page read and write
|
||
26796D3B000
|
heap
|
page read and write
|
||
26796D39000
|
heap
|
page read and write
|
||
267A3960000
|
trusted library allocation
|
page read and write
|
||
26796D33000
|
heap
|
page read and write
|
||
2679C4FC000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
26797263000
|
trusted library allocation
|
page read and write
|
||
267A56E1000
|
heap
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
26796D2A000
|
heap
|
page read and write
|
||
267A605C000
|
trusted library allocation
|
page read and write
|
||
17F9EDAE000
|
heap
|
page read and write
|
||
26799C31000
|
heap
|
page read and write
|
||
26797FA7000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
1EC8745F000
|
trusted library allocation
|
page read and write
|
||
26799D53000
|
trusted library allocation
|
page read and write
|
||
267A3DE9000
|
trusted library allocation
|
page read and write
|
||
26799DE8000
|
trusted library allocation
|
page read and write
|
||
13EF000
|
stack
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
26796D5A000
|
heap
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
26796BDA000
|
trusted library allocation
|
page read and write
|
||
2679C5A9000
|
trusted library allocation
|
page read and write
|
||
2679C0BF000
|
trusted library allocation
|
page read and write
|
||
26797FB1000
|
trusted library allocation
|
page read and write
|
||
2679AAFA000
|
trusted library allocation
|
page read and write
|
||
267953DF000
|
trusted library allocation
|
page read and write
|
||
26796A5D000
|
trusted library allocation
|
page read and write
|
||
21AD9C90000
|
heap
|
page read and write
|
||
267A60A4000
|
trusted library allocation
|
page read and write
|
||
26795468000
|
trusted library allocation
|
page read and write
|
||
26796D5A000
|
heap
|
page read and write
|
||
1EC87A00000
|
heap
|
page read and write
|
||
2679BAAB000
|
trusted library allocation
|
page read and write
|
||
21AD9C80000
|
unclassified section
|
page read and write
|
||
26797F8E000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
2679C0B0000
|
trusted library allocation
|
page read and write
|
||
2679B171000
|
trusted library allocation
|
page read and write
|
||
2679988C000
|
trusted library allocation
|
page read and write
|
||
26795DB2000
|
trusted library allocation
|
page read and write
|
||
26795AF0000
|
trusted library allocation
|
page read and write
|
||
267A2C2F000
|
trusted library allocation
|
page read and write
|
||
26797F7B000
|
trusted library allocation
|
page read and write
|
||
1EC86FE0000
|
unclassified section
|
page readonly
|
||
1FE444B0000
|
heap
|
page read and write
|
||
267A38EB000
|
trusted library allocation
|
page read and write
|
||
267981C7000
|
trusted library allocation
|
page read and write
|
||
267A2C20000
|
trusted library allocation
|
page read and write
|
||
2679D0E2000
|
trusted library allocation
|
page read and write
|
||
2679A2C5000
|
trusted library allocation
|
page read and write
|
||
26797F60000
|
trusted library allocation
|
page read and write
|
||
26797FDE000
|
trusted library allocation
|
page read and write
|
||
26795AB6000
|
trusted library allocation
|
page read and write
|
||
2679A2E4000
|
trusted library allocation
|
page read and write
|
||
26796D84000
|
heap
|
page read and write
|
||
2679DBFE000
|
trusted library allocation
|
page read and write
|
||
2679A2C7000
|
trusted library allocation
|
page read and write
|
||
26799949000
|
trusted library allocation
|
page read and write
|
||
26796A99000
|
trusted library allocation
|
page read and write
|
||
26796D41000
|
heap
|
page read and write
|
||
26796D57000
|
heap
|
page read and write
|
||
267A39F1000
|
trusted library allocation
|
page read and write
|
||
6C712FE000
|
unkown
|
page readonly
|
||
26796A3B000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
26797C81000
|
trusted library allocation
|
page read and write
|
||
2F6FE7E000
|
unkown
|
page readonly
|
||
26796D29000
|
heap
|
page read and write
|
||
1DB6B110000
|
heap
|
page read and write
|
||
2679C445000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
2679C5B8000
|
trusted library allocation
|
page read and write
|
||
267A3DA1000
|
trusted library allocation
|
page read and write
|
||
26795DF9000
|
trusted library allocation
|
page read and write
|
||
2679C100000
|
trusted library allocation
|
page read and write
|
||
26798150000
|
trusted library allocation
|
page read and write
|
||
2679C0FA000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
267A387B000
|
trusted library allocation
|
page read and write
|
||
26796B89000
|
trusted library allocation
|
page read and write
|
||
267986BD000
|
trusted library allocation
|
page read and write
|
||
1EC8742F000
|
trusted library allocation
|
page read and write
|
||
2679B1B7000
|
trusted library allocation
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
2679C6BB000
|
trusted library allocation
|
page read and write
|
||
1DB6B200000
|
trusted library allocation
|
page read and write
|
||
26796D4A000
|
heap
|
page read and write
|
||
100C000
|
unkown
|
page write copy
|
||
2679C5AE000
|
trusted library allocation
|
page read and write
|
||
26799DB6000
|
trusted library allocation
|
page read and write
|
||
2679C561000
|
trusted library allocation
|
page read and write
|
||
26796D57000
|
heap
|
page read and write
|
||
2679B841000
|
trusted library allocation
|
page read and write
|
||
26796D84000
|
heap
|
page read and write
|
||
267A2C10000
|
trusted library allocation
|
page read and write
|
||
267A38E0000
|
trusted library allocation
|
page read and write
|
||
267A312D000
|
trusted library allocation
|
page read and write
|
||
1523000
|
heap
|
page read and write
|
||
26796D3B000
|
heap
|
page read and write
|
||
26795381000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
267A2CEB000
|
trusted library allocation
|
page read and write
|
||
2679BE92000
|
trusted library allocation
|
page read and write
|
||
1EC8817B000
|
heap
|
page read and write
|
||
2679BE07000
|
trusted library allocation
|
page read and write
|
||
2679BE32000
|
trusted library allocation
|
page read and write
|
||
1EC86FD0000
|
unclassified section
|
page readonly
|
||
267A3DE9000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
26797F81000
|
trusted library allocation
|
page read and write
|
||
26797FB1000
|
trusted library allocation
|
page read and write
|
||
267A36FC000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
26797388000
|
trusted library allocation
|
page read and write
|
||
26796D2B000
|
heap
|
page read and write
|
||
26796D24000
|
heap
|
page read and write
|
||
26797239000
|
trusted library allocation
|
page read and write
|
||
2679C3F4000
|
trusted library allocation
|
page read and write
|
||
26796D3D000
|
heap
|
page read and write
|
||
26799FE6000
|
trusted library allocation
|
page read and write
|
||
2679C59C000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
26795D1C000
|
trusted library allocation
|
page read and write
|
||
26796D35000
|
heap
|
page read and write
|
||
2679C580000
|
trusted library allocation
|
page read and write
|
||
267998D9000
|
trusted library allocation
|
page read and write
|
||
2679B16E000
|
trusted library allocation
|
page read and write
|
||
267972FE000
|
trusted library allocation
|
page read and write
|
||
267A572D000
|
heap
|
page read and write
|
||
267972E5000
|
trusted library allocation
|
page read and write
|
||
26797F7B000
|
trusted library allocation
|
page read and write
|
||
267A3128000
|
trusted library allocation
|
page read and write
|
||
26797F94000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
2679C5A4000
|
trusted library allocation
|
page read and write
|
||
26799FF4000
|
trusted library allocation
|
page read and write
|
||
2679BDC9000
|
trusted library allocation
|
page read and write
|
||
2679985E000
|
trusted library allocation
|
page read and write
|
||
2679BE88000
|
trusted library allocation
|
page read and write
|
||
267A39FE000
|
trusted library allocation
|
page read and write
|
||
26797390000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
2679C3E5000
|
trusted library allocation
|
page read and write
|
||
267A3D58000
|
trusted library allocation
|
page read and write
|
||
267A3AFD000
|
trusted library allocation
|
page read and write
|
||
26797FB1000
|
trusted library allocation
|
page read and write
|
||
26799FE0000
|
trusted library allocation
|
page read and write
|
||
267A3A97000
|
trusted library allocation
|
page read and write
|
||
26799949000
|
trusted library allocation
|
page read and write
|
||
267A38BB000
|
trusted library allocation
|
page read and write
|
||
2679DC3F000
|
trusted library allocation
|
page read and write
|
||
2679C490000
|
trusted library allocation
|
page read and write
|
||
2679BEB2000
|
trusted library allocation
|
page read and write
|
||
26799C53000
|
heap
|
page read and write
|
||
267973FB000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
267A2C79000
|
trusted library allocation
|
page read and write
|
||
26799DC5000
|
trusted library allocation
|
page read and write
|
||
267A3AFD000
|
trusted library allocation
|
page read and write
|
||
2679BEBF000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
2679A6A2000
|
trusted library allocation
|
page read and write
|
||
17F9D470000
|
heap
|
page read and write
|
||
1EC881B6000
|
heap
|
page read and write
|
||
26799C53000
|
heap
|
page read and write
|
||
26796D3B000
|
heap
|
page read and write
|
||
2679C47E000
|
trusted library allocation
|
page read and write
|
||
2679C5DC000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
267954A3000
|
trusted library allocation
|
page read and write
|
||
267A2C5A000
|
trusted library allocation
|
page read and write
|
||
26796D48000
|
heap
|
page read and write
|
||
2679988C000
|
trusted library allocation
|
page read and write
|
||
267A522F000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
26796D39000
|
heap
|
page read and write
|
||
2679BCF7000
|
trusted library allocation
|
page read and write
|
||
26796D2B000
|
heap
|
page read and write
|
||
2679BFF1000
|
trusted library allocation
|
page read and write
|
||
2679B8CC000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
26796D84000
|
heap
|
page read and write
|
||
2679B8CC000
|
trusted library allocation
|
page read and write
|
||
26797F5F000
|
trusted library allocation
|
page read and write
|
||
26796CEB000
|
trusted library allocation
|
page read and write
|
||
2679C35D000
|
trusted library allocation
|
page read and write
|
||
2679C5BA000
|
trusted library allocation
|
page read and write
|
||
267A2CF1000
|
trusted library allocation
|
page read and write
|
||
2679BEAF000
|
trusted library allocation
|
page read and write
|
||
2679BC7D000
|
trusted library allocation
|
page read and write
|
||
267A3A8D000
|
trusted library allocation
|
page read and write
|
||
26799FF4000
|
trusted library allocation
|
page read and write
|
||
267A3989000
|
trusted library allocation
|
page read and write
|
||
2679D063000
|
trusted library allocation
|
page read and write
|
||
26795DBD000
|
trusted library allocation
|
page read and write
|
||
26795463000
|
trusted library allocation
|
page read and write
|
||
1EC87D7F000
|
heap
|
page read and write
|
||
26796D3D000
|
heap
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
2679A2E4000
|
trusted library allocation
|
page read and write
|
||
26799DD8000
|
trusted library allocation
|
page read and write
|
||
26796D5A000
|
heap
|
page read and write
|
||
26796D51000
|
heap
|
page read and write
|
||
21ADA102000
|
heap
|
page read and write
|
||
21AD9E64000
|
trusted library allocation
|
page read and write
|
||
2679B1AA000
|
trusted library allocation
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
2679D0E0000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
21AD9E73000
|
trusted library allocation
|
page read and write
|
||
21AD9BF0000
|
heap
|
page read and write
|
||
26796CF3000
|
trusted library allocation
|
page read and write
|
||
26799C53000
|
heap
|
page read and write
|
||
2679BEC8000
|
trusted library allocation
|
page read and write
|
||
2679C6A9000
|
trusted library allocation
|
page read and write
|
||
267973F1000
|
trusted library allocation
|
page read and write
|
||
26796A36000
|
trusted library allocation
|
page read and write
|
||
267981DC000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
26796B67000
|
trusted library allocation
|
page read and write
|
||
26796D41000
|
heap
|
page read and write
|
||
26796D76000
|
heap
|
page read and write
|
||
26799FE0000
|
trusted library allocation
|
page read and write
|
||
267A56E1000
|
heap
|
page read and write
|
||
267A39C8000
|
trusted library allocation
|
page read and write
|
||
2679C4B8000
|
trusted library allocation
|
page read and write
|
||
26799C05000
|
heap
|
page read and write
|
||
26797C83000
|
trusted library allocation
|
page read and write
|
||
475E000
|
stack
|
page read and write
|
||
267A36EA000
|
trusted library allocation
|
page read and write
|
||
26797FA8000
|
trusted library allocation
|
page read and write
|
||
2679C088000
|
trusted library allocation
|
page read and write
|
||
26796B80000
|
trusted library allocation
|
page read and write
|
||
267A5779000
|
heap
|
page read and write
|
||
2679C68A000
|
trusted library allocation
|
page read and write
|
||
3A90000
|
heap
|
page read and write
|
||
26799DD8000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
2679C3EE000
|
trusted library allocation
|
page read and write
|
||
2679B863000
|
trusted library allocation
|
page read and write
|
||
2679BDBE000
|
trusted library allocation
|
page read and write
|
||
26796D39000
|
heap
|
page read and write
|
||
26796D3B000
|
heap
|
page read and write
|
||
267A2C79000
|
trusted library allocation
|
page read and write
|
||
26799D8C000
|
trusted library allocation
|
page read and write
|
||
26799D53000
|
trusted library allocation
|
page read and write
|
||
26795390000
|
trusted library allocation
|
page read and write
|
||
267953BF000
|
trusted library allocation
|
page read and write
|
||
2679B150000
|
trusted library allocation
|
page read and write
|
||
267953EF000
|
trusted library allocation
|
page read and write
|
||
26797FAE000
|
trusted library allocation
|
page read and write
|
||
2679BEBB000
|
trusted library allocation
|
page read and write
|
||
26799C1F000
|
heap
|
page read and write
|
||
26796D48000
|
heap
|
page read and write
|
||
2679BDA6000
|
trusted library allocation
|
page read and write
|
||
267A3863000
|
trusted library allocation
|
page read and write
|
||
267A524E000
|
trusted library allocation
|
page read and write
|
||
21AD9C40000
|
heap
|
page read and write
|
||
26799C1F000
|
heap
|
page read and write
|
||
2679D037000
|
trusted library allocation
|
page read and write
|
||
2679A697000
|
trusted library allocation
|
page read and write
|
||
2679BE32000
|
trusted library allocation
|
page read and write
|
||
2679BF83000
|
trusted library allocation
|
page read and write
|
||
2679BCF7000
|
trusted library allocation
|
page read and write
|
||
2679C361000
|
trusted library allocation
|
page read and write
|
||
2679ADDE000
|
trusted library allocation
|
page read and write
|
||
267A39A7000
|
trusted library allocation
|
page read and write
|
||
267A367E000
|
trusted library allocation
|
page read and write
|
||
26799C1F000
|
heap
|
page read and write
|
||
267A40BB000
|
trusted library allocation
|
page read and write
|
||
1EC87DE9000
|
heap
|
page read and write
|
||
267A2C77000
|
trusted library allocation
|
page read and write
|
||
26799C25000
|
heap
|
page read and write
|
||
26796D39000
|
heap
|
page read and write
|
||
26796D5A000
|
heap
|
page read and write
|
||
2679BE79000
|
trusted library allocation
|
page read and write
|
||
267A3844000
|
trusted library allocation
|
page read and write
|
||
2679987A000
|
trusted library allocation
|
page read and write
|
||
26799D39000
|
trusted library allocation
|
page read and write
|
||
26799D31000
|
trusted library allocation
|
page read and write
|
||
26795DF9000
|
trusted library allocation
|
page read and write
|
||
26796D84000
|
heap
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
26799FC3000
|
trusted library allocation
|
page read and write
|
||
26796A99000
|
trusted library allocation
|
page read and write
|
||
26799E90000
|
trusted library allocation
|
page read and write
|
||
26795AB2000
|
trusted library allocation
|
page read and write
|
||
267A3D57000
|
trusted library allocation
|
page read and write
|
||
1EC87469000
|
trusted library allocation
|
page read and write
|
||
2679D058000
|
trusted library allocation
|
page read and write
|
||
2679B1C4000
|
trusted library allocation
|
page read and write
|
||
267A39F8000
|
trusted library allocation
|
page read and write
|
||
26796D4A000
|
heap
|
page read and write
|
||
26796D3D000
|
heap
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
2679BDFE000
|
trusted library allocation
|
page read and write
|
||
1DB6B1A2000
|
unclassified section
|
page read and write
|
||
26797FAE000
|
trusted library allocation
|
page read and write
|
||
26797809000
|
trusted library allocation
|
page read and write
|
||
2679B153000
|
trusted library allocation
|
page read and write
|
||
2679C44B000
|
trusted library allocation
|
page read and write
|
||
2679C547000
|
trusted library allocation
|
page read and write
|
||
267998B8000
|
trusted library allocation
|
page read and write
|
||
2679C4BB000
|
trusted library allocation
|
page read and write
|
||
267A40AB000
|
trusted library allocation
|
page read and write
|
||
267A3AF2000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
1DB6B600000
|
trusted library allocation
|
page read and write
