IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_12df79fd-5566-4227-a39f-b2e696a09ba8.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_12df79fd-5566-4227-a39f-b2e696a09ba8.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\0ed21c8e-b4c0-4445-8bf0-9d4606b046bd.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\52892a56-6d10-427a-8799-e10dfb633a9d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\591721c1-e61c-4d85-9ddb-6ededb71b99c.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\73477df1-8bb9-444b-9253-757dd6447d3d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\7f43e22f-98b3-4f78-80b3-24ba525515bd.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\9bf01528-f4e1-4e4b-813b-f67d74280c15.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\773f0ae2-6495-488d-8010-d9bd987607c8.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\blocklist (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4E270-1BF4.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4E271-1BB4.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4E283-178C.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4E28C-2300.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\CrashpadMetrics-active.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\0198b17d-f3f0-4bac-a341-1103e521fdaf.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\0bfc34f2-d00e-4a03-b40c-18460ad553e7.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\3381edbd-21b4-4e38-a745-73007fa471b2.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\58a708aa-9998-47e6-a036-26cf3e07ca18.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\7cd76ade-8065-4879-86e6-1902af2a3e0b.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\7e5dd8ce-7881-442e-8fa6-97c2d705422f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\8e889217-ffb9-44c3-a147-b51ca9e66152.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\93f98136-5cd9-4d23-a169-09b4cf94b0d7.tmp
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\9af04b97-2995-4ac5-880c-6504fff53eeb.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000003.log
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AssistanceHome\AssistanceHomeSQLite
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DIPS
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeEDrop\EdgeEDropSQLite.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 14, database pages 8, cookie 0xe, schema 4, UTF-8, version-valid-for 14
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeHubAppUsage\EdgeHubAppUsageSQLite.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\domains_config.json
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\ExtensionActivityComp
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 1, cookie 0x1, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\ExtensionActivityEdge
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 8, cookie 0x8, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\_metadata\computed_hashes.json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Favicons
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 10, cookie 0x8, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, 1st free page 10, free pages 4, cookie 0x45, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History-journal
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps (copy)
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps Icons
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 12, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 28, cookie 0x1d, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network Action Predictor
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 11, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\10bb6def-3343-461d-9e4c-f9dc59c0b92a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\34945187-6f73-4848-ab48-8014470bfbe1.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\6afa0521-d822-4326-9979-8b381a72080b.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\8caf8765-ef4c-4033-a257-bba869d3eee8.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\9e47564c-2da5-4119-bcf0-70b24c5a5244.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 9, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 9
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2c2aa.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF3ad19.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF2a128.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF2b4fe.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF2c2aa.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF3ce1f.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\a9c628a4-21ce-41d6-8f75-f6e50ba55c85.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\dd2e8947-4e92-464f-8b7c-0b1214b414bc.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\dee4f9f4-7be4-49d5-a547-a9799686e89d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF2df2b.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF31677.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF341ad.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF39bc4.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PreferredApps
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF2dbfe.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF30f72.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Session_13369701236535882
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Shortcuts
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_3
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\3191fc58-6279-48b1-96e5-099388dc6d29.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\4308a775-6142-4be1-ba05-372726dbd711.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\6e82dbf2-dbb4-4468-a81e-59a4e65aa48c.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Network Persistent State
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Network Persistent State~RF3b835.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3035005, file counter 4, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF2b4fe.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\e5f6eb23-9454-437c-831c-2c6eae32ff7a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Top Sites
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 7, 1st free page 5, free pages 2, cookie 0x5, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Visited Links