|
||
26799FAB000
|
trusted library allocation
|
page read and write
|
||
2679C055000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
1EC87DE8000
|
heap
|
page read and write
|
||
267A3148000
|
trusted library allocation
|
page read and write
|
||
267A35D6000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
267998D8000
|
trusted library allocation
|
page read and write
|
||
26796D4A000
|
heap
|
page read and write
|
||
2679DBEC000
|
trusted library allocation
|
page read and write
|
||
26797CC8000
|
trusted library allocation
|
page read and write
|
||
26799C0D000
|
heap
|
page read and write
|
||
2679B198000
|
trusted library allocation
|
page read and write
|
||
26796D84000
|
heap
|
page read and write
|
||
26797FA4000
|
trusted library allocation
|
page read and write
|
||
2679C5B7000
|
trusted library allocation
|
page read and write
|
||
26797FBD000
|
trusted library allocation
|
page read and write
|
||
267973D2000
|
trusted library allocation
|
page read and write
|
||
2679C3E5000
|
trusted library allocation
|
page read and write
|
||
2679C657000
|
trusted library allocation
|
page read and write
|
||
2679C47A000
|
trusted library allocation
|
page read and write
|
||
26799C53000
|
heap
|
page read and write
|
||
26796BFC000
|
trusted library allocation
|
page read and write
|
||
26799E76000
|
trusted library allocation
|
page read and write
|
||
267A3D50000
|
trusted library allocation
|
page read and write
|
||
26799C09000
|
heap
|
page read and write
|
||
1EC87D5F000
|
heap
|
page read and write
|
||
26796D57000
|
heap
|
page read and write
|
||
26799FFD000
|
trusted library allocation
|
page read and write
|
||
1DB6B000000
|
unclassified section
|
page readonly
|
||
267A605A000
|
trusted library allocation
|
page read and write
|
||
26796C52000
|
trusted library allocation
|
page read and write
|
||
267A39D8000
|
trusted library allocation
|
page read and write
|
||
26796D4C000
|
heap
|
page read and write
|
||
F41000
|
unkown
|
page execute read
|
||
26795486000
|
trusted library allocation
|
page read and write
|
||
2679B889000
|
trusted library allocation
|
page read and write
|
||
267953A1000
|
trusted library allocation
|
page read and write
|
||
2679AE02000
|
trusted library allocation
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
267981D6000
|
trusted library allocation
|
page read and write
|
||
26796D42000
|
heap
|
page read and write
|
||
26795443000
|
trusted library allocation
|
page read and write
|
||
267A35AE000
|
trusted library allocation
|
page read and write
|
||
2679DBE6000
|
trusted library allocation
|
page read and write
|
||
2679BCAB000
|
trusted library allocation
|
page read and write
|
||
267A3D57000
|
trusted library allocation
|
page read and write
|
||
267A39C8000
|
trusted library allocation
|
page read and write
|
||
2679BFC7000
|
trusted library allocation
|
page read and write
|
||
2679C0CA000
|
trusted library allocation
|
page read and write
|
||
26796BC6000
|
trusted library allocation
|
page read and write
|
||
267981E5000
|
trusted library allocation
|
page read and write
|
||
2679A2C7000
|
trusted library allocation
|
page read and write
|
||
2679C44B000
|
trusted library allocation
|
page read and write
|
||
2679A2D9000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
26799E9C000
|
trusted library allocation
|
page read and write
|
||
26796D3A000
|
heap
|
page read and write
|
||
26796D39000
|
heap
|
page read and write
|
||
2679D032000
|
trusted library allocation
|
page read and write
|
||
26796CA6000
|
trusted library allocation
|
page read and write
|
||
267A35D6000
|
trusted library allocation
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
26796BE7000
|
trusted library allocation
|
page read and write
|
||
1EC8748D000
|
trusted library allocation
|
page read and write
|
||
2679C58B000
|
trusted library allocation
|
page read and write
|
||
2679C5AC000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
2679760A000
|
trusted library allocation
|
page read and write
|
||
26799FE0000
|
trusted library allocation
|
page read and write
|
||
26796C9D000
|
trusted library allocation
|
page read and write
|
||
2679DBE2000
|
trusted library allocation
|
page read and write
|
||
267A388B000
|
trusted library allocation
|
page read and write
|
||
2679A04B000
|
trusted library allocation
|
page read and write
|
||
2679BF9F000
|
trusted library allocation
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
26796D41000
|
heap
|
page read and write
|
||
26796D3A000
|
heap
|
page read and write
|
||
267A39DA000
|
trusted library allocation
|
page read and write
|
||
2679B8C4000
|
trusted library allocation
|
page read and write
|
||
267A2CF1000
|
trusted library allocation
|
page read and write
|
||
1EC88183000
|
heap
|
page read and write
|
||
2679987A000
|
trusted library allocation
|
page read and write
|
||
267973FB000
|
trusted library allocation
|
page read and write
|
||
1EC87DE0000
|
heap
|
page read and write
|
||
26799FEE000
|
trusted library allocation
|
page read and write
|
||
2679539E000
|
trusted library allocation
|
page read and write
|
||
267A3621000
|
trusted library allocation
|
page read and write
|
||
2679BE3C000
|
trusted library allocation
|
page read and write
|
||
2679C666000
|
trusted library allocation
|
page read and write
|
||
189F59703000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
267A3150000
|
trusted library allocation
|
page read and write
|
||
267A2C6B000
|
trusted library allocation
|
page read and write
|
||
1010000
|
unkown
|
page write copy
|
||
26799F1F000
|
trusted library allocation
|
page read and write
|
||
2679D080000
|
trusted library allocation
|
page read and write
|
||
267A3DE6000
|
trusted library allocation
|
page read and write
|
||
2679C6A4000
|
trusted library allocation
|
page read and write
|
||
267975F8000
|
trusted library allocation
|
page read and write
|
||
17F9D1BA000
|
heap
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
2679BDC9000
|
trusted library allocation
|
page read and write
|
||
267A3838000
|
trusted library allocation
|
page read and write
|
||
267A40B9000
|
trusted library allocation
|
page read and write
|
||
26797278000
|
trusted library allocation
|
page read and write
|
||
2679DBEA000
|
trusted library allocation
|
page read and write
|
||
267A318B000
|
trusted library allocation
|
page read and write
|
||
26799D53000
|
trusted library allocation
|
page read and write
|
||
26797FB6000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
2679A6FE000
|
trusted library allocation
|
page read and write
|
||
26799885000
|
trusted library allocation
|
page read and write
|
||
267A3D9E000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
267A363B000
|
trusted library allocation
|
page read and write
|
||
2679C0ED000
|
trusted library allocation
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
26797358000
|
trusted library allocation
|
page read and write
|
||
26795DE9000
|
trusted library allocation
|
page read and write
|
||
2679986C000
|
trusted library allocation
|
page read and write
|
||
267A2C6B000
|
trusted library allocation
|
page read and write
|
||
26797F93000
|
trusted library allocation
|
page read and write
|
||
267A2C20000
|
trusted library allocation
|
page read and write
|
||
26796B97000
|
trusted library allocation
|
page read and write
|
||
267A40A6000
|
trusted library allocation
|
page read and write
|
||
26796D33000
|
heap
|
page read and write
|
||
267998BA000
|
trusted library allocation
|
page read and write
|
||
2679C6A9000
|
trusted library allocation
|
page read and write
|
||
2679BCCD000
|
trusted library allocation
|
page read and write
|
||
267A3A85000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
267981C0000
|
trusted library allocation
|
page read and write
|
||
26797FAC000
|
trusted library allocation
|
page read and write
|
||
267A3145000
|
trusted library allocation
|
page read and write
|
||
267A3169000
|
trusted library allocation
|
page read and write
|
||
2679ADB1000
|
trusted library allocation
|
page read and write
|
||
2679BDA8000
|
trusted library allocation
|
page read and write
|
||
2679C5D0000
|
trusted library allocation
|
page read and write
|
||
2679C496000
|
trusted library allocation
|
page read and write
|
||
2679BEBF000
|
trusted library allocation
|
page read and write
|
||
2679B198000
|
trusted library allocation
|
page read and write
|
||
267973F8000
|
trusted library allocation
|
page read and write
|
||
267953BF000
|
trusted library allocation
|
page read and write
|
||
267972FE000
|
trusted library allocation
|
page read and write
|
||
267A5EE3000
|
trusted library allocation
|
page read and write
|
||
2679537F000
|
trusted library allocation
|
page read and write
|
||
2679C67D000
|
trusted library allocation
|
page read and write
|
||
26796BE7000
|
trusted library allocation
|
page read and write
|
||
2679AB24000
|
trusted library allocation
|
page read and write
|
||
2679C5E7000
|
trusted library allocation
|
page read and write
|
||
26796D39000
|
heap
|
page read and write
|
||
26799E9C000
|
trusted library allocation
|
page read and write
|
||
1EC87D5C000
|
heap
|
page read and write
|
||
2679BE79000
|
trusted library allocation
|
page read and write
|
||
2679C3E5000
|
trusted library allocation
|
page read and write
|
||
2679C415000
|
trusted library allocation
|
page read and write
|
||
1EC87D4D000
|
heap
|
page read and write
|
||
2679A90A000
|
trusted library allocation
|
page read and write
|
||
26798133000
|
trusted library allocation
|
page read and write
|
||
2679BD5D000
|
trusted library allocation
|
page read and write
|
||
267999C3000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
21AD9E6E000
|
trusted library allocation
|
page read and write
|
||
267A39E4000
|
trusted library allocation
|
page read and write
|
||
26799D7B000
|
trusted library allocation
|
page read and write
|
||
26795A66000
|
trusted library allocation
|
page read and write
|
||
26795DAA000
|
trusted library allocation
|
page read and write
|
||
2679C361000
|
trusted library allocation
|
page read and write
|
||
26796D3A000
|
heap
|
page read and write
|
||
26796D3B000
|
heap
|
page read and write
|
||
17F9D50A000
|
trusted library allocation
|
page read and write
|
||
267A60A1000
|
trusted library allocation
|
page read and write
|
||
267A2C04000
|
trusted library allocation
|
page read and write
|
||
267A2C7D000
|
trusted library allocation
|
page read and write
|
||
2679C55F000
|
trusted library allocation
|
page read and write
|
||
21ADA03D000
|
trusted library allocation
|
page read and write
|
||
267A35C6000
|
trusted library allocation
|
page read and write
|
||
26797262000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
1EC87DE8000
|
heap
|
page read and write
|
||
26796B9B000
|
trusted library allocation
|
page read and write
|
||
26796BDA000
|
trusted library allocation
|
page read and write
|
||
1DB6B363000
|
trusted library allocation
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
1DB6B365000
|
trusted library allocation
|
page read and write
|
||
267A39CB000
|
trusted library allocation
|
page read and write
|
||
2679B1E4000
|
trusted library allocation
|
page read and write
|
||
2679ADC5000
|
trusted library allocation
|
page read and write
|
||
26795AFE000
|
trusted library allocation
|
page read and write
|
||
1EC87DEB000
|
heap
|
page read and write
|
||
26799DEA000
|
trusted library allocation
|
page read and write
|
||
17F9D1AF000
|
heap
|
page read and write
|
||
2679BD76000
|
trusted library allocation
|
page read and write
|
||
267A3943000
|
trusted library allocation
|
page read and write
|
||
26796D39000
|
heap
|
page read and write
|
||
2679ADEE000
|
trusted library allocation
|
page read and write
|
||
2679A727000
|
trusted library allocation
|
page read and write
|
||
26795DD4000
|
trusted library allocation
|
page read and write
|
||
2679C5A4000
|
trusted library allocation
|
page read and write
|
||
267A3DF4000
|
trusted library allocation
|
page read and write
|
||
2679C59F000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
26796D84000
|
heap
|
page read and write
|
||
26799D79000
|
trusted library allocation
|
page read and write
|
||
2679C4F7000
|
trusted library allocation
|
page read and write
|
||
2679C5AC000
|
trusted library allocation
|
page read and write
|
||
2679BCDC000
|
trusted library allocation
|
page read and write
|
||
26797F8A000
|
trusted library allocation
|
page read and write
|
||
26799C53000
|
heap
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
26797F52000
|
trusted library allocation
|
page read and write
|
||
2679BE32000
|
trusted library allocation
|
page read and write
|
||
2679B1E2000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
2679C44B000
|
trusted library allocation
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
267A3AB4000
|
trusted library allocation
|
page read and write
|
||
1EC87D69000
|
heap
|
page read and write
|
||
267A3853000
|
trusted library allocation
|
page read and write
|
||
267A2C4F000
|
trusted library allocation
|
page read and write
|
||
26797F7B000
|
trusted library allocation
|
page read and write
|
||
2679B841000
|
trusted library allocation
|
page read and write
|
||
1DB6B1A0000
|
unclassified section
|
page read and write
|
||
267973F0000
|
trusted library allocation
|
page read and write
|
||
1EC88183000
|
heap
|
page read and write
|
||
2679C496000
|
trusted library allocation
|
page read and write
|
||
26796D84000
|
heap
|
page read and write
|
||
2679C4E3000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
267A3169000
|
trusted library allocation
|
page read and write
|
||
26796A36000
|
trusted library allocation
|
page read and write
|
||
26796D3E000
|
heap
|
page read and write
|
||
2679AAF0000
|
trusted library allocation
|
page read and write
|
||
267A3D3E000
|
trusted library allocation
|
page read and write
|
||
2679A0E4000
|
trusted library allocation
|
page read and write
|
||
26796D49000
|
heap
|
page read and write
|
||
21AD9AE0000
|
unclassified section
|
page readonly
|
||
2679BBC3000
|
trusted library allocation
|
page read and write
|
||
26796D80000
|
heap
|
page read and write
|
||
267A38E2000
|
trusted library allocation
|
page read and write
|
||
2679C55F000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
2679A2E4000
|
trusted library allocation
|
page read and write
|
||
26796D2B000
|
heap
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
26796B89000
|
trusted library allocation
|
page read and write
|
||
267A316B000
|
trusted library allocation
|
page read and write
|
||
26797FAE000
|
trusted library allocation
|
page read and write
|
||
267A36F2000
|
trusted library allocation
|
page read and write
|
||
2679B868000
|
trusted library allocation
|
page read and write
|
||
26796D2E000
|
heap
|
page read and write
|
||
26796D3E000
|
heap
|
page read and write
|
||
2679C58F000
|
trusted library allocation
|
page read and write
|
||
2679A0FD000
|
trusted library allocation
|
page read and write
|
||
26799C16000
|
heap
|
page read and write
|
||
26798149000
|
trusted library allocation
|
page read and write
|
||
2679C58F000
|
trusted library allocation
|
page read and write
|
||
267A60A4000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
1EC881B8000
|
heap
|
page read and write
|
||
2679ADFA000
|
trusted library allocation
|
page read and write
|
||
21ADA100000
|
heap
|
page read and write
|
||
2679BD65000
|
trusted library allocation
|
page read and write
|
||
267955CC000
|
trusted library allocation
|
page read and write
|
||
2679BE8D000
|
trusted library allocation
|
page read and write
|
||
2679BEBB000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
2679C5D6000
|
trusted library allocation
|
page read and write
|
||
267A60A1000
|
trusted library allocation
|
page read and write
|
||
2679BCF7000
|
trusted library allocation
|
page read and write
|
||
2679C0BC000
|
trusted library allocation
|
page read and write
|
||
2679C6F9000
|
trusted library allocation
|
page read and write
|
||
267A40C5000
|
trusted library allocation
|
page read and write
|
||
26797F8A000
|
trusted library allocation
|
page read and write
|
||
2679DB75000
|
trusted library allocation
|
page read and write
|
||
267A398E000
|
trusted library allocation
|
page read and write
|
||
267A3AF9000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
267A3AB7000
|
trusted library allocation
|
page read and write
|
||
26795D14000
|
trusted library allocation
|
page read and write
|
||
267A315F000
|
trusted library allocation
|
page read and write
|
||
2679BA92000
|
trusted library allocation
|
page read and write
|
||
21ADA00C000
|
trusted library allocation
|
page read and write
|
||
2679C0D3000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
26799E82000
|
trusted library allocation
|
page read and write
|
||
1EC87B90000
|
heap
|
page read and write
|
||
2F6DE3E000
|
stack
|
page read and write
|
||
2679AB00000
|
trusted library allocation
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
26797FBD000
|
trusted library allocation
|
page read and write
|
||
26795DC3000
|
trusted library allocation
|
page read and write
|
||
267972AD000
|
trusted library allocation
|
page read and write
|
||
267A39B7000
|
trusted library allocation
|
page read and write
|
||
2679C520000
|
trusted library allocation
|
page read and write
|
||
26796D51000
|
heap
|
page read and write
|
||
2679DC6B000
|
trusted library allocation
|
page read and write
|
||
1EC8746F000
|
trusted library allocation
|
page read and write
|
||
26796D7C000
|
heap
|
page read and write
|
||
1CEE000
|
stack
|
page read and write
|
||
2679C5D2000
|
trusted library allocation
|
page read and write
|
||
26798157000
|
trusted library allocation
|
page read and write
|
||
C79000
|
stack
|
page read and write
|
||
1DB6B370000
|
trusted library allocation
|
page read and write
|
||
2679C0F8000
|
trusted library allocation
|
page read and write
|
||
2679AE0A000
|
trusted library allocation
|
page read and write
|
||
2679DBE2000
|
trusted library allocation
|
page read and write
|
||
26796B87000
|
trusted library allocation
|
page read and write
|
||
26797FD8000
|
trusted library allocation
|
page read and write
|
||
26796C52000
|
trusted library allocation
|
page read and write
|
||
2679C4E3000
|
trusted library allocation
|
page read and write
|
||
1EC873B0000
|
heap
|
page read and write
|
||
26796D5A000
|
heap
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
26795976000
|
trusted library allocation
|
page read and write
|
||
26796D80000
|
heap
|
page read and write
|
||
2679A2D7000
|
trusted library allocation
|
page read and write
|
||
267A5725000
|
heap
|
page read and write
|
||
2679BDF6000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
26796D55000
|
heap
|
page read and write
|
||
2679C4C4000
|
trusted library allocation
|
page read and write
|
||
2679C647000
|
trusted library allocation
|
page read and write
|
||
267A60B9000
|
trusted library allocation
|
page read and write
|
||
267998FB000
|
trusted library allocation
|
page read and write
|
||
1EC87C00000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
26797F7D000
|
trusted library allocation
|
page read and write
|
||
2679C6F6000
|
trusted library allocation
|
page read and write
|
||
2679D090000
|
trusted library allocation
|
page read and write
|
||
2679BE0D000
|
trusted library allocation
|
page read and write
|
||
267A35B6000
|
trusted library allocation
|
page read and write
|
||
267A3D33000
|
trusted library allocation
|
page read and write
|
||
267981D2000
|
trusted library allocation
|
page read and write
|
||
6B79B4F000
|
trusted library allocation
|
page read and write
|
||
26796D4A000
|
heap
|
page read and write
|
||
26799FE0000
|
trusted library allocation
|
page read and write
|
||
2679C4B8000
|
trusted library allocation
|
page read and write
|
||
1EC874BD000
|
trusted library allocation
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
26796A1E000
|
trusted library allocation
|
page read and write
|
||
26797FC8000
|
trusted library allocation
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
1EC881B6000
|
heap
|
page read and write
|
||
2679984D000
|
trusted library allocation
|
page read and write
|
||
1EC87DF1000
|
heap
|
page read and write
|
||
26799D6A000
|
trusted library allocation
|
page read and write
|
||
2679C68E000
|
trusted library allocation
|
page read and write
|
||
26796D41000
|
heap
|
page read and write
|
||
26796D7A000
|
heap
|
page read and write
|
||
267A3D3C000
|
trusted library allocation
|
page read and write
|
||
26795DF4000
|
trusted library allocation
|
page read and write
|
||
1EC88169000
|
heap
|
page read and write
|
||
267A3AFB000
|
trusted library allocation
|
page read and write
|
||
267A36AD000
|
trusted library allocation
|
page read and write
|
||
2679729E000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
267A38E2000
|
trusted library allocation
|
page read and write
|
||
2679C5C8000
|
trusted library allocation
|
page read and write
|
||
2679B85A000
|
trusted library allocation
|
page read and write
|
||
2679B1DF000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
26796B97000
|
trusted library allocation
|
page read and write
|
||
26797C98000
|
trusted library allocation
|
page read and write
|
||
26799E9C000
|
trusted library allocation
|
page read and write
|
||
6C6EFFE000
|
unkown
|
page readonly
|
||
26799E90000
|
trusted library allocation
|
page read and write
|
||
267A5798000
|
heap
|
page read and write
|
||
26795A80000
|
trusted library allocation
|
page read and write
|
||
1DB6B1C0000
|
heap
|
page read and write
|
||
2679BBA6000
|
trusted library allocation
|
page read and write
|
||
1EC881A9000
|
heap
|
page read and write
|
||
267A2C7D000
|
trusted library allocation
|
page read and write
|
||
2679817D000
|
trusted library allocation
|
page read and write
|
||
267A409F000
|
trusted library allocation
|
page read and write
|
||
26799FF0000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
26799C05000
|
heap
|
page read and write
|
||
2679C35F000
|
trusted library allocation
|
page read and write
|
||
2679D096000
|
trusted library allocation
|
page read and write
|
||
2679D0E0000
|
trusted library allocation
|
page read and write
|
||
26797C98000
|
trusted library allocation
|
page read and write
|
||
FDC000
|
unkown
|
page readonly
|
||
26796D80000
|
heap
|
page read and write
|
||
2679C4BF000
|
trusted library allocation
|
page read and write
|
||
2679BE0D000
|
trusted library allocation
|
page read and write
|
||
267959FE000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
1EC88197000
|
heap
|
page read and write
|
||
267A3D99000
|
trusted library allocation
|
page read and write
|
||
26796D41000
|
heap
|
page read and write
|
||
26796D76000
|
heap
|
page read and write
|
||
26796D41000
|
heap
|
page read and write
|
||
267A38F2000
|
trusted library allocation
|
page read and write
|
||
267A2C79000
|
trusted library allocation
|
page read and write
|
||
1EC87D60000
|
heap
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
26796D3A000
|
heap
|
page read and write
|
||
267A39D8000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
2679C325000
|
trusted library allocation
|
page read and write
|
||
26799FE6000
|
trusted library allocation
|
page read and write
|
||
267955C6000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
26795DC3000
|
trusted library allocation
|
page read and write
|
||
2679A062000
|
trusted library allocation
|
page read and write
|
||
2679B1AA000
|
trusted library allocation
|
page read and write
|
||
2679B153000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
2679A6CB000
|
trusted library allocation
|
page read and write
|
||
26796D5A000
|
heap
|
page read and write
|
||
2679BE07000
|
trusted library allocation
|
page read and write
|
||
2679C48C000
|
trusted library allocation
|
page read and write
|
||
21ADA03B000
|
trusted library allocation
|
page read and write
|
||
26796CC1000
|
trusted library allocation
|
page read and write
|
||
1EC881B9000
|
heap
|
page read and write
|
||
26799DFA000
|
trusted library allocation
|
page read and write
|
||
26796C54000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
2679C4B8000
|
trusted library allocation
|
page read and write
|
||
267959FB000
|
trusted library allocation
|
page read and write
|
||
26797F4D000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
1EC87DF1000
|
heap
|
page read and write
|
||
2679A2CE000
|
trusted library allocation
|
page read and write
|
||
2679BE8D000
|
trusted library allocation
|
page read and write
|
||
26795AFE000
|
trusted library allocation
|
page read and write
|
||
2679C6C5000
|
trusted library allocation
|
page read and write
|
||
26797FAC000
|
trusted library allocation
|
page read and write
|
||
2679C6C3000
|
trusted library allocation
|
page read and write
|
||
1EC87D8A000
|
heap
|
page read and write
|
||
2679DBAD000
|
trusted library allocation
|
page read and write
|
||
2679C4AC000
|
trusted library allocation
|
page read and write
|
||
26799DE8000
|
trusted library allocation
|
page read and write
|
||
26796B67000
|
trusted library allocation
|
page read and write
|
||
26799FE0000
|
trusted library allocation
|
page read and write
|
||
2679B1EB000
|
trusted library allocation
|
page read and write
|
||
267A60B9000
|
trusted library allocation
|
page read and write
|
||
2679AD61000
|
trusted library allocation
|
page read and write
|
||
26796B2B000
|
trusted library allocation
|
page read and write
|
||
2679C47A000
|
trusted library allocation
|
page read and write
|
||
2679AAF6000
|
trusted library allocation
|
page read and write
|
||
2679C4BF000
|
trusted library allocation
|
page read and write
|
||
2679BD6F000
|
trusted library allocation
|
page read and write
|
||
2679C6CB000
|
trusted library allocation
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
267954CD000
|
trusted library allocation
|
page read and write
|
||
267A2CDF000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
2679C547000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
17F9D507000
|
trusted library allocation
|
page read and write
|
||
26799934000
|
trusted library allocation
|
page read and write
|
||
267A60A4000
|
trusted library allocation
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
2679DC3F000
|
trusted library allocation
|
page read and write
|
||
2679C69E000
|
trusted library allocation
|
page read and write
|
||
2679BA92000
|
trusted library allocation
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
2679BF41000
|
trusted library allocation
|
page read and write
|
||
2679C57B000
|
trusted library allocation
|
page read and write
|
||
26796D39000
|
heap
|
page read and write
|
||
2679C47A000
|
trusted library allocation
|
page read and write
|
||
1DB6B313000
|
trusted library allocation
|
page read and write
|
||
267A605A000
|
trusted library allocation
|
page read and write
|
||
17F9D180000
|
heap
|
page read and write
|
||
1EC881A9000
|
heap
|
page read and write
|
||
267A3165000
|
trusted library allocation
|
page read and write
|
||
26799FF4000
|
trusted library allocation
|
page read and write
|
||
267969AE000
|
trusted library allocation
|
page read and write
|
||
2679C47E000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
1EC87DAA000
|
heap
|
page read and write
|
||
267A5236000
|
trusted library allocation
|
page read and write
|
||
6C7123D000
|
stack
|
page read and write
|
||
2679BFF1000
|
trusted library allocation
|
page read and write
|
||
2679DBE0000
|
trusted library allocation
|
page read and write
|
||
26799C53000
|
heap
|
page read and write
|
||
2679C54E000
|
trusted library allocation
|
page read and write
|
||
21AD9C70000
|
heap
|
page readonly
|
||
267981C0000
|
trusted library allocation
|
page read and write
|
||
2679BD6B000
|
trusted library allocation
|
page read and write
|
||
2679AAFA000
|
trusted library allocation
|
page read and write
|
||
267A3959000
|
trusted library allocation
|
page read and write
|
||
2679DC68000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
26795DFC000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
26796D33000
|
heap
|
page read and write
|
||
267A3ACA000
|
trusted library allocation
|
page read and write
|
||
267A56E1000
|
heap
|
page read and write
|
||
2679B864000
|
trusted library allocation
|
page read and write
|
||
2679BD6F000
|
trusted library allocation
|
page read and write
|
||
2A18FFE000
|
stack
|
page read and write
|
||
1EC87D5F000
|
heap
|
page read and write
|
||
26799DC7000
|
trusted library allocation
|
page read and write
|
||
26797F60000
|
trusted library allocation
|
page read and write
|
||
2679984A000
|
trusted library allocation
|
page read and write
|
||
267A3D9B000
|
trusted library allocation
|
page read and write
|
||
26796B89000
|
trusted library allocation
|
page read and write
|
||
2679D087000
|
trusted library allocation
|
page read and write
|
||
267A3171000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
26796CC1000
|
trusted library allocation
|
page read and write
|
||
21AD9E7B000
|
trusted library allocation
|
page read and write
|
||
267981AD000
|
trusted library allocation
|
page read and write
|
||
2679C48C000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
26796D46000
|
heap
|
page read and write
|
||
2679C6E2000
|
trusted library allocation
|
page read and write
|
||
267981DC000
|
trusted library allocation
|
page read and write
|
||
267A39EF000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
267A3D9B000
|
trusted library allocation
|
page read and write
|
||
267A36E4000
|
trusted library allocation
|
page read and write
|
||
26799C05000
|
heap
|
page read and write
|
||
26796A52000
|
trusted library allocation
|
page read and write
|
||
2679DB92000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
2A187FF000
|
stack
|
page read and write
|
||
26799FAB000
|
trusted library allocation
|
page read and write
|
||
1EC8816D000
|
heap
|
page read and write
|
||
26796D4C000
|
heap
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
1EC87D60000
|
heap
|
page read and write
|
||
26797F8A000
|
trusted library allocation
|
page read and write
|
||
267A3D47000
|
trusted library allocation
|
page read and write
|
||
1525000
|
heap
|
page read and write
|
||
2679DBA0000
|
trusted library allocation
|
page read and write
|
||
267A316B000
|
trusted library allocation
|
page read and write
|
||
26796D4E000
|
heap
|
page read and write
|
||
267A3DFB000
|
trusted library allocation
|
page read and write
|
||
267972FA000
|
trusted library allocation
|
page read and write
|
||
267969E6000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
1EC87DE1000
|
heap
|
page read and write
|
||
267A2C09000
|
trusted library allocation
|
page read and write
|
||
2679B1E4000
|
trusted library allocation
|
page read and write
|
||
2679A2D9000
|
trusted library allocation
|
page read and write
|
||
267A3AF3000
|
trusted library allocation
|
page read and write
|
||
267973FB000
|
trusted library allocation
|
page read and write
|
||
26796D48000
|
heap
|
page read and write
|
||
2679867B000
|
trusted library allocation
|
page read and write
|
||
26796A79000
|
trusted library allocation
|
page read and write
|
||
2679C4FC000
|
trusted library allocation
|
page read and write
|
||
1EC87D69000
|
heap
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
2679BFFA000
|
trusted library allocation
|
page read and write
|
||
26796D48000
|
heap
|
page read and write
|
||
2F6CC7E000
|
unkown
|
page readonly
|
||
26795DF9000
|
trusted library allocation
|
page read and write
|
||
548C000
|
stack
|
page read and write
|
||
1DB6B35F000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
2679C4BB000
|
trusted library allocation
|
page read and write
|
||
2679A2B4000
|
trusted library allocation
|
page read and write
|
||
26799E82000
|
trusted library allocation
|
page read and write
|
||
26797C98000
|
trusted library allocation
|
page read and write
|
||
100C000
|
unkown
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
26798690000
|
trusted library allocation
|
page read and write
|
||
2679A2C7000
|
trusted library allocation
|
page read and write
|
||
26795DF9000
|
trusted library allocation
|
page read and write
|
||
26797F48000
|
trusted library allocation
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
2679C68E000
|
trusted library allocation
|
page read and write
|
||
2679BE24000
|
trusted library allocation
|
page read and write
|
||
267A2C44000
|
trusted library allocation
|
page read and write
|
||
2679C47A000
|
trusted library allocation
|
page read and write
|
||
26797C40000
|
trusted library allocation
|
page read and write
|
||
26795DE6000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
2679A6A2000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
6C711FE000
|
unkown
|
page readonly
|
||
3DE1000
|
heap
|
page read and write
|
||
2679C6B9000
|
trusted library allocation
|
page read and write
|
||
267972A4000
|
trusted library allocation
|
page read and write
|
||
267A40C1000
|
trusted library allocation
|
page read and write
|
||
99C7BE000
|
stack
|
page read and write
|
||
2679DCCF000
|
trusted library allocation
|
page read and write
|
||
1EC87D8D000
|
heap
|
page read and write
|
||
26799C53000
|
heap
|
page read and write
|
||
2679C445000
|
trusted library allocation
|
page read and write
|
||
26799880000
|
trusted library allocation
|
page read and write
|
||
2679AAFE000
|
trusted library allocation
|
page read and write
|
||
26799C1F000
|
heap
|
page read and write
|
||
26797231000
|
trusted library allocation
|
page read and write
|
||
267A3DBF000
|
trusted library allocation
|
page read and write
|
||
26799C1F000
|
heap
|
page read and write
|
||
26796B24000
|
trusted library allocation
|
page read and write
|
||
267A2C66000
|
trusted library allocation
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
267986EB000
|
trusted library allocation
|
page read and write
|
||
2679BDF7000
|
trusted library allocation
|
page read and write
|
||
2679B184000
|
trusted library allocation
|
page read and write
|
||
1EC88197000
|
heap
|
page read and write
|
||
26799C16000
|
heap
|
page read and write
|
||
2679DBDE000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
1523000
|
heap
|
page read and write
|
||
2679C6EF000
|
trusted library allocation
|
page read and write
|
||
26795AB9000
|
trusted library allocation
|
page read and write
|
||
267A60B9000
|
trusted library allocation
|
page read and write
|
||
267A3DF1000
|
trusted library allocation
|
page read and write
|
||
20EF000
|
stack
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
2679C693000
|
trusted library allocation
|
page read and write
|
||
26796D54000
|
heap
|
page read and write
|
||
26796D2B000
|
heap
|
page read and write
|
||
26796D42000
|
heap
|
page read and write
|
||
26797708000
|
trusted library allocation
|
page read and write
|
||
2679B1D3000
|
trusted library allocation
|
page read and write
|
||
F40000
|
unkown
|
page readonly
|
||
2679C552000
|
trusted library allocation
|
page read and write
|
||
267A3D55000
|
trusted library allocation
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
267A2C6E000
|
trusted library allocation
|
page read and write
|
||
21AD9E00000
|
trusted library allocation
|
page read and write
|
||
26795DBD000
|
trusted library allocation
|
page read and write
|
||
26796CBE000
|