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 5, database pages 89, cookie 0x66, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebAssistDatabase
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 7, cookie 0xb, schema 4, UTF-8, version-valid-for 10
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\QuotaManager
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 10, cookie 0x7, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\a45dd03f-bb69-4a2f-bc91-f0b42fb7d550.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\arbitration_service_config.json
ASCII text, with very long lines (3951), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\b4d6d50b-e5ef-46a1-afe8-cfdad7c2a6e4.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\databases\Databases.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x4, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\heavy_ad_intervention_opt_out.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 4, cookie 0x2, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-shm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000003.log
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Browser
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF28591.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF285d0.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF28b8c.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF28b9c.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2b193.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2d0d3.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2d140.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2f0ee.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2f12c.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF39b18.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3c218.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3f780.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSynchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSynchronousLookupUris_0
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings_2.0-0
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris_636976985063396749.rel.v2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ac4c068a-f213-4a8f-8f12-164acb06a853.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\c6299525-3dd7-4cce-8715-b68f1acfb89e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\d75fd1bc-1512-4e7e-9fcb-fd94f5f53ebc.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\f0a68b17-9e6b-4563-93c3-f21d4a12157a.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\f5268a82-b52b-4112-afa7-2beb8b21035a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\cf7513a936f7effbb38627e56f8d1fce10eb12cc.tbres
data
dropped
C:\Users\user\AppData\Local\Temp\446fc8fa-ed92-49fc-8f17-a2fae354feed.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\4e137540-24a0-4d01-b60a-a3a355f9555b.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\50f06052-9ca3-4ca6-b2b3-3c337183e680.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\5d71001e-c392-4e76-b6fe-f29a2f6ced2b.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1366x720, components 3
dropped
C:\Users\user\AppData\Local\Temp\630fc655-6cf3-4ffc-bc4f-ca5e3af2a073.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 41902
dropped
C:\Users\user\AppData\Local\Temp\8ecf1a82-61d4-4dfa-a4a1-4e0ba71065e9.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\cv_debug.log
JSON data
dropped
C:\Users\user\AppData\Local\Temp\d77717d3-e20b-487e-b335-68455a67efd4.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 695310
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\8ecf1a82-61d4-4dfa-a4a1-4e0ba71065e9.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\128.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\af\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\am\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\ar\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\az\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\be\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\bg\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\bn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\ca\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\cs\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\cy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\da\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\de\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\el\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\en\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\en_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\en_GB\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\en_US\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\es\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\es_419\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\et\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\eu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\fa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\fi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\fil\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\fr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\fr_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\gl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\gu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\hi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\hr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\hu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\hy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\id\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\is\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\it\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\iw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\ja\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\ka\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\kk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\km\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\kn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\ko\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\lo\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\lt\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