trusted library allocation
|
page read and write
|
||
26796D41000
|
heap
|
page read and write
|
||
1014000
|
unkown
|
page readonly
|
||
2679C5D6000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
2679B8CC000
|
trusted library allocation
|
page read and write
|
||
26796D39000
|
heap
|
page read and write
|
||
267A5EE4000
|
trusted library allocation
|
page read and write
|
||
26796D41000
|
heap
|
page read and write
|
||
267A2C17000
|
trusted library allocation
|
page read and write
|
||
2679C6F1000
|
trusted library allocation
|
page read and write
|
||
17F9D1B1000
|
heap
|
page read and write
|
||
2679988C000
|
trusted library allocation
|
page read and write
|
||
26797311000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
1EC87070000
|
heap
|
page read and write
|
||
2679B885000
|
trusted library allocation
|
page read and write
|
||
2679A05E000
|
trusted library allocation
|
page read and write
|
||
267A2C5D000
|
trusted library allocation
|
page read and write
|
||
267A57C3000
|
heap
|
page read and write
|
||
267A2C6B000
|
trusted library allocation
|
page read and write
|
||
267A39C3000
|
trusted library allocation
|
page read and write
|
||
26797230000
|
trusted library allocation
|
page read and write
|
||
2679C58C000
|
trusted library allocation
|
page read and write
|
||
26796D84000
|
heap
|
page read and write
|
||
1EC87DE0000
|
heap
|
page read and write
|
||
26797C75000
|
trusted library allocation
|
page read and write
|
||
26797C9F000
|
trusted library allocation
|
page read and write
|
||
2679BC71000
|
trusted library allocation
|
page read and write
|
||
2679C0F1000
|
trusted library allocation
|
page read and write
|
||
26797336000
|
trusted library allocation
|
page read and write
|
||
2679A062000
|
trusted library allocation
|
page read and write
|
||
267A2CA0000
|
trusted library allocation
|
page read and write
|
||
2679C697000
|
trusted library allocation
|
page read and write
|
||
267A2C17000
|
trusted library allocation
|
page read and write
|
||
26795DC6000
|
trusted library allocation
|
page read and write
|
||
2679C581000
|
trusted library allocation
|
page read and write
|
||
26795DE6000
|
trusted library allocation
|
page read and write
|
||
2679C47E000
|
trusted library allocation
|
page read and write
|
||
141F000
|
stack
|
page read and write
|
||
26797C98000
|
trusted library allocation
|
page read and write
|
||
21ADA013000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
2679BF9F000
|
trusted library allocation
|
page read and write
|
||
26796D84000
|
heap
|
page read and write
|
||
2679C08C000
|
trusted library allocation
|
page read and write
|
||
267A60A4000
|
trusted library allocation
|
page read and write
|
||
2679BCDC000
|
trusted library allocation
|
page read and write
|
||
26796D51000
|
heap
|
page read and write
|
||
26797C7D000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
1DB6B605000
|
trusted library allocation
|
page read and write
|
||
26799D39000
|
trusted library allocation
|
page read and write
|
||
2679C5D2000
|
trusted library allocation
|
page read and write
|
||
26796D84000
|
heap
|
page read and write
|
||
26797262000
|
trusted library allocation
|
page read and write
|
||
2679DB9F000
|
trusted library allocation
|
page read and write
|
||
267A2C77000
|
trusted library allocation
|
page read and write
|
||
2679BC7D000
|
trusted library allocation
|
page read and write
|
||
26796B9E000
|
trusted library allocation
|
page read and write
|
||
1EC873B4000
|
heap
|
page read and write
|
||
2679C0CD000
|
trusted library allocation
|
page read and write
|
||
26798154000
|
trusted library allocation
|
page read and write
|
||
26797C7B000
|
trusted library allocation
|
page read and write
|
||
267A3586000
|
trusted library allocation
|
page read and write
|
||
267A605A000
|
trusted library allocation
|
page read and write
|
||
2679C4BF000
|
trusted library allocation
|
page read and write
|
||
2679A0E4000
|
trusted library allocation
|
page read and write
|
||
267A39F1000
|
trusted library allocation
|
page read and write
|
||
26796D80000
|
heap
|
page read and write
|
||
26796D33000
|
heap
|
page read and write
|
||
1DB6B3A8000
|
trusted library allocation
|
page read and write
|
||
2679C334000
|
trusted library allocation
|
page read and write
|
||
1EC88185000
|
heap
|
page read and write
|
||
267972A6000
|
trusted library allocation
|
page read and write
|
||
2679DBE0000
|
trusted library allocation
|
page read and write
|
||
26799FF4000
|
trusted library allocation
|
page read and write
|
||
2679869A000
|
trusted library allocation
|
page read and write
|
||
267A3D57000
|
trusted library allocation
|
page read and write
|
||
2679BBFD000
|
trusted library allocation
|
page read and write
|
||
2679A6FE000
|
trusted library allocation
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
26795DBF000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
26799D8C000
|
trusted library allocation
|
page read and write
|
||
2679C08E000
|
trusted library allocation
|
page read and write
|
||
2679B1AA000
|
trusted library allocation
|
page read and write
|
||
26799C53000
|
heap
|
page read and write
|
||
267A35DB000
|
trusted library allocation
|
page read and write
|
||
2679817B000
|
trusted library allocation
|
page read and write
|
||
1DB6B382000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
2679BE88000
|
trusted library allocation
|
page read and write
|
||
26796D3F000
|
heap
|
page read and write
|
||
1EC87410000
|
trusted library allocation
|
page read and write
|
||
26797FFE000
|
trusted library allocation
|
page read and write
|
||
2679A697000
|
trusted library allocation
|
page read and write
|
||
26799D3E000
|
trusted library allocation
|
page read and write
|
||
26797C2C000
|
trusted library allocation
|
page read and write
|
||
267A60A4000
|
trusted library allocation
|
page read and write
|
||
588D000
|
stack
|
page read and write
|
||
1DB6B4C0000
|
heap
|
page read and write
|
||
26799C1F000
|
heap
|
page read and write
|
||
26796D51000
|
heap
|
page read and write
|
||
2679C445000
|
trusted library allocation
|
page read and write
|
||
2679BA31000
|
trusted library allocation
|
page read and write
|
||
267A3DF1000
|
trusted library allocation
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
1EC87D5F000
|
heap
|
page read and write
|
||
267A3ABE000
|
trusted library allocation
|
page read and write
|
||
2679C47E000
|
trusted library allocation
|
page read and write
|
||
267A359F000
|
trusted library allocation
|
page read and write
|
||
267A2CEF000
|
trusted library allocation
|
page read and write
|
||
2679D03C000
|
trusted library allocation
|
page read and write
|
||
26796D4E000
|
heap
|
page read and write
|
||
267A3D50000
|
trusted library allocation
|
page read and write
|
||
26796BC2000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
267A38C5000
|
trusted library allocation
|
page read and write
|
||
26796B3A000
|
trusted library allocation
|
page read and write
|
||
2679C450000
|
trusted library allocation
|
page read and write
|
||
26796B15000
|
trusted library allocation
|
page read and write
|
||
2679C350000
|
trusted library allocation
|
page read and write
|
||
1EC87D69000
|
heap
|
page read and write
|
||
26796D3B000
|
heap
|
page read and write
|
||
267A364B000
|
trusted library allocation
|
page read and write
|
||
26796D46000
|
heap
|
page read and write
|
||
142E000
|
stack
|
page read and write
|
||
26796D54000
|
heap
|
page read and write
|
||
2679D087000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
2679C55F000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
2679B1DF000
|
trusted library allocation
|
page read and write
|
||
26799FB7000
|
trusted library allocation
|
page read and write
|
||
26799DD8000
|
trusted library allocation
|
page read and write
|
||
26796D2B000
|
heap
|
page read and write
|
||
26795A26000
|
trusted library allocation
|
page read and write
|
||
2679A04F000
|
trusted library allocation
|
page read and write
|
||
267A3165000
|
trusted library allocation
|
page read and write
|
||
6C71AFE000
|
stack
|
page read and write
|
||
435E000
|
stack
|
page read and write
|
||
17F9EDB6000
|
heap
|
page read and write
|
||
26796BE7000
|
trusted library allocation
|
page read and write
|
||
1EC87D6C000
|
heap
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
2679BFF7000
|
trusted library allocation
|
page read and write
|
||
267981D6000
|
trusted library allocation
|
page read and write
|
||
1523000
|
heap
|
page read and write
|
||
2679AD2A000
|
trusted library allocation
|
page read and write
|
||
26796D3D000
|
heap
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
1EC873DA000
|
unkown
|
page execute read
|
||
26796D41000
|
heap
|
page read and write
|
||
2679C0FA000
|
trusted library allocation
|
page read and write
|
||
26799C01000
|
heap
|
page read and write
|
||
26796CE0000
|
trusted library allocation
|
page read and write
|
||
267A3993000
|
trusted library allocation
|
page read and write
|
||
17F9D120000
|
heap
|
page read and write
|
||
267A3AA8000
|
trusted library allocation
|
page read and write
|
||
267A3D3B000
|
trusted library allocation
|
page read and write
|
||
2679B1CC000
|
trusted library allocation
|
page read and write
|
||
26795398000
|
trusted library allocation
|
page read and write
|
||
2679BEC8000
|
trusted library allocation
|
page read and write
|
||
2679BFFA000
|
trusted library allocation
|
page read and write
|
||
2679D077000
|
trusted library allocation
|
page read and write
|
||
2679C0EF000
|
trusted library allocation
|
page read and write
|
||
26799E90000
|
trusted library allocation
|
page read and write
|
||
26796D39000
|
heap
|
page read and write
|
||
267972A1000
|
trusted library allocation
|
page read and write
|
||
267A2C66000
|
trusted library allocation
|
page read and write
|
||
26798149000
|
trusted library allocation
|
page read and write
|
||
267A5ED5000
|
trusted library allocation
|
page read and write
|
||
267A2C2F000
|
trusted library allocation
|
page read and write
|
||
26797F81000
|
trusted library allocation
|
page read and write
|
||
26796D41000
|
heap
|
page read and write
|
||
2679B1A4000
|
trusted library allocation
|
page read and write
|
||
2679695E000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
26799DCE000
|
trusted library allocation
|
page read and write
|
||
2679A697000
|
trusted library allocation
|
page read and write
|
||
2679C55D000
|
trusted library allocation
|
page read and write
|
||
26799FEE000
|
trusted library allocation
|
page read and write
|
||
267A394A000
|
trusted library allocation
|
page read and write
|
||
26799951000
|
trusted library allocation
|
page read and write
|
||
2679548A000
|
trusted library allocation
|
page read and write
|
||
267A2CFE000
|
trusted library allocation
|
page read and write
|
||
26799DFA000
|
trusted library allocation
|
page read and write
|
||
267972B1000
|
trusted library allocation
|
page read and write
|
||
26796928000
|
trusted library allocation
|
page read and write
|
||
2679A05E000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
2679C490000
|
trusted library allocation
|
page read and write
|
||
2679BF48000
|
trusted library allocation
|
page read and write
|
||
2679C59F000
|
trusted library allocation
|
page read and write
|
||
2679BEBB000
|
trusted library allocation
|
page read and write
|
||
26796CC7000
|
trusted library allocation
|
page read and write
|
||
99D1D8000
|
stack
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
267969A7000
|
trusted library allocation
|
page read and write
|
||
2679C6E4000
|
trusted library allocation
|
page read and write
|
||
267A2C5A000
|
trusted library allocation
|
page read and write
|
||
267981DF000
|
trusted library allocation
|
page read and write
|
||
26797B08000
|
trusted library allocation
|
page read and write
|
||
2679D05B000
|
trusted library allocation
|
page read and write
|
||
2679BDA7000
|
trusted library allocation
|
page read and write
|
||
26799951000
|
trusted library allocation
|
page read and write
|
||
267A3D40000
|
trusted library allocation
|
page read and write
|
||
2679BAAB000
|
trusted library allocation
|
page read and write
|
||
2679B85A000
|
trusted library allocation
|
page read and write
|
||
2679C68C000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
26796D80000
|
heap
|
page read and write
|
||
2679C47A000
|
trusted library allocation
|
page read and write
|
||
26795AB6000
|
trusted library allocation
|
page read and write
|
||
267A2CFE000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
267981DC000
|
trusted library allocation
|
page read and write
|
||
2679D0A2000
|
trusted library allocation
|
page read and write
|
||
26799862000
|
trusted library allocation
|
page read and write
|
||
2679DBEC000
|
trusted library allocation
|
page read and write
|
||
267A3DFB000
|
trusted library allocation
|
page read and write
|
||
2679BFBE000
|
trusted library allocation
|
page read and write
|
||
26799880000
|
trusted library allocation
|
page read and write
|
||
1EC87D60000
|
heap
|
page read and write
|
||
2679C360000
|
trusted library allocation
|
page read and write
|
||
2679BCB3000
|
trusted library allocation
|
page read and write
|
||
2679BDA8000
|
trusted library allocation
|
page read and write
|
||
267A3DF4000
|
trusted library allocation
|
page read and write
|
||
267A605C000
|
trusted library allocation
|
page read and write
|
||
2679D0E2000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
2679C0CD000
|
trusted library allocation
|
page read and write
|
||
2679DBE8000
|
trusted library allocation
|
page read and write
|
||
2679C5D2000
|
trusted library allocation
|
page read and write
|
||
21AD9CD3000
|
heap
|
page read and write
|
||
267A2C77000
|
trusted library allocation
|
page read and write
|
||
2679BDC9000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
26799800000
|
trusted library allocation
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
267A2CA0000
|
trusted library allocation
|
page read and write
|
||
26796D3B000
|
heap
|
page read and write
|
||
267981D2000
|
trusted library allocation
|
page read and write
|
||
267A2C20000
|
trusted library allocation
|
page read and write
|
||
267A408C000
|
trusted library allocation
|
page read and write
|
||
26796B15000
|
trusted library allocation
|
page read and write
|
||
267A40BB000
|
trusted library allocation
|
page read and write
|
||
267A38E6000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
26799FF0000
|
trusted library allocation
|
page read and write
|
||
267A36C7000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
26799D6A000
|
trusted library allocation
|
page read and write
|
||
267A5716000
|
heap
|
page read and write
|
||
267A38F5000
|
trusted library allocation
|
page read and write
|
||
2679C4E3000
|
trusted library allocation
|
page read and write
|
||
2679AAF6000
|
trusted library allocation
|
page read and write
|
||
2679B16E000
|
trusted library allocation
|
page read and write
|
||
2679BF43000
|
trusted library allocation
|
page read and write
|
||
267A3863000
|
trusted library allocation
|
page read and write
|
||
26796BB6000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
2679BD68000
|
trusted library allocation
|
page read and write
|
||
26796D4E000
|
heap
|
page read and write
|
||
2679C361000
|
trusted library allocation
|
page read and write
|
||
26796C9A000
|
trusted library allocation
|
page read and write
|
||
2679C66F000
|
trusted library allocation
|
page read and write
|
||
2679C5A9000
|
trusted library allocation
|
page read and write
|
||
26796D39000
|
heap
|
page read and write
|
||
267A3DCF000
|
trusted library allocation
|
page read and write
|
||
26796D53000
|
heap
|
page read and write
|
||
267955FB000
|
trusted library allocation
|
page read and write
|
||
2679C4B8000
|
trusted library allocation
|
page read and write
|
||
2679A697000
|
trusted library allocation
|
page read and write
|
||
26796D41000
|
heap
|
page read and write
|
||
26796D41000
|
heap
|
page read and write
|
||
2679AAF6000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
2679C5BA000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
2679546E000
|
trusted library allocation
|
page read and write
|
||
267A60CB000
|
trusted library allocation
|
page read and write
|
||
26796B97000
|
trusted library allocation
|
page read and write
|
||
26796BC2000
|
trusted library allocation
|
page read and write
|
||
2679C0B0000
|
trusted library allocation
|
page read and write
|
||
26799C05000
|
heap
|
page read and write
|
||
267A3962000
|
trusted library allocation
|
page read and write
|
||
2679BCB3000
|
trusted library allocation
|
page read and write
|
||
26799F83000
|
trusted library allocation
|
page read and write
|
||
2679AAF8000
|
trusted library allocation
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
2679D0A2000
|
trusted library allocation
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
2679C5AC000
|
trusted library allocation
|
page read and write
|
||
26796D41000
|
heap
|
page read and write
|
||
26797F6D000
|
trusted library allocation
|
page read and write
|
||
2679B1C4000
|
trusted library allocation
|
page read and write
|
||
26796D3E000
|
heap
|
page read and write
|
||
26796D41000
|
heap
|
page read and write
|
||
2679C4C4000
|
trusted library allocation
|
page read and write
|
||
267A3AFD000
|
trusted library allocation
|
page read and write
|
||
26796BC6000
|
trusted library allocation
|
page read and write
|
||
2679B866000
|
trusted library allocation
|
page read and write
|
||
26796D41000
|
heap
|
page read and write
|
||
26796D30000
|
heap
|
page read and write
|
||
26796D7A000
|
heap
|
page read and write
|
||
2679C063000
|