\lv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\ml\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\mn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\mr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\ms\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\my\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\ne\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\nl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\no\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\pa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\pl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\pt_BR\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\pt_PT\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\ro\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\ru\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\si\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\sk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\sl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\sr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\sv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\sw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\ta\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\te\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\th\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\tr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\uk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\ur\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\vi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\zh_CN\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\zh_HK\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\zh_TW\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_locales\zu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\dasherSettingSchema.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\offscreendocument.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\offscreendocument_main.js
ASCII text, with very long lines (4369)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\page_embed_script.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1338419821\CRX_INSTALL\service_worker_bin_prod.js
ASCII text, with very long lines (4369)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1692143573\4e137540-24a0-4d01-b60a-a3a355f9555b.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1692143573\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1692143573\CRX_INSTALL\content.js
Unicode text, UTF-8 text, with very long lines (8031), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1692143573\CRX_INSTALL\content_new.js
Unicode text, UTF-8 text, with very long lines (8604), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7092_1692143573\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5952 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5952 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5952 bytes
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 337 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=2028,i,249939025956985432,7264132615848075061,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=2056,i,14702557000730863942,17466838615074778728,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6344 --field-trial-handle=2056,i,14702557000730863942,17466838615074778728,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=6524 --field-trial-handle=2056,i,14702557000730863942,17466838615074778728,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7296 --field-trial-handle=2056,i,14702557000730863942,17466838615074778728,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7296 --field-trial-handle=2056,i,14702557000730863942,17466838615074778728,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2324 --field-trial-handle=2096,i,9877581988244495231,1586528081353476286,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2276 --field-trial-handle=2068,i,8933014677616933808,2190198672335111100,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-GB --service-sandbox-type=search_indexer --message-loop-type-ui --mojo-platform-channel-handle=7416 --field-trial-handle=2056,i,14702557000730863942,17466838615074778728,262144 /prefetch:8
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2272 -parentBuildID 20230927232528 -prefsHandle 2180 -prefMapHandle 2172 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ff184538-9ec4-40f1-a485-b9958cfa9ec0} 4208 "\\.\pipe\gecko-crash-server-pipe.4208" 26789c6f110 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4460 -parentBuildID 20230927232528 -prefsHandle 4452 -prefMapHandle 4448 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d8d1b33f-8176-45ae-b472-b7c5dd6dabe6} 4208 "\\.\pipe\gecko-crash-server-pipe.4208" 2679bee0510 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5460 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5528 -prefMapHandle 5516 -prefsLen 34094 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {96304a8a-3b32-4829-afcc-9c45cdc9719b} 4208 "\\.\pipe\gecko-crash-server-pipe.4208" 267a375cf10 utility
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://duckduckgo.com/ac/?q=
unknown
https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=40249-e88c401e1b1f2242d9e4
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://www.msn.comZ
unknown
http://www.fontbureau.com/de=t
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://csp.withgoogle.com/csp/report-to/apps-themes
unknown
http://www.fontbureau.com/designers
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://docs.google.com/
unknown
https://screenshots.firefox.com
unknown
https://www.youtube.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://www.instagram.com
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://profiler.firefox.com/
unknown
https://www.msn.com
unknown
https://outlook.live.com/mail/inbox?isExtension=true&sharedHeader=1&nlp=1&client_flight=outlookedge
unknown
https://outlook.office.com/mail/compose?isExtension=true
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://i.y.qq.com/n2/m/index.html
unknown
https://www.deezer.com/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://web.telegram.org/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://drive-daily-2.corp.google.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://fpn.firefox.com