trusted library allocation
|
page read and write
|
||
26795AB9000
|
trusted library allocation
|
page read and write
|
||
2A197FF000
|
stack
|
page read and write
|
||
1EC873D1000
|
unkown
|
page execute read
|
||
2679ADF8000
|
trusted library allocation
|
page read and write
|
||
26796CBC000
|
trusted library allocation
|
page read and write
|
||
2679DC6B000
|
trusted library allocation
|
page read and write
|
||
2679B85E000
|
trusted library allocation
|
page read and write
|
||
26795A9F000
|
trusted library allocation
|
page read and write
|
||
26796BDE000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
267A38D9000
|
trusted library allocation
|
page read and write
|
||
26796D41000
|
heap
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
26799D2F000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
26797F8A000
|
trusted library allocation
|
page read and write
|
||
2679BBC3000
|
trusted library allocation
|
page read and write
|
||
267A316D000
|
trusted library allocation
|
page read and write
|
||
21AD9D00000
|
trusted library allocation
|
page read and write
|
||
267A2C80000
|
trusted library allocation
|
page read and write
|
||
2679C575000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
267A60A1000
|
trusted library allocation
|
page read and write
|
||
26797275000
|
trusted library allocation
|
page read and write
|
||
2679C6E4000
|
trusted library allocation
|
page read and write
|
||
267986A1000
|
trusted library allocation
|
page read and write
|
||
267A2C93000
|
trusted library allocation
|
page read and write
|
||
26795DFC000
|
trusted library allocation
|
page read and write
|
||
26796D3A000
|
heap
|
page read and write
|
||
2679BCDC000
|
trusted library allocation
|
page read and write
|
||
26799E7F000
|
trusted library allocation
|
page read and write
|
||
267A2CEF000
|
trusted library allocation
|
page read and write
|
||
267A2CF1000
|
trusted library allocation
|
page read and write
|
||
2679C697000
|
trusted library allocation
|
page read and write
|
||
26796D5A000
|
heap
|
page read and write
|
||
26799BFC000
|
heap
|
page read and write
|
||
1FE448D0000
|
heap
|
page read and write
|
||
26796BFA000
|
trusted library allocation
|
page read and write
|
||
1DB6B020000
|
heap
|
page read and write
|
||
2679C0BB000
|
trusted library allocation
|
page read and write
|
||
2679981D000
|
trusted library allocation
|
page read and write
|
||
26796D5C000
|
heap
|
page read and write
|
||
26796B73000
|
trusted library allocation
|
page read and write
|
||
26796D84000
|
heap
|
page read and write
|
||
26796C56000
|
trusted library allocation
|
page read and write
|
||
26796D48000
|
heap
|
page read and write
|
||
267A35BE000
|
trusted library allocation
|
page read and write
|
||
267A6060000
|
trusted library allocation
|
page read and write
|
||
1EC87DE3000
|
heap
|
page read and write
|
||
267973F6000
|
trusted library allocation
|
page read and write
|
||
26797C86000
|
trusted library allocation
|
page read and write
|
||
1EC8817B000
|
heap
|
page read and write
|
||
1EC870B0000
|
heap
|
page read and write
|
||
26797C98000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
2679AAF8000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
1EC87D7D000
|
heap
|
page read and write
|
||
26796D49000
|
heap
|
page read and write
|
||
26795AA7000
|
trusted library allocation
|
page read and write
|
||
1EC8817B000
|
heap
|
page read and write
|
||
1EC88183000
|
heap
|
page read and write
|
||
267A2C80000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
26799D3E000
|
trusted library allocation
|
page read and write
|
||
26797F7A000
|
trusted library allocation
|
page read and write
|
||
2679A287000
|
trusted library allocation
|
page read and write
|
||
1EC873E0000
|
unkown
|
page execute read
|
||
1DB6B4B6000
|
heap
|
page read and write
|
||
2679D09E000
|
trusted library allocation
|
page read and write
|
||
267A60A4000
|
trusted library allocation
|
page read and write
|
||
26797C66000
|
trusted library allocation
|
page read and write
|
||
2679989B000
|
trusted library allocation
|
page read and write
|
||
26796CF6000
|
trusted library allocation
|
page read and write
|
||
267A2C6B000
|
trusted library allocation
|
page read and write
|
||
26797F4E000
|
trusted library allocation
|
page read and write
|
||
1EC88197000
|
heap
|
page read and write
|
||
2679C5A9000
|
trusted library allocation
|
page read and write
|
||
2679C445000
|
trusted library allocation
|
page read and write
|
||
267A35BE000
|
trusted library allocation
|
page read and write
|
||
26796B83000
|
trusted library allocation
|
page read and write
|
||
2679BDC3000
|
trusted library allocation
|
page read and write
|
||
267A364E000
|
trusted library allocation
|
page read and write
|
||
2679B1B7000
|
trusted library allocation
|
page read and write
|
||
2679BC71000
|
trusted library allocation
|
page read and write
|
||
1EC87D6C000
|
heap
|
page read and write
|
||
267A2C4F000
|
trusted library allocation
|
page read and write
|
||
26795DCD000
|
trusted library allocation
|
page read and write
|
||
26797F5C000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
2679C5C8000
|
trusted library allocation
|
page read and write
|
||
26797FBD000
|
trusted library allocation
|
page read and write
|
||
267A3D47000
|
trusted library allocation
|
page read and write
|
||
2679A074000
|
trusted library allocation
|
page read and write
|
||
2679BF41000
|
trusted library allocation
|
page read and write
|
||
267A36DD000
|
trusted library allocation
|
page read and write
|
||
267A6096000
|
trusted library allocation
|
page read and write
|
||
2679A0FD000
|
trusted library allocation
|
page read and write
|
||
1DB6B30E000
|
trusted library allocation
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
2679C496000
|
trusted library allocation
|
page read and write
|
||
2679D0DC000
|
trusted library allocation
|
page read and write
|
||
17F9D19D000
|
heap
|
page read and write
|
||
26799885000
|
trusted library allocation
|
page read and write
|
||
1DB6AFE0000
|
remote allocation
|
page read and write
|
||
26796D43000
|
heap
|
page read and write
|
||
2679C096000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
2679D03C000
|
trusted library allocation
|
page read and write
|
||
267A3D50000
|
trusted library allocation
|
page read and write
|
||
26799F92000
|
trusted library allocation
|
page read and write
|
||
2679C59F000
|
trusted library allocation
|
page read and write
|
||
2679C58C000
|
trusted library allocation
|
page read and write
|
||
FDC000
|
unkown
|
page readonly
|
||
2679D067000
|
trusted library allocation
|
page read and write
|
||
2679C08A000
|
trusted library allocation
|
page read and write
|
||
26796D3C000
|
heap
|
page read and write
|
||
267A36C7000
|
trusted library allocation
|
page read and write
|
||
26795923000
|
trusted library allocation
|
page read and write
|
||
267981C0000
|
trusted library allocation
|
page read and write
|
||
2F6CCFB000
|
stack
|
page read and write
|
||
267A38FC000
|
trusted library allocation
|
page read and write
|
||
2679DB92000
|
trusted library allocation
|
page read and write
|
||
267A60CB000
|
trusted library allocation
|
page read and write
|
||
2679C596000
|
trusted library allocation
|
page read and write
|
||
267A3D56000
|
trusted library allocation
|
page read and write
|
||
2679C54E000
|
trusted library allocation
|
page read and write
|
||
2679B841000
|
trusted library allocation
|
page read and write
|
||
26796A65000
|
trusted library allocation
|
page read and write
|
||
26799BFB000
|
heap
|
page read and write
|
||
99E9FE000
|
unkown
|
page readonly
|
||
21AD9ECB000
|
trusted library allocation
|
page read and write
|
||
2679BE88000
|
trusted library allocation
|
page read and write
|
||
2679C0F8000
|
trusted library allocation
|
page read and write
|
||
267A39B4000
|
trusted library allocation
|
page read and write
|
||
2679BA88000
|
trusted library allocation
|
page read and write
|
||
267973FB000
|
trusted library allocation
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
26796D84000
|
heap
|
page read and write
|
||
1DB6B30C000
|
trusted library allocation
|
page read and write
|
||
26799F63000
|
trusted library allocation
|
page read and write
|
||
2679C47E000
|
trusted library allocation
|
page read and write
|
||
26799C53000
|
heap
|
page read and write
|
||
2679BE07000
|
trusted library allocation
|
page read and write
|
||
1EC87492000
|
trusted library allocation
|
page read and write
|
||
267A3174000
|
trusted library allocation
|
page read and write
|
||
2679B828000
|
trusted library allocation
|
page read and write
|
||
26796CF3000
|
trusted library allocation
|
page read and write
|
||
26799951000
|
trusted library allocation
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
26796D3C000
|
heap
|
page read and write
|
||
26796D3D000
|
heap
|
page read and write
|
||
1EC87DE8000
|
heap
|
page read and write
|
||
1DB6B3B5000
|
trusted library allocation
|
page read and write
|
||
26799880000
|
trusted library allocation
|
page read and write
|
||
1EC87DEB000
|
heap
|
page read and write
|
||
21AD9A80000
|
remote allocation
|
page read and write
|
||
26797F7B000
|
trusted library allocation
|
page read and write
|
||
2679BC7D000
|
trusted library allocation
|
page read and write
|
||
2679537B000
|
trusted library allocation
|
page read and write
|
||
26797F6C000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
26796D84000
|
heap
|
page read and write
|
||
267A314C000
|
trusted library allocation
|
page read and write
|
||
26799DD8000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
1EC88185000
|
heap
|
page read and write
|
||
267A2C66000
|
trusted library allocation
|
page read and write
|
||
26797C49000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
2679B8CC000
|
trusted library allocation
|
page read and write
|
||
267A36D1000
|
trusted library allocation
|
page read and write
|
||
3DE0000
|
heap
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
1EC87D5C000
|
heap
|
page read and write
|
||
2679C33F000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
267955C8000
|
trusted library allocation
|
page read and write
|
||
17F9D475000
|
heap
|
page read and write
|
||
267A605C000
|
trusted library allocation
|
page read and write
|
||
267A5EDE000
|
trusted library allocation
|
page read and write
|
||
267A38EB000
|
trusted library allocation
|
page read and write
|
||
26796D5A000
|
heap
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
2679DBA0000
|
trusted library allocation
|
page read and write
|
||
2679BCDC000
|
trusted library allocation
|
page read and write
|
||
26796B9B000
|
trusted library allocation
|
page read and write
|
||
267A2CF6000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
26798164000
|
trusted library allocation
|
page read and write
|
||
2679BCF7000
|
trusted library allocation
|
page read and write
|
||
267A3D23000
|
trusted library allocation
|
page read and write
|
||
26799C53000
|
heap
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
2679D037000
|
trusted library allocation
|
page read and write
|
||
2679D0DA000
|
trusted library allocation
|
page read and write
|
||
1EC87D9C000
|
heap
|
page read and write
|
||
26796B65000
|
trusted library allocation
|
page read and write
|
||
26798186000
|
trusted library allocation
|
page read and write
|
||
2679C517000
|
trusted library allocation
|
page read and write
|
||
2679BF6C000
|
trusted library allocation
|
page read and write
|
||
2679A2D9000
|
trusted library allocation
|
page read and write
|
||
21AD9E66000
|
trusted library allocation
|
page read and write
|
||
267A2C08000
|
trusted library allocation
|
page read and write
|
||
267A39FC000
|
trusted library allocation
|
page read and write
|
||
2A177FF000
|
stack
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
26796D4A000
|
heap
|
page read and write
|
||
26796D84000
|
heap
|
page read and write
|
||
26796D41000
|
heap
|
page read and write
|
||
2679C684000
|
trusted library allocation
|
page read and write
|
||
2679545A000
|
trusted library allocation
|
page read and write
|
||
267A408C000
|
trusted library allocation
|
page read and write
|
||
2679C0CF000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
2679C4C2000
|
trusted library allocation
|
page read and write
|
||
26796D84000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
267A34E2000
|
trusted library allocation
|
page read and write
|
||
267A605C000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
2679B831000
|
trusted library allocation
|
page read and write
|
||
1EC87D08000
|
heap
|
page read and write
|
||
26799D70000
|
trusted library allocation
|
page read and write
|
||
267981DF000
|
trusted library allocation
|
page read and write
|
||
2679DB84000
|
trusted library allocation
|
page read and write
|
||
267A39DA000
|
trusted library allocation
|
page read and write
|
||
2679C058000
|
trusted library allocation
|
page read and write
|
||
1DB6B1AF000
|
unclassified section
|
page read and write
|
||
1DB6B190000
|
heap
|
page readonly
|
||
26796D32000
|
heap
|
page read and write
|
||
26796B87000
|
trusted library allocation
|
page read and write
|
||
267A3D3E000
|
trusted library allocation
|
page read and write
|
||
2679C6F1000
|
trusted library allocation
|
page read and write
|
||
26796D39000
|
heap
|
page read and write
|
||
2679BBD3000
|
trusted library allocation
|
page read and write
|
||
267A6074000
|
trusted library allocation
|
page read and write
|
||
26799F43000
|
trusted library allocation
|
page read and write
|
||
267A39C4000
|
trusted library allocation
|
page read and write
|
||
267A3DBF000
|
trusted library allocation
|
page read and write
|
||
2679B85A000
|
trusted library allocation
|
page read and write
|
||
26799FF0000
|
trusted library allocation
|
page read and write
|
||
1EC87400000
|
trusted library allocation
|
page read and write
|
||
2679B8DE000
|
trusted library allocation
|
page read and write
|
||
26799DEA000
|
trusted library allocation
|
page read and write
|
||
267A3DFB000
|
trusted library allocation
|
page read and write
|
||
267A5EE3000
|
trusted library allocation
|
page read and write
|
||
2679D025000
|
trusted library allocation
|
page read and write
|
||
2679B843000
|
trusted library allocation
|
page read and write
|
||
267973D2000
|
trusted library allocation
|
page read and write
|
||
267A369F000
|
trusted library allocation
|
page read and write
|
||
267A3D3E000
|
trusted library allocation
|
page read and write
|
||
21AD9E12000
|
trusted library allocation
|
page read and write
|
||
2679ADD4000
|
trusted library allocation
|
page read and write
|
||
26799D53000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
2679A2FD000
|
trusted library allocation
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
2679C5A9000
|
trusted library allocation
|
page read and write
|
||
D6E000
|
stack
|
page read and write
|
||
267955F5000
|
trusted library allocation
|
page read and write
|
||
2679C598000
|
trusted library allocation
|
page read and write
|
||
267A60CB000
|
trusted library allocation
|
page read and write
|
||
26796D57000
|
heap
|
page read and write
|
||
26796D2B000
|
heap
|
page read and write
|
||
1EC87D5C000
|
heap
|
page read and write
|
||
26797FD3000
|
trusted library allocation
|
page read and write
|
||
2679C6B7000
|
trusted library allocation
|
page read and write
|
||
267A315C000
|
trusted library allocation
|
page read and write
|
||
2679B8C3000
|
trusted library allocation
|
page read and write
|
||
2679BE0D000
|
trusted library allocation
|
page read and write
|
||
267A2C79000
|
trusted library allocation
|
page read and write
|
||
26796B83000
|
trusted library allocation
|
page read and write
|
||
267A2CA0000
|
trusted library allocation
|
page read and write
|
||
2679544C000
|
trusted library allocation
|
page read and write
|
||
267A3DE9000
|
trusted library allocation
|
page read and write
|
||
267A5706000
|
heap
|
page read and write
|
||
26797FA4000
|
trusted library allocation
|
page read and write
|
||
26799F30000
|
trusted library allocation
|
page read and write
|
||
1EC88160000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
267A3D55000
|
trusted library allocation
|
page read and write
|
||
2679BD8B000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
26797FAE000
|
trusted library allocation
|
page read and write
|
||
267A3AFB000
|
trusted library allocation
|
page read and write
|
||
1DB6B369000
|
trusted library allocation
|
page read and write
|
||
2679C0F3000
|
trusted library allocation
|
page read and write
|
||
6B79B89000
|
trusted library allocation
|
page read and write
|
||
267A40CA000
|
trusted library allocation
|
page read and write
|
||
26799DB0000
|
trusted library allocation
|
page read and write
|
||
26795D0D000
|
trusted library allocation
|
page read and write
|
||
2679BDC1000
|
trusted library allocation
|
page read and write
|
||
267A3A93000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
2679A2B4000
|
trusted library allocation
|
page read and write
|
||
2679992B000
|
trusted library allocation
|
page read and write
|
||
2679BF8D000
|
trusted library allocation
|
page read and write
|
||
267A35DD000
|
trusted library allocation
|
page read and write
|
||
26798178000
|
trusted library allocation
|
page read and write
|
||
2679C528000
|
trusted library allocation
|
page read and write
|
||
1EC874F9000
|
trusted library allocation
|
page read and write
|
||
26796D48000
|
heap
|
page read and write
|
||
2679BDC4000
|
trusted library allocation
|
page read and write
|
||
267A3875000
|
trusted library allocation
|
page read and write
|
||
26797CC8000
|
trusted library allocation
|
page read and write
|
||