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://exslt.org/dates-and-times
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://drive-daily-1.corp.google.com/
unknown
https://excel.new?from=EdgeM365Shoreline
unknown
https://www.youtube.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://www.google.com/favicon.ico
142.251.35.164
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://bzib.nelreports.net/api/report?cat=bingbusiness
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://amazon.com
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://chrome.google.com/webstore/
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://clients2.googleusercontent.com/crx/blobs/AY4GWKBMNax_FQrZEVzNkO_0mu3UShnzR6AihR_EPjVIUOT_pwZzkWCpOk8YKIu0qnIq_YObWXuPyiJ7NA0nDjMHUEYIIEknsNvJHXuPd0MqxESzoxi9xiMyJKNwZiVV1yEAxlKa5UVe61sINARQ7fO9dE0bkfP_W4GG/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_80_1_0.crx
142.250.185.161
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://www.office.com
unknown
https://outlook.live.com/mail/0/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=default-theme%40mozilla.org%2Caddons-
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
http://www.inbox.lv/rfc2368/?value=%su
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://tidal.com/
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://www.tsn.caG9
unknown
https://gaana.com/
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://csp.withgoogle.com/csp/report-to/AccountsSignInUi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://outlook.live.com/mail/compose?isExtension=true
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
chrome.cloudflare-dns.com
172.64.41.3
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
18.65.39.4
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
sni1gl.wpc.nucdn.net
152.199.21.175
contile.services.mozilla.com
34.117.188.166
s-part-0029.t-0009.t-msedge.net
13.107.246.57
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
googlehosted.l.googleusercontent.com
142.250.185.161
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
spocs.getpocket.com
unknown
detectportal.firefox.com
unknown
clients2.googleusercontent.com
unknown
bzib.nelreports.net
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
shavar.services.mozilla.com
unknown
There are 15 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
13.107.246.40
unknown
United States
23.55.235.170
unknown
United States
142.251.40.106
unknown
United States
152.195.19.97
unknown
United States
192.168.2.4
unknown
unknown
34.117.188.166
contile.services.mozilla.com
United States
142.250.185.161
googlehosted.l.googleusercontent.com
United States
172.64.41.3
chrome.cloudflare-dns.com
United States
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
104.70.121.171
unknown
United States
13.107.246.57
s-part-0029.t-0009.t-msedge.net
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
18.65.39.4
services.addons.mozilla.org
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
239.255.255.250
unknown
Reserved
20.96.153.111
unknown
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
142.250.72.110
unknown
United States
142.251.35.164
unknown
United States
127.0.0.1
unknown
unknown
172.253.115.84
unknown
United States
There are 14 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PrefsLightweight
lw_13bbe73648289fe96dfa1aa1bf23b3da
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseenversion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseen
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_dse_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_startup_page_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66616
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\Clients\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\Commands\on-logon-autolaunch
Enabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
MicrosoftEdgeAutoLaunch_C366A24065C39A1BE76E148DC2D0A868
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles\Default
ShortcutName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles\Default
ProfileErrorState
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles
EnhancedLinkOpeningDefault
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahokoikenoafgppiblgpenaaaolecifn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bhmhibnbialendcafinliemndanacfaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bobbggphonhgdonfdibkfipfepfcildj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ceaifoolopnigfpidlheoagpheiplgii
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
cjneempfhkonkkbcmnfdibgobmhbagaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dabfebgaghanlbehmkmaflipiohdimmc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dcaajljecejllikfgbhjdgeognacjkkp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dmbljphlfghcnbohaoffiedmodfmkmol
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ehlmnljdoejdahfjdfobmpfancoibmig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
eijpepilkjkofamihbmjcnihgpbebafj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
enkoeamdnimieoooocohgbdajhhkajko
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fjngpfnaikknjdhkckmncgicobbkcnle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbihlnbpmfkodghomcinpblknjhneknc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbmoeijgfngecijpcnbooedokgafmmji
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gecfnmoodchdkebjjffmdcmeghkflpib
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gekagaaiohabmaknhkbaofhhedhelemf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghglcnachgghkhbafjogogiggghcpjig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hciemgmhplhpinoohcjpafmncmjapioh
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hloomjjkinpbjldhobfkfdamkmikjmdo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hmlhageoffiiefnmojcgoagebofoifpl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jbleckejnaboogigodiafflhkajdmpcl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jlipacegilfgfpgkefbjcncbfcoeecgj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jpfjdekhebcolnfkpicpciaknbgcdcbm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kfihiegbjaloebkmglnjnljoljgkkchm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
khffkadolmfbdgahbabbhipadklfmhgf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kjncpkplfnolibapodobnnjfgmjmiaba
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kkobcodijbdelbnhbfkkfncbeildnpie
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmojgmpmopiiagdfbilgognmlegkonbk
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkbndigcebkoaejohleckhekfmcecfja
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nnpnekncnhiglbokoiffmejlimgmgoam
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ofefcgjbeghpigppfmkologfjadafddi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olkdlefmaniacnmgofabnpmomgcpdaip
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olmhchkiafniffcaiciiomfdplnmklak
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
pencekojiebcjhifbkfdncgmmooepclc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ppnnjfpaneghjbcepgedmlcgmfgkjhah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahokoikenoafgppiblgpenaaaolecifn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bhmhibnbialendcafinliemndanacfaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bobbggphonhgdonfdibkfipfepfcildj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ceaifoolopnigfpidlheoagpheiplgii
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
cjneempfhkonkkbcmnfdibgobmhbagaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dabfebgaghanlbehmkmaflipiohdimmc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dcaajljecejllikfgbhjdgeognacjkkp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dmbljphlfghcnbohaoffiedmodfmkmol
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ehlmnljdoejdahfjdfobmpfancoibmig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
eijpepilkjkofamihbmjcnihgpbebafj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
enkoeamdnimieoooocohgbdajhhkajko
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fjngpfnaikknjdhkckmncgicobbkcnle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbihlnbpmfkodghomcinpblknjhneknc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbmoeijgfngecijpcnbooedokgafmmji
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gecfnmoodchdkebjjffmdcmeghkflpib
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gekagaaiohabmaknhkbaofhhedhelemf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghglcnachgghkhbafjogogiggghcpjig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hciemgmhplhpinoohcjpafmncmjapioh
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hloomjjkinpbjldhobfkfdamkmikjmdo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hmlhageoffiiefnmojcgoagebofoifpl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jbleckejnaboogigodiafflhkajdmpcl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jlipacegilfgfpgkefbjcncbfcoeecgj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jpfjdekhebcolnfkpicpciaknbgcdcbm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kfihiegbjaloebkmglnjnljoljgkkchm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
khffkadolmfbdgahbabbhipadklfmhgf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kjncpkplfnolibapodobnnjfgmjmiaba
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kkobcodijbdelbnhbfkkfncbeildnpie
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmojgmpmopiiagdfbilgognmlegkonbk
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkbndigcebkoaejohleckhekfmcecfja
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nnpnekncnhiglbokoiffmejlimgmgoam
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ofefcgjbeghpigppfmkologfjadafddi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olkdlefmaniacnmgofabnpmomgcpdaip
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olmhchkiafniffcaiciiomfdplnmklak
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
pencekojiebcjhifbkfdncgmmooepclc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ppnnjfpaneghjbcepgedmlcgmfgkjhah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahokoikenoafgppiblgpenaaaolecifn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bhmhibnbialendcafinliemndanacfaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bobbggphonhgdonfdibkfipfepfcildj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ceaifoolopnigfpidlheoagpheiplgii
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
cjneempfhkonkkbcmnfdibgobmhbagaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dabfebgaghanlbehmkmaflipiohdimmc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dcaajljecejllikfgbhjdgeognacjkkp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dmbljphlfghcnbohaoffiedmodfmkmol
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ehlmnljdoejdahfjdfobmpfancoibmig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
eijpepilkjkofamihbmjcnihgpbebafj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
enkoeamdnimieoooocohgbdajhhkajko
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fjngpfnaikknjdhkckmncgicobbkcnle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbihlnbpmfkodghomcinpblknjhneknc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbmoeijgfngecijpcnbooedokgafmmji
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gecfnmoodchdkebjjffmdcmeghkflpib
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gekagaaiohabmaknhkbaofhhedhelemf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghglcnachgghkhbafjogogiggghcpjig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hciemgmhplhpinoohcjpafmncmjapioh
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hloomjjkinpbjldhobfkfdamkmikjmdo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hmlhageoffiiefnmojcgoagebofoifpl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jbleckejnaboogigodiafflhkajdmpcl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jlipacegilfgfpgkefbjcncbfcoeecgj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jmjflgjpcpepeafmmgdpfkogkghcpiha
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jpfjdekhebcolnfkpicpciaknbgcdcbm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kfihiegbjaloebkmglnjnljoljgkkchm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
khffkadolmfbdgahbabbhipadklfmhgf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kjncpkplfnolibapodobnnjfgmjmiaba
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kkobcodijbdelbnhbfkkfncbeildnpie
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmojgmpmopiiagdfbilgognmlegkonbk