26796D84000
|
heap
|
page read and write
|
||
267A3AA3000
|
trusted library allocation
|
page read and write
|
||
2679DCAF000
|
trusted library allocation
|
page read and write
|
||
26796D3E000
|
heap
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
26799FF4000
|
trusted library allocation
|
page read and write
|
||
26799D50000
|
trusted library allocation
|
page read and write
|
||
1DB6B70C000
|
trusted library allocation
|
page read and write
|
||
267A315C000
|
trusted library allocation
|
page read and write
|
||
267A2CA5000
|
trusted library allocation
|
page read and write
|
||
26799E5D000
|
trusted library allocation
|
page read and write
|
||
2679C0EF000
|
trusted library allocation
|
page read and write
|
||
2679AAFE000
|
trusted library allocation
|
page read and write
|
||
1EC88169000
|
heap
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
267A56E1000
|
heap
|
page read and write
|
||
2679DB9F000
|
trusted library allocation
|
page read and write
|
||
267A39F3000
|
trusted library allocation
|
page read and write
|
||
26795D66000
|
trusted library allocation
|
page read and write
|
||
2679BCB3000
|
trusted library allocation
|
page read and write
|
||
26796D5A000
|
heap
|
page read and write
|
||
267973FB000
|
trusted library allocation
|
page read and write
|
||
26795971000
|
trusted library allocation
|
page read and write
|
||
2679C5BA000
|
trusted library allocation
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
26796D42000
|
heap
|
page read and write
|
||
26795D1F000
|
trusted library allocation
|
page read and write
|
||
267A3165000
|
trusted library allocation
|
page read and write
|
||
26798149000
|
trusted library allocation
|
page read and write
|
||
2679732F000
|
trusted library allocation
|
page read and write
|
||
26796D51000
|
heap
|
page read and write
|
||
267A2C5A000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
2679C4C2000
|
trusted library allocation
|
page read and write
|
||
2679B854000
|
trusted library allocation
|
page read and write
|
||
267998BC000
|
trusted library allocation
|
page read and write
|
||
2679D032000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
267A3888000
|
trusted library allocation
|
page read and write
|
||
2679B1AA000
|
trusted library allocation
|
page read and write
|
||
26796BF3000
|
trusted library allocation
|
page read and write
|
||
1EC87D63000
|
heap
|
page read and write
|
||
26798189000
|
trusted library allocation
|
page read and write
|
||
267A2C12000
|
trusted library allocation
|
page read and write
|
||
26796BF3000
|
trusted library allocation
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
26799FE6000
|
trusted library allocation
|
page read and write
|
||
2679C0D3000
|
trusted library allocation
|
page read and write
|
||
2679ADC9000
|
trusted library allocation
|
page read and write
|
||
26797262000
|
trusted library allocation
|
page read and write
|
||
267A3687000
|
trusted library allocation
|
page read and write
|
||
267A40B1000
|
trusted library allocation
|
page read and write
|
||
CDCDBFF000
|
stack
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
2679C66B000
|
trusted library allocation
|
page read and write
|
||
2679DBFE000
|
trusted library allocation
|
page read and write
|
||
267A2C74000
|
trusted library allocation
|
page read and write
|
||
2679C34F000
|
trusted library allocation
|
page read and write
|
||
267A2C77000
|
trusted library allocation
|
page read and write
|
||
26796D48000
|
heap
|
page read and write
|
||
1EC87DE9000
|
heap
|
page read and write
|
||
267A60A1000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
26796D2B000
|
heap
|
page read and write
|
||
2679BE0D000
|
trusted library allocation
|
page read and write
|
||
26796BFA000
|
trusted library allocation
|
page read and write
|
||
1DB6B3C8000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
2679D020000
|
trusted library allocation
|
page read and write
|
||
2679989C000
|
trusted library allocation
|
page read and write
|
||
2679DBFE000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
26799DED000
|
trusted library allocation
|
page read and write
|
||
2679987E000
|
trusted library allocation
|
page read and write
|
||
2679AAFE000
|
trusted library allocation
|
page read and write
|
||
1EC87474000
|
trusted library allocation
|
page read and write
|
||
26796D42000
|
heap
|
page read and write
|
||
267A3661000
|
trusted library allocation
|
page read and write
|
||
2679B83A000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
26796A5D000
|
trusted library allocation
|
page read and write
|
||
267A3DCF000
|
trusted library allocation
|
page read and write
|
||
26799FF4000
|
trusted library allocation
|
page read and write
|
||
267A6023000
|
trusted library allocation
|
page read and write
|
||
267A2C80000
|
trusted library allocation
|
page read and write
|
||
267A35AE000
|
trusted library allocation
|
page read and write
|
||
2679BE88000
|
trusted library allocation
|
page read and write
|
||
267A3AF2000
|
trusted library allocation
|
page read and write
|
||
267A3159000
|
trusted library allocation
|
page read and write
|
||
26799C0D000
|
heap
|
page read and write
|
||
26799865000
|
trusted library allocation
|
page read and write
|
||
2679C445000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
1EC88199000
|
heap
|
page read and write
|
||
26799D7B000
|
trusted library allocation
|
page read and write
|
||
267A3692000
|
trusted library allocation
|
page read and write
|
||
267A60A4000
|
trusted library allocation
|
page read and write
|
||
267A2CF6000
|
trusted library allocation
|
page read and write
|
||
2679C59F000
|
trusted library allocation
|
page read and write
|
||
267A35DD000
|
trusted library allocation
|
page read and write
|
||
267A35FA000
|
trusted library allocation
|
page read and write
|
||
2679B1CC000
|
trusted library allocation
|
page read and write
|
||
2679A2C5000
|
trusted library allocation
|
page read and write
|
||
1EC87332000
|
unclassified section
|
page read and write
|
||
2679993B000
|
trusted library allocation
|
page read and write
|
||
267981DF000
|
trusted library allocation
|
page read and write
|
||
2679D04F000
|
trusted library allocation
|
page read and write
|
||
26796928000
|
trusted library allocation
|
page read and write
|
||
267A6000000
|
trusted library allocation
|
page read and write
|
||
26796D5A000
|
heap
|
page read and write
|
||
2679B86B000
|
trusted library allocation
|
page read and write
|
||
26797C17000
|
trusted library allocation
|
page read and write
|
||
2679D09A000
|
trusted library allocation
|
page read and write
|
||
2679C5AC000
|
trusted library allocation
|
page read and write
|
||
26796D5A000
|
heap
|
page read and write
|
||
26799FE6000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
2679C5C8000
|
trusted library allocation
|
page read and write
|
||
2679C584000
|
trusted library allocation
|
page read and write
|
||
2679BBB7000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
2679AAB2000
|
trusted library allocation
|
page read and write
|
||
26796D48000
|
heap
|
page read and write
|
||
2679C0BB000
|
trusted library allocation
|
page read and write
|
||
2679BF40000
|
trusted library allocation
|
page read and write
|
||
26796D3D000
|
heap
|
page read and write
|
||
267A3D52000
|
trusted library allocation
|
page read and write
|
||
267A3947000
|
trusted library allocation
|
page read and write
|
||
267A409B000
|
trusted library allocation
|
page read and write
|
||
267A3633000
|
trusted library allocation
|
page read and write
|
||
26799D98000
|
trusted library allocation
|
page read and write
|
||
267981FE000
|
trusted library allocation
|
page read and write
|
||
26797287000
|
trusted library allocation
|
page read and write
|
||
267A3D55000
|
trusted library allocation
|
page read and write
|
||
26799C16000
|
heap
|
page read and write
|
||
1DB6B373000
|
trusted library allocation
|
page read and write
|
||
26796D3B000
|
heap
|
page read and write
|
||
21AD9EB7000
|
trusted library allocation
|
page read and write
|
||
26796D80000
|
heap
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
1EC874BF000
|
trusted library allocation
|
page read and write
|
||
267A35D6000
|
trusted library allocation
|
page read and write
|
||
2679C5D6000
|
trusted library allocation
|
page read and write
|
||
26795DBF000
|
trusted library allocation
|
page read and write
|
||
26799FF4000
|
trusted library allocation
|
page read and write
|
||
26796D33000
|
heap
|
page read and write
|
||
2679DBAD000
|
trusted library allocation
|
page read and write
|
||
267A60CB000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
2679C5D6000
|
trusted library allocation
|
page read and write
|
||
2679BBF0000
|
trusted library allocation
|
page read and write
|
||
267A2C68000
|
trusted library allocation
|
page read and write
|
||
267969E4000
|
trusted library allocation
|
page read and write
|
||
267981FE000
|
trusted library allocation
|
page read and write
|
||
2679ADF0000
|
trusted library allocation
|
page read and write
|
||
267A60CB000
|
trusted library allocation
|
page read and write
|
||
26796D4C000
|
heap
|
page read and write
|
||
26796BB6000
|
trusted library allocation
|
page read and write
|
||
26797262000
|
trusted library allocation
|
page read and write
|
||
2679BE32000
|
trusted library allocation
|
page read and write
|
||
2679C5D6000
|
trusted library allocation
|
page read and write
|
||
267A2C17000
|
trusted library allocation
|
page read and write
|
||
267A3160000
|
trusted library allocation
|
page read and write
|
||
267959F6000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
267A4090000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
267A2C44000
|
trusted library allocation
|
page read and write
|
||
2679A2B4000
|
trusted library allocation
|
page read and write
|
||
26795DAA000
|
trusted library allocation
|
page read and write
|
||
26797FB1000
|
trusted library allocation
|
page read and write
|
||
26799DFA000
|
trusted library allocation
|
page read and write
|
||
26797FC1000
|
trusted library allocation
|
page read and write
|
||
2679A2E2000
|
trusted library allocation
|
page read and write
|
||
267A40B8000
|
trusted library allocation
|
page read and write
|
||
2679C5A4000
|
trusted library allocation
|
page read and write
|
||
267A3668000
|
trusted library allocation
|
page read and write
|
||
26797CC8000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
21AD9F00000
|
unclassified section
|
page readonly
|
||
267A2C3E000
|
trusted library allocation
|
page read and write
|
||
267A2CEF000
|
trusted library allocation
|
page read and write
|
||
267A2C9B000
|
trusted library allocation
|
page read and write
|
||
1002000
|
unkown
|
page readonly
|
||
2F6DDFE000
|
unkown
|
page readonly
|
||
267981AD000
|
trusted library allocation
|
page read and write
|
||
267969A7000
|
trusted library allocation
|
page read and write
|
||
1EC87477000
|
trusted library allocation
|
page read and write
|
||
26798157000
|
trusted library allocation
|
page read and write
|
||
267A409F000
|
trusted library allocation
|
page read and write
|
||
26797C47000
|
trusted library allocation
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
2679C5D0000
|
trusted library allocation
|
page read and write
|
||
267A3DD9000
|
trusted library allocation
|
page read and write
|
||
267999D4000
|
trusted library allocation
|
page read and write
|
||
267A3D50000
|
trusted library allocation
|
page read and write
|
||
2679C57E000
|
trusted library allocation
|
page read and write
|
||
26799DFE000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
17F9EDA0000
|
heap
|
page read and write
|
||
1EC87D5F000
|
heap
|
page read and write
|
||
2679C4BB000
|
trusted library allocation
|
page read and write
|
||
26799F92000
|
trusted library allocation
|
page read and write
|
||
26799FF3000
|
trusted library allocation
|
page read and write
|
||
26798680000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
2679A2C5000
|
trusted library allocation
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
1EC873D4000
|
unkown
|
page execute read
|
||
26797C9F000
|
trusted library allocation
|
page read and write
|
||
2679BDC3000
|
trusted library allocation
|
page read and write
|
||
267A366A000
|
trusted library allocation
|
page read and write
|
||
2679C5A4000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
1EC87380000
|
trusted library allocation
|
page read and write
|
||
2679C496000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
2679AAFA000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
2679C59C000
|
trusted library allocation
|
page read and write
|
||
26799DED000
|
trusted library allocation
|
page read and write
|
||
26796D4E000
|
heap
|
page read and write
|
||
2679C35D000
|
trusted library allocation
|
page read and write
|
||
2679A0B3000
|
trusted library allocation
|
page read and write
|
||
26796D80000
|
heap
|
page read and write
|
||
267A3AC6000
|
trusted library allocation
|
page read and write
|
||
2679DBEC000
|
trusted library allocation
|
page read and write
|
||
267A6023000
|
trusted library allocation
|
page read and write
|
||
2679C4FC000
|
trusted library allocation
|
page read and write
|
||
267986EB000
|
trusted library allocation
|
page read and write
|
||
26799FF2000
|
trusted library allocation
|
page read and write
|
||
267A3DBF000
|
trusted library allocation
|
page read and write
|
||
2679AAF8000
|
trusted library allocation
|
page read and write
|
||
26795A75000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
2679C0F8000
|
trusted library allocation
|
page read and write
|
||
2679DBE6000
|
trusted library allocation
|
page read and write
|
||
267A5ECA000
|
trusted library allocation
|
page read and write
|
||
1DB6B324000
|
trusted library allocation
|
page read and write
|
||
26796D33000
|
heap
|
page read and write
|
||
26795DC3000
|
trusted library allocation
|
page read and write
|
||
26799C1F000
|
heap
|
page read and write
|
||
21AD9B00000
|
heap
|
page read and write
|
||
26799E82000
|
trusted library allocation
|
page read and write
|
||
26796D80000
|
heap
|
page read and write
|
||
267A3AFD000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
26797FAE000
|
trusted library allocation
|
page read and write
|
||
267981BE000
|
trusted library allocation
|
page read and write
|
||
2679B83A000
|
trusted library allocation
|
page read and write
|
||
2679B82C000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
2679C6E2000
|
trusted library allocation
|
page read and write
|
||
26797F54000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
26797C57000
|
trusted library allocation
|
page read and write
|
||
26797CC8000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
267981AE000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
2679709B000
|
trusted library allocation
|
page read and write
|
||
2679BDB2000
|
trusted library allocation
|
page read and write
|
||
2679B198000
|
trusted library allocation
|
page read and write
|
||
2679A0A0000
|
trusted library allocation
|
page read and write
|
||
2679AAF6000
|
trusted library allocation
|
page read and write
|
||
26799D50000
|
trusted library allocation
|
page read and write
|
||
26796D2B000
|
heap
|
page read and write
|
||
2679C574000
|
trusted library allocation
|
page read and write
|
||
267954DA000
|
trusted library allocation
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
267A3D55000
|
trusted library allocation
|
page read and write
|
||
26795A26000
|
trusted library allocation
|
page read and write
|
||
267A319E000
|
trusted library allocation
|
page read and write
|
||
2F6C3FE000
|
stack
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
26796A34000
|
trusted library allocation
|
page read and write
|
||
1EC87486000
|
trusted library allocation
|
page read and write
|
||
2679C659000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
2679A2FB000
|
trusted library allocation
|
page read and write
|
||
267969E7000
|
trusted library allocation
|
page read and write
|
||
267A3DE6000
|
trusted library allocation
|
page read and write
|
||
26797CC8000
|
trusted library allocation
|
page read and write
|
||
26799FF0000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
2679C58F000
|
trusted library allocation
|
page read and write
|
||
26799C1F000
|
heap
|
page read and write
|
||
2679AAEC000
|
trusted library allocation
|
page read and write
|
||
2679C44B000
|
trusted library allocation
|
page read and write
|
||
2679C508000
|
trusted library allocation
|
page read and write
|
||
26796B9E000
|
trusted library allocation
|
page read and write
|
||
267A575E000
|
heap
|
page read and write
|
||
99FA7E000
|
unkown
|
page readonly
|
||
2679D063000
|
trusted library allocation
|
page read and write
|
||
154C000
|
heap
|
page read and write
|
||
26797F9F000
|
trusted library allocation
|
page read and write
|
||
267973F8000
|
trusted library allocation
|
page read and write
|
||
267A2C35000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
2679C59F000
|
trusted library allocation
|
page read and write
|
||
26797CC8000
|
trusted library allocation
|
page read and write
|
||
26799D9B000
|
trusted library allocation
|
page read and write
|
||
267A574B000
|
heap
|
page read and write
|
||
2679C088000
|
trusted library allocation
|
page read and write
|
||
267A5751000
|
heap
|
page read and write
|
||
2679D0B2000
|
trusted library allocation
|
page read and write
|
||
26796D4A000
|
heap
|
page read and write
|
||
26796C2F000
|
trusted library allocation
|
page read and write
|
||
26795AA7000
|
trusted library allocation
|
page read and write
|
||
6C6F9D8000
|
stack
|
page read and write
|
||
267A5769000
|
heap
|
page read and write
|
||
26799C42000
|
heap
|
page read and write
|
||
267A60B9000
|
trusted library allocation
|
page read and write
|
||
26795DC3000
|
trusted library allocation
|
page read and write
|
||
2679C57B000
|
trusted library allocation
|
page read and write
|
||
267973CD000
|
trusted library allocation
|
page read and write
|
||
26799942000
|
trusted library allocation
|
page read and write
|
||
267A605A000
|
trusted library allocation
|
page read and write
|
||
26799C53000
|
heap
|
page read and write
|
||
26799919000
|
trusted library allocation
|
page read and write
|
||
26799873000
|
trusted library allocation
|
page read and write
|
||
2679B18B000
|
trusted library allocation
|
page read and write
|
||
26796D4A000
|
heap
|
page read and write
|
||
26796D51000
|
heap
|
page read and write
|
||
26799C16000
|
heap
|
page read and write
|
||
2679B854000
|
trusted library allocation
|
page read and write
|
||
1EC873C0000
|
trusted library allocation
|
page read and write
|
||
4B9F000
|
stack
|
page read and write
|
||
267A2C79000
|
trusted library allocation
|
page read and write
|
||
2679C4C4000
|
trusted library allocation
|
page read and write
|
||
267A2CF1000
|
trusted library allocation
|
page read and write
|
||
26795DFC000
|
trusted library allocation
|
page read and write
|
||
26797FD5000
|
trusted library allocation
|
page read and write
|
||
267A389B000
|
trusted library allocation
|
page read and write
|
||
26796D54000
|
heap
|
page read and write
|
||
26799FAB000
|
trusted library allocation
|
page read and write
|
||
1DB6B420000
|
unclassified section
|
page readonly
|
||
D2D000
|
stack
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
267A2C80000
|
trusted library allocation
|
page read and write
|
||
26796D4E000
|
heap
|
page read and write
|
||
DB5000
|
heap
|
page read and write
|
||
267A2CF3000
|
trusted library allocation
|
page read and write
|
||
2679B1EB000
|
trusted library allocation
|
page read and write
|
||
2679ADA9000
|
trusted library allocation
|
page read and write
|
||
CDCD3FF000
|
stack
|
page read and write
|
||
2679C5B5000
|
trusted library allocation
|
page read and write
|
||
267A2CE8000
|
trusted library allocation
|
page read and write
|
||
1EC87DE6000
|
heap
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
1EC87DF1000
|
heap
|
page read and write
|
||
267A2C32000
|
trusted library allocation
|
page read and write
|
||
26799DA6000
|
trusted library allocation
|
page read and write
|
||
2679BF48000
|
trusted library allocation
|
page read and write
|
||
2679BE0D000
|
trusted library allocation
|
page read and write
|
||
267A605A000
|
trusted library allocation
|
page read and write
|
||
267972DB000
|
trusted library allocation
|
page read and write
|
||
267A2CA0000
|
trusted library allocation
|
page read and write
|
||
2679A6A2000
|
trusted library allocation
|
page read and write
|
||
267A2C6B000
|
trusted library allocation
|
page read and write
|
||
267981DF000
|
trusted library allocation
|
page read and write
|
||
267A40B0000
|
trusted library allocation
|
page read and write
|
||
267A3D23000
|
trusted library allocation
|
page read and write
|
||
267A4088000
|
trusted library allocation
|
page read and write
|
||
267A38D4000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
267A6023000
|
trusted library allocation
|
page read and write
|
||
267972FE000
|
trusted library allocation
|
page read and write
|
||
267A38E9000
|
trusted library allocation
|
page read and write
|
||
26796D5A000
|
heap
|
page read and write
|
||
2679C5AA000
|
trusted library allocation
|
page read and write
|
||
26796BE7000
|
trusted library allocation
|
page read and write
|
||
26796A3A000
|
trusted library allocation
|
page read and write
|
||
6C722FE000
|
unkown
|
page readonly
|
||
2679BB8B000
|
trusted library allocation
|
page read and write
|
||
26797F37000
|
trusted library allocation
|
page read and write
|
||
2679986C000
|
trusted library allocation
|
page read and write
|
||
2679B841000
|
trusted library allocation
|
page read and write
|
||
2679BEAF000
|
trusted library allocation
|
page read and write
|
||
1EC87D69000
|
heap
|
page read and write
|
||
2679D06F000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
21AD9E81000
|
trusted library allocation
|
page read and write
|
||
26796D2B000
|
heap
|
page read and write
|
||
2679C0F1000
|
trusted library allocation
|
page read and write
|
||
267A35F8000
|
trusted library allocation
|
page read and write
|
||
1DB6B318000
|
trusted library allocation
|
page read and write
|
||
26799DEA000
|
trusted library allocation
|
page read and write
|
||
2679BEAF000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
267955D5000
|
trusted library allocation
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
2679D025000
|
trusted library allocation
|
page read and write
|
||
2679869E000
|
trusted library allocation
|
page read and write
|
||
267A3D57000
|
trusted library allocation
|
page read and write
|
||
2679BE24000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
267986FC000
|
trusted library allocation
|
page read and write
|
||
2679C051000
|
trusted library allocation
|
page read and write
|
||
2679BD73000
|
trusted library allocation
|
page read and write
|
||
26796D42000
|
heap
|
page read and write
|
||
26797FD5000
|
trusted library allocation
|
page read and write
|
||
2679B841000
|
trusted library allocation
|
page read and write
|
||
26799832000
|
trusted library allocation
|
page read and write
|
||
2679C6E9000
|
trusted library allocation
|
page read and write
|
||
267972DA000
|
trusted library allocation
|
page read and write
|
||
26797C81000
|
trusted library allocation
|
page read and write
|
||
1523000
|
heap
|
page read and write
|
||
267A357F000
|
trusted library allocation
|
page read and write
|
||
267A3188000
|
trusted library allocation
|
page read and write
|
||
3DF1000
|
heap
|
page read and write
|
||
2679A07A000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
26796D84000
|
heap
|
page read and write
|
||
26796D7C000
|
heap
|
page read and write
|
||
2679DC41000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
267A605A000
|
trusted library allocation
|
page read and write
|
||
1EC87DA8000
|
heap
|
page read and write
|
||
267A2C5A000
|
trusted library allocation
|
page read and write
|
||
267A35B6000
|
trusted library allocation
|
page read and write
|
||
267A3D57000
|
trusted library allocation
|
page read and write
|
||
26799D58000
|
trusted library allocation
|
page read and write
|
||
26796BC2000
|
trusted library allocation
|
page read and write
|
||
2679C0F3000
|
trusted library allocation
|
page read and write
|
||
267A605A000
|
trusted library allocation
|
page read and write
|
||
26797287000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
2679AAE4000
|
trusted library allocation
|
page read and write
|
||
267A38BB000
|
trusted library allocation
|
page read and write
|
||
26798168000
|
trusted library allocation
|
page read and write
|
||
267A39C8000
|
trusted library allocation
|
page read and write
|
||
26796D4D000
|
heap
|
page read and write
|
||
267973BA000
|
trusted library allocation
|
page read and write
|
||
2679C5BA000
|
trusted library allocation
|
page read and write
|
||
26796B78000
|
trusted library allocation
|
page read and write
|
||
2679A263000
|
trusted library allocation
|
page read and write
|
||
26799FF0000
|
trusted library allocation
|
page read and write
|
||
1EC88197000
|
heap
|
page read and write
|
||
6C7127E000
|
unkown
|
page readonly
|
||
26796D48000
|
heap
|
page read and write
|
||
2679ADDB000
|
trusted library allocation
|
page read and write
|
||
2679BF5F000
|
trusted library allocation
|
page read and write
|
||
26795D89000
|
trusted library allocation
|
page read and write
|
||
26799DAB000
|
trusted library allocation
|
page read and write
|
||
267A2C41000
|
trusted library allocation
|
page read and write
|
||
26796D39000
|
heap
|
page read and write
|
||
2679C4C2000
|
trusted library allocation
|
page read and write
|
||
2679B1A4000
|
trusted library allocation
|
page read and write
|
||
26796CC7000
|
trusted library allocation
|
page read and write
|
||
26796B80000
|
trusted library allocation
|
page read and write
|
||
2679DBE8000
|
trusted library allocation
|
page read and write
|
||
21AD9A20000
|
unclassified section
|
page readonly
|
||
26799EFD000
|
trusted library allocation
|
page read and write
|
||
26797C9F000
|
trusted library allocation
|
page read and write
|
||
26795DCD000
|
trusted library allocation
|
page read and write
|
||
2679D025000
|
trusted library allocation
|
page read and write
|
||
267A39FC000
|
trusted library allocation
|
page read and write
|
||
267A316D000
|
trusted library allocation
|
page read and write
|
||
2679BFB4000
|
trusted library allocation
|
page read and write
|
||
2679C08A000
|
trusted library allocation
|
page read and write
|
||
2679C44B000
|
trusted library allocation
|
page read and write
|
||
2679C0ED000
|
trusted library allocation
|
page read and write
|
||
2679C424000
|
trusted library allocation
|
page read and write
|
||
26797FCE000
|
trusted library allocation
|
page read and write
|
||
2679C4F7000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
2679B500000
|
trusted library allocation
|
page read and write
|
||
2679A05E000
|
trusted library allocation
|
page read and write
|
||
267A579C000
|
heap
|
page read and write
|
||
26797FB1000
|
trusted library allocation
|
page read and write
|
||
2679B1E2000
|
trusted library allocation
|
page read and write
|
||
1EC879F0000
|
heap
|
page read and write
|
||
26796D84000
|
heap
|
page read and write
|
||
26799D9A000
|
trusted library allocation
|
page read and write
|
||
26797F72000
|
trusted library allocation
|
page read and write
|
||
267A605A000
|
trusted library allocation
|
page read and write
|
||
21AD9E2E000
|
trusted library allocation
|
page read and write
|
||
2679C6BF000
|
trusted library allocation
|
page read and write
|
||
2679C0EF000
|
trusted library allocation
|
page read and write
|
||
2679D0D4000
|
trusted library allocation
|
page read and write
|
||
2679A0D6000
|
trusted library allocation
|
page read and write
|
||
21AD9EC8000
|
trusted library allocation
|
page read and write
|
||
267A31B0000
|
trusted library allocation
|
page read and write
|
||
21AD9CD0000
|
heap
|
page read and write
|
||
2679C0CA000
|
trusted library allocation
|
page read and write
|
||
1EC88197000
|
heap
|
page read and write
|
||
26799FE6000
|
trusted library allocation
|
page read and write
|
||
267A2C9B000
|
trusted library allocation
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
1DB6B1CA000
|
heap
|
page read and write
|
||
2679BCCD000
|
trusted library allocation
|
page read and write
|
||
2F6CCF8000
|
stack
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
26795D89000
|
trusted library allocation
|
page read and write
|
||
2679BBF6000
|
trusted library allocation
|
page read and write
|
||
2679C54D000
|
trusted library allocation
|
page read and write
|
||
267A3863000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
21AD9E68000
|
trusted library allocation
|
page read and write
|
||
2679DB84000
|
trusted library allocation
|
page read and write
|
||
267A409B000
|
trusted library allocation
|
page read and write
|
||
26799D61000
|
trusted library allocation
|
page read and write
|
||
267A3A90000
|
trusted library allocation
|
page read and write
|
||
2679BDBF000
|
trusted library allocation
|
page read and write
|
||
2679C6C7000
|
trusted library allocation
|
page read and write
|
||
267A60A1000
|
trusted library allocation
|
page read and write
|
||
CDCCBFC000
|
stack
|
page read and write
|
||
26796D42000
|
heap
|
page read and write
|
||
26796B78000
|
trusted library allocation
|
page read and write
|
||
267986BD000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
2679C365000
|
trusted library allocation
|
page read and write
|
||
2679C6E0000
|
trusted library allocation
|
page read and write
|
||
2679C6C3000
|
trusted library allocation
|
page read and write
|
||
2679989C000
|
trusted library allocation
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
26797C41000
|
trusted library allocation
|
page read and write
|
||
1DB6B150000
|
heap
|
page read and write
|
||
2679A074000
|
trusted library allocation
|
page read and write
|
||
2679BE27000
|
trusted library allocation
|
page read and write
|
||
2679C5D6000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
2679A2D7000
|
trusted library allocation
|
page read and write
|
||
267A38E6000
|
trusted library allocation
|
page read and write
|
||
1EC874CF000
|
trusted library allocation
|
page read and write
|
||
267A3182000
|
trusted library allocation
|
page read and write
|
||
2679C69E000
|
trusted library allocation
|
page read and write
|
||
2679BE8D000
|
trusted library allocation
|
page read and write
|
||
26799942000
|
trusted library allocation
|
page read and write
|
||
26797FB8000
|
trusted library allocation
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
1EC881B6000
|
heap
|
page read and write
|
||
2679C4C4000
|
trusted library allocation
|
page read and write
|
||
2679C490000
|
trusted library allocation
|
page read and write
|
||
26797294000
|
trusted library allocation
|
page read and write
|
||
2679592F000
|
trusted library allocation
|
page read and write
|
||
26796D42000
|
heap
|
page read and write
|
||
267A2C6E000
|
trusted library allocation
|
page read and write
|
||
26796D51000
|
heap
|
page read and write
|
||
26797272000
|
trusted library allocation
|
page read and write
|
||
6C6EFBE000
|
stack
|
page read and write
|
||
26797F58000
|
trusted library allocation
|
page read and write
|
||
26797F70000
|
trusted library allocation
|
page read and write
|
||
26799C05000
|
heap
|
page read and write
|
||
2679C094000
|
trusted library allocation
|
page read and write
|
||
2679BE0D000
|
trusted library allocation
|
page read and write
|
||
26796B87000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
267A3D3E000
|
trusted library allocation
|
page read and write
|
||
267A40BB000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
267A6023000
|
trusted library allocation
|
page read and write
|
||
26796B67000
|
trusted library allocation
|
page read and write
|
||
2679B171000
|
trusted library allocation
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
2679C311000
|
trusted library allocation
|
page read and write
|
||
26796D3C000
|
heap
|
page read and write
|
||
26796D39000
|
heap
|
page read and write
|
||
267A56E1000
|
heap
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
267A39B0000
|
trusted library allocation
|
page read and write
|
||
267A315C000
|
trusted library allocation
|
page read and write
|
||
267A399D000
|
trusted library allocation
|
page read and write
|
||
26796D33000
|
heap
|
page read and write
|
||
26796D84000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
267A36D6000
|
trusted library allocation
|
page read and write
|
||
26797FD8000
|
trusted library allocation
|
page read and write
|
||
1DB6B400000
|
heap
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
267A36E3000
|
trusted library allocation
|
page read and write
|
||
1EC873DC000
|
unkown
|
page execute read
|
||
26A0003F000
|
trusted library allocation
|
page read and write
|
||
2679813D000
|
trusted library allocation
|
page read and write
|
||
2679C363000
|
trusted library allocation
|
page read and write
|
||
267A605C000
|
trusted library allocation
|
page read and write
|
||
2679B83A000
|
trusted library allocation
|
page read and write
|
||
2679A0FD000
|
trusted library allocation
|
page read and write
|
||
2679DC6B000
|
trusted library allocation
|
page read and write
|
||
26796BDE000
|
trusted library allocation
|
page read and write
|
||
267A2C7D000
|
trusted library allocation
|
page read and write
|
||
2679C584000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
26796D4A000
|
heap
|
page read and write
|
||
267A605A000
|
trusted library allocation
|
page read and write
|
||
2679A0CD000
|
trusted library allocation
|
page read and write
|
||
26797CC8000
|
trusted library allocation
|
page read and write
|
||
26796D41000
|
heap
|
page read and write
|
||
26797C49000
|
trusted library allocation
|
page read and write
|
||
2679DBEA000
|
trusted library allocation
|
page read and write
|
||
26797F39000
|
trusted library allocation
|
page read and write
|
||
26799DA0000
|
trusted library allocation
|
page read and write
|
||
1DB6B700000
|
trusted library allocation
|
page read and write
|
||
267A60A1000
|
trusted library allocation
|
page read and write
|
||
1EC8733F000
|
unclassified section
|
page read and write
|
||
1EC88185000
|
heap
|
page read and write
|
||
267A35CA000
|
trusted library allocation
|
page read and write
|
||
26797F6A000
|
trusted library allocation
|
page read and write
|
||
2679A07A000
|
trusted library allocation
|
page read and write
|
||
26797F6D000
|
trusted library allocation
|
page read and write
|
||
267A3AEF000
|
trusted library allocation
|
page read and write
|
||
2679DBDE000
|
trusted library allocation
|
page read and write
|
||
2679DBE4000
|
trusted library allocation
|
page read and write
|
||
2679BC7D000
|
trusted library allocation
|
page read and write
|
||
26797FD5000
|
trusted library allocation
|
page read and write
|
||
267A56E1000
|
heap
|
page read and write
|
||
2679A064000
|
trusted library allocation
|
page read and write
|
||
1EC87465000
|
trusted library allocation
|
page read and write
|
||
26796D4A000
|
heap
|
page read and write
|
||
2F6B3D8000
|
stack
|
page read and write
|
||
2679BDCD000
|
trusted library allocation
|
page read and write
|
||
26799865000
|
trusted library allocation
|
page read and write
|
||
2679A062000
|
trusted library allocation
|
page read and write
|
||
2679DBE6000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
26796D35000
|
heap
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
26796D34000
|
heap
|
page read and write
|
||
26795DB2000
|
trusted library allocation
|
page read and write
|
||
26796D3B000
|
heap
|
page read and write
|
||
26795961000
|
trusted library allocation
|
page read and write
|
||
2679B1D3000
|
trusted library allocation
|
page read and write
|
||
3A94000
|
heap
|
page read and write
|
||
26796D3B000
|
heap
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
2679C6E0000
|
trusted library allocation
|
page read and write
|
||
26799E7F000
|
trusted library allocation
|
page read and write
|
||
26796D3D000
|
heap
|
page read and write
|
||
267998FB000
|
trusted library allocation
|
page read and write
|
||
2679699E000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
1EC88183000
|
heap
|
page read and write
|
||
2679790A000
|
trusted library allocation
|
page read and write
|
||
267A5EE4000
|
trusted library allocation
|
page read and write
|
||
2679BEAF000
|
trusted library allocation
|
page read and write
|
||
2679B81B000
|
trusted library allocation
|
page read and write
|
||
2679C3F4000
|
trusted library allocation
|
page read and write
|
||
267A36D2000
|
trusted library allocation
|
page read and write
|
||
26796D33000
|
heap
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
267A35EB000
|
trusted library allocation
|
page read and write
|
||
26796B83000
|
trusted library allocation
|
page read and write
|
||
267A389B000
|
trusted library allocation
|
page read and write
|
||
2679A08F000
|
trusted library allocation
|
page read and write
|
||
21ADA000000
|
trusted library allocation
|
page read and write
|
||
2679C6C5000
|
trusted library allocation
|
page read and write
|
||
26799D3B000
|
trusted library allocation
|
page read and write
|
||
26797C6D000
|
trusted library allocation
|
page read and write
|
||
2679C5AC000
|
trusted library allocation
|
page read and write
|
||
267A3AC7000
|
trusted library allocation
|
page read and write
|
||
2679BFA6000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
28E8BA71000
|
trusted library allocation
|
page execute read
|
||
26799FF0000
|
trusted library allocation
|
page read and write
|
||
26796A4A000
|
trusted library allocation
|
page read and write
|
||
267A2C9B000
|
trusted library allocation
|
page read and write
|
||
26796D3D000
|
heap
|
page read and write
|
||
267972FE000
|
trusted library allocation
|
page read and write
|
||
1EC88198000
|
heap
|
page read and write
|
||
267A357D000
|
trusted library allocation
|
page read and write
|
||
26799FF0000
|
trusted library allocation
|
page read and write
|
||
2679BDF6000
|
trusted library allocation
|
page read and write
|
||
267986BD000
|
trusted library allocation
|
page read and write
|
||
26799FC3000
|
trusted library allocation
|
page read and write
|
||
267A5EDE000
|
trusted library allocation
|
page read and write
|
||
2679B854000
|
trusted library allocation
|
page read and write
|
||
2679545F000
|
trusted library allocation
|
page read and write
|
||
267A2C3A000
|
trusted library allocation
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
267A56E1000
|
heap
|
page read and write
|
||
26796B7B000
|
trusted library allocation
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
2679BFB4000
|
trusted library allocation
|
page read and write
|
||
26797CC8000
|
trusted library allocation
|
page read and write
|
||
2679C6EF000
|
trusted library allocation
|
page read and write
|
||
267A2CE2000
|
trusted library allocation
|
page read and write
|
||
CDCCBFF000
|
stack
|
page read and write
|
||
1523000
|
heap
|
page read and write
|
||
26797294000
|
trusted library allocation
|
page read and write
|
||
17F9D1A2000
|
heap
|
page read and write
|
||
1EC87D64000
|
heap
|
page read and write
|
||
26796BC6000
|
trusted library allocation
|
page read and write
|
||
26796B89000
|
trusted library allocation
|
page read and write
|
||
26796D54000
|
heap
|
page read and write
|
||
26796B9B000
|
trusted library allocation
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
2679D0BD000
|
trusted library allocation
|
page read and write
|
||
21AD9C46000
|
heap
|
page read and write
|
||
267A574D000
|
heap
|
page read and write
|
||
26799FF2000
|
trusted library allocation
|
page read and write
|
||
267981D2000
|
trusted library allocation
|
page read and write
|
||
2679BE2D000
|
trusted library allocation
|
page read and write
|
||
1EC87482000
|
trusted library allocation
|
page read and write
|
||
267981C0000
|
trusted library allocation
|
page read and write
|
||
26797C9F000
|
trusted library allocation
|
page read and write
|
||
267998D8000
|
trusted library allocation
|
page read and write
|
||
26797FFE000
|
trusted library allocation
|
page read and write
|
||
2679C51B000
|
trusted library allocation
|
page read and write
|
||
26795DC6000
|
trusted library allocation
|
page read and write
|
||
1EC87200000
|
trusted library allocation
|
page read and write
|
||
26796CF6000
|
trusted library allocation
|
page read and write
|
||
267A2CE2000
|
trusted library allocation
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
26799FC3000
|
trusted library allocation
|
page read and write
|
||
26795357000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
26796BB6000
|
trusted library allocation
|
page read and write
|
||
2679C0ED000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
26797F48000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
267A3ACB000
|
trusted library allocation
|
page read and write
|
||
2679993B000
|
trusted library allocation
|
page read and write
|
||
26799C16000
|
heap
|
page read and write
|
||
26799C53000
|
heap
|
page read and write
|
||
21AD9E96000
|
trusted library allocation
|
page read and write
|
||
1EC87DFC000
|
heap
|
page read and write
|
||
26796D48000
|
heap
|
page read and write
|
||
26796D40000
|
heap
|
page read and write
|
||
26799FF8000
|
trusted library allocation
|
page read and write
|
||
26795D89000
|
trusted library allocation
|
page read and write
|
||
26796D4A000
|
heap
|
page read and write
|
||
26799D76000
|
trusted library allocation
|
page read and write
|
||
26797C43000
|
trusted library allocation
|
page read and write
|
||
6C72AFE000
|
stack
|
page read and write
|
||
267981DC000
|
trusted library allocation
|
page read and write
|
||
2679C55D000
|
trusted library allocation
|
page read and write
|
||
26796D2B000
|
heap
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
26797C6C000
|
trusted library allocation
|
page read and write
|
||
26797F87000
|
trusted library allocation
|
page read and write
|
||
2679C6E9000
|
trusted library allocation
|
page read and write
|
||
267981C4000
|
trusted library allocation
|
page read and write
|
||
26797234000
|
trusted library allocation
|
page read and write
|
||
26796BF3000
|
trusted library allocation
|
page read and write
|
||
267A2CFE000
|
trusted library allocation
|
page read and write
|
||
26796B24000
|
trusted library allocation
|
page read and write
|
||
2679BE79000
|
trusted library allocation
|
page read and write
|
||
99E1FE000
|
stack
|
page read and write
|
||
1DB6B300000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
2679B1A4000
|
trusted library allocation
|
page read and write
|
||
26796BFA000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
2679BD56000
|
trusted library allocation
|
page read and write
|
||
2679C660000
|
trusted library allocation
|
page read and write
|
||
17F9D500000
|
trusted library allocation
|
page read and write
|
||
26797CC8000
|
trusted library allocation
|
page read and write
|
||
267972AD000
|
trusted library allocation
|
page read and write
|
||
26799FF3000
|
trusted library allocation
|
page read and write
|
||
2679BE88000
|
trusted library allocation
|
page read and write
|
||
26798177000
|
trusted library allocation
|
page read and write
|
||
1EC87C06000
|
trusted library allocation
|
page read and write
|
||
267A3DF4000
|
trusted library allocation
|
page read and write
|
||
267A3ABE000
|
trusted library allocation
|
page read and write
|
||
2679ADA1000
|
trusted library allocation
|
page read and write
|
||
2679B184000
|
trusted library allocation
|
page read and write
|
||
26796D52000
|
heap
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
2679C051000
|
trusted library allocation
|
page read and write
|
||
26797C6D000
|
trusted library allocation
|
page read and write
|
||
1EC881A9000
|
heap
|
page read and write
|
||
2679A070000
|
trusted library allocation
|
page read and write
|
||
154C000
|
heap
|
page read and write
|
||
26796D48000
|
heap
|
page read and write
|
||
26799D3B000
|
trusted library allocation
|
page read and write
|
||
26799949000
|
trusted library allocation
|
page read and write
|
||
2679C6F1000
|
trusted library allocation
|
page read and write
|
||
2679B1C4000
|
trusted library allocation
|
page read and write
|
||
26799E9C000
|
trusted library allocation
|
page read and write
|
||
267981AE000
|
trusted library allocation
|
page read and write
|
||
1DB6AF70000
|
unclassified section
|
page readonly
|
||
26796D40000
|
heap
|
page read and write
|
||
26797FAE000
|
trusted library allocation
|
page read and write
|
||
2679C4E3000
|
trusted library allocation
|
page read and write
|
||
2679A0FD000
|
trusted library allocation
|
page read and write
|
||
26796D41000
|
heap
|
page read and write
|
||
2679AD33000
|
trusted library allocation
|
page read and write
|
||
267986FC000
|
trusted library allocation
|
page read and write
|
||
2679DBA2000
|
trusted library allocation
|
page read and write
|
||
26799949000
|
trusted library allocation
|
page read and write
|
||
2679B1B7000
|
trusted library allocation
|
page read and write
|
||
2679C4F7000
|
trusted library allocation
|
page read and write
|
||
1EC88169000
|
heap
|
page read and write
|
||
26799FE0000
|
trusted library allocation
|
page read and write
|
||
2679C456000
|
trusted library allocation
|
page read and write
|
||
26795481000
|
trusted library allocation
|
page read and write
|
||
26799E7F000
|
trusted library allocation
|
page read and write
|
||
26796D5B000
|
heap
|
page read and write
|
||
26795A82000
|
trusted library allocation
|
page read and write
|
||
26796D2C000
|
heap
|
page read and write
|
||
26796D51000
|
heap
|
page read and write
|
||
2679C59B000
|
trusted library allocation
|
page read and write
|
||
2679BD5F000
|
trusted library allocation
|
page read and write
|
||
26795DBF000
|
trusted library allocation
|
page read and write
|
||
26796D4A000
|
heap
|
page read and write
|
||
2679B86D000
|
trusted library allocation
|
page read and write
|
||
267A35AE000
|
trusted library allocation
|
page read and write
|
||
26799DE8000
|
trusted library allocation
|
page read and write
|
||
2679C48C000
|
trusted library allocation
|
page read and write
|
||
26796D2E000
|
heap
|
page read and write
|
||
267A2CE2000
|
trusted library allocation
|
page read and write
|
||
267A39EF000
|
trusted library allocation
|
page read and write
|
||
2679C4BB000
|
trusted library allocation
|
page read and write
|
||
267A2C66000
|
trusted library allocation
|
page read and write
|
||
26796D56000
|
heap
|
page read and write
|
||
267A2CF3000
|
trusted library allocation
|
page read and write
|
||
26797C9F000
|
trusted library allocation
|
page read and write
|
||
26796BFC000
|
trusted library allocation
|
page read and write
|
||
26796D36000
|
heap
|
page read and write
|
||
2679ADC9000
|
trusted library allocation
|
page read and write
|
||
2679D059000
|
trusted library allocation
|
page read and write
|
||
1EC87412000
|
trusted library allocation
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
26796D30000
|
heap
|
page read and write
|
||
267A40BB000
|
trusted library allocation
|
page read and write
|
||
2A19FFF000
|
stack
|
page read and write
|
||
2679A070000
|
trusted library allocation
|
page read and write
|
||
267A6023000
|
trusted library allocation
|
page read and write
|
||
267981BE000
|
trusted library allocation
|
page read and write
|
||
267A35A9000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
267A2C93000
|
trusted library allocation
|
page read and write
|
||
267A605C000
|
trusted library allocation
|
page read and write
|
||
2679A2CE000
|
trusted library allocation
|
page read and write
|
||
26797238000
|
trusted library allocation
|
page read and write
|
||
26796B9B000
|
trusted library allocation
|
page read and write
|
||
2679BBA6000
|
trusted library allocation
|
page read and write
|
||
2679BD92000
|
trusted library allocation
|
page read and write
|
||
2679C4AC000
|
trusted library allocation
|
page read and write
|
||
26799F83000
|
trusted library allocation
|
page read and write
|
||
2679A062000
|
trusted library allocation
|
page read and write
|
||
2679869E000
|
trusted library allocation
|
page read and write
|
||
26799C16000
|
heap
|
page read and write
|
||
2679C68E000
|
trusted library allocation
|
page read and write
|
||
2679A263000
|
trusted library allocation
|
page read and write
|
||
26796D3D000
|
heap
|
page read and write
|
||
26796B80000
|
trusted library allocation
|
page read and write
|
||
2679817D000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
267A2CB0000
|
trusted library allocation
|
page read and write
|
||
9A0A7E000
|
unkown
|
page readonly
|
||
2679DB75000
|
trusted library allocation
|
page read and write
|
||
267A3145000
|
trusted library allocation
|
page read and write
|
||
99C73D000
|
stack
|
page read and write
|
||
267A35DD000
|
trusted library allocation
|
page read and write
|
||
267A3AFC000
|
trusted library allocation
|
page read and write
|
||
26797FA7000
|
trusted library allocation
|
page read and write
|
||
21AD9C8F000
|
unclassified section
|
page read and write
|
||
2679C058000
|
trusted library allocation
|
page read and write
|
||
26796D7A000
|
heap
|
page read and write
|
||
2679BBFD000
|
trusted library allocation
|
page read and write
|
||
1EC87D60000
|
heap
|
page read and write
|
||
26796D57000
|
heap
|
page read and write
|
||
267998B8000
|
trusted library allocation
|
page read and write
|
||
267A39DB000
|
trusted library allocation
|
page read and write
|
||
267A3182000
|
trusted library allocation
|
page read and write
|
||
267A57C3000
|
heap
|
page read and write
|
||
2679DB8B000
|
trusted library allocation
|
page read and write
|
||
1EC87330000
|
unclassified section
|
page read and write
|
||
26796B15000
|
trusted library allocation
|
page read and write
|
||
26799BFB000
|
heap
|
page read and write
|
||
267A38F2000
|
trusted library allocation
|
page read and write
|
||
2679C6A9000
|
trusted library allocation
|
page read and write
|
||
21AD9E5D000
|
trusted library allocation
|
page read and write
|
||
2679D0DA000
|
trusted library allocation
|
page read and write
|
||
267A2C41000
|
trusted library allocation
|
page read and write
|
||
1EC88140000
|
heap
|
page read and write
|
||
26796D73000
|
heap
|
page read and write
|
||
267A3DD9000
|
trusted library allocation
|
page read and write
|
||
2679A08C000
|
trusted library allocation
|
page read and write
|
||
26796A46000
|
trusted library allocation
|
page read and write
|
||
2679543B000
|
trusted library allocation
|
page read and write
|
||
2679B184000
|
trusted library allocation
|
page read and write
|
||
267981DC000
|
trusted library allocation
|
page read and write
|
||
26796D80000
|
heap
|
page read and write
|
||
26797FCE000
|
trusted library allocation
|
page read and write
|
||
2679A05E000
|
trusted library allocation
|
page read and write
|
||
2679D090000
|
trusted library allocation
|
page read and write
|
||
26796D84000
|
heap
|
page read and write
|
||
267981FE000
|
trusted library allocation
|
page read and write
|
||
2679817B000
|
trusted library allocation
|
page read and write
|
||
2679B198000
|
trusted library allocation
|
page read and write
|
||
26798150000
|
trusted library allocation
|
page read and write
|
||
2679B8C3000
|
trusted library allocation
|
page read and write
|
||
26796D46000
|
heap
|
page read and write
|
||
2679C550000
|
trusted library allocation
|
page read and write
|
||
26796D32000
|
heap
|
page read and write
|
||
2679A2FD000
|
trusted library allocation
|
page read and write
|
||
2679D04B000
|
trusted library allocation
|
page read and write
|
||
2679DC68000
|
trusted library allocation
|
page read and write
|
||
26797FB1000
|
trusted library allocation
|
page read and write
|
||
17F9EDB8000
|
heap
|
page read and write
|
||
26799D3B000
|
trusted library allocation
|
page read and write
|
||
26796D29000
|
heap
|
page read and write
|
||
26795DD4000
|
trusted library allocation
|
page read and write
|
||
26797FD3000
|
trusted library allocation
|
page read and write
|
||
2679BEB2000
|
trusted library allocation
|
page read and write
|
||
F91B7680000
|
trusted library allocation
|
page read and write
|
||
2679BBB7000
|
trusted library allocation
|
page read and write
|
||
267A2CEF000
|
trusted library allocation
|
page read and write
|
||
26799DD8000
|
trusted library allocation
|
page read and write
|
||
26799933000
|
trusted library allocation
|
page read and write
|
||
2679BE07000
|
trusted library allocation
|
page read and write
|
||
267998D8000
|
trusted library allocation
|
page read and write
|
||
2679AAA2000
|
trusted library allocation
|
page read and write
|
||
2679BF8D000
|
trusted library allocation
|
page read and write
|
||
26796D3D000
|
heap
|
page read and write
|
||
26796D39000
|
heap
|
page read and write
|
There are 3586 hidden memdumps, click here to show them.