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkbndigcebkoaejohleckhekfmcecfja
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nnpnekncnhiglbokoiffmejlimgmgoam
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ofefcgjbeghpigppfmkologfjadafddi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olkdlefmaniacnmgofabnpmomgcpdaip
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olmhchkiafniffcaiciiomfdplnmklak
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
pencekojiebcjhifbkfdncgmmooepclc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ppnnjfpaneghjbcepgedmlcgmfgkjhah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66616
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66616
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66616
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66616
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 197 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2679C5DC000
trusted library allocation
page read and write
2679BF53000
trusted library allocation
page read and write
2679BF96000
trusted library allocation
page read and write
2679C693000
trusted library allocation
page read and write
1B0FC3C24000
trusted library allocation
page read and write
267A5751000
heap
page read and write
2679C512000
trusted library allocation
page read and write
2679C0FA000
trusted library allocation
page read and write
267A3AFB000
trusted library allocation
page read and write
26796D52000
heap
page read and write
2679C321000
trusted library allocation
page read and write
2679D07E000
trusted library allocation
page read and write
267A60B9000
trusted library allocation
page read and write
26796D40000
heap
page read and write
267A3D50000
trusted library allocation
page read and write
21AD9E10000
trusted library allocation
page read and write
2679A0EC000
trusted library allocation
page read and write
2679C424000
trusted library allocation
page read and write
267A60A1000
trusted library allocation
page read and write
26796D73000
heap
page read and write
2679DB9F000
trusted library allocation
page read and write
267A2C6E000
trusted library allocation
page read and write
267A35CA000
trusted library allocation
page read and write
26796D3A000
heap
page read and write
17F9EDAC000
heap
page read and write
26796BDE000
trusted library allocation
page read and write
267A35BE000
trusted library allocation
page read and write
26799DE8000
trusted library allocation
page read and write
2679ADF8000
trusted library allocation
page read and write
26797F4A000
trusted library allocation
page read and write
26798137000
trusted library allocation
page read and write
99C6BB000
stack
page read and write
267A39EF000
trusted library allocation
page read and write
267A60B9000
trusted library allocation
page read and write
267A5241000
trusted library allocation
page read and write
2679C47A000
trusted library allocation
page read and write
1EC881A9000
heap
page read and write
26797F58000
trusted library allocation
page read and write
2679C674000
trusted library allocation
page read and write
26796D5A000
heap
page read and write
2679D06F000
trusted library allocation
page read and write
21AD9A9E000
remote allocation
page execute read
26796D52000
heap
page read and write
26795378000
trusted library allocation
page read and write
21AD9E5B000
trusted library allocation
page read and write
21AD9C82000
unclassified section
page read and write
267A39AE000
trusted library allocation
page read and write
2679A0EC000
trusted library allocation
page read and write
26796D36000
heap
page read and write
2679C517000
trusted library allocation
page read and write
26799F30000
trusted library allocation
page read and write
267A38C5000
trusted library allocation
page read and write
26796D73000
heap
page read and write
267955EC000
trusted library allocation
page read and write
26799FF0000
trusted library allocation
page read and write
2679B1CC000
trusted library allocation
page read and write
2679B845000
trusted library allocation
page read and write
26796D56000
heap
page read and write
2679C6E4000
trusted library allocation
page read and write
2679C6C7000
trusted library allocation
page read and write
26796D36000
heap
page read and write
26796BFC000
trusted library allocation
page read and write
26796D56000
heap
page read and write
4BDE000
stack
page read and write
26796B67000
trusted library allocation
page read and write
26797C69000
trusted library allocation
page read and write
26795A18000
trusted library allocation
page read and write
267A39F1000
trusted library allocation
page read and write
267973F0000
trusted library allocation
page read and write
2679B1B7000
trusted library allocation
page read and write
2679D05B000
trusted library allocation
page read and write
267A3D2A000
trusted library allocation
page read and write
1EC87DEB000
heap
page read and write
267A605C000
trusted library allocation
page read and write
26799FAE000
trusted library allocation
page read and write
267A56E1000
heap
page read and write
267A5EDF000
trusted library allocation
page read and write
26796D5A000
heap
page read and write
267A35CA000
trusted library allocation
page read and write
2679C090000
trusted library allocation
page read and write
26796D42000
heap
page read and write
2679C08C000
trusted library allocation
page read and write
99F27E000
stack
page read and write
26796BDE000
trusted library allocation
page read and write
1EC87310000
heap
page readonly
26799D8A000
trusted library allocation
page read and write
26799FF4000
trusted library allocation
page read and write
26796D36000
heap
page read and write
26798154000
trusted library allocation
page read and write
2679BF9F000
trusted library allocation
page read and write
26796D5C000
heap
page read and write
2679A6E5000
trusted library allocation
page read and write
2679BFBE000
trusted library allocation
page read and write
2679B1C4000
trusted library allocation
page read and write
26796D32000
heap
page read and write
2679C693000
trusted library allocation
page read and write
26797F81000
trusted library allocation
page read and write
26796D5A000
heap
page read and write
1EC87DEB000
heap
page read and write
267A56E1000
heap
page read and write
26795D39000
trusted library allocation
page read and write
17F9D140000
heap
page read and write
1DB6B153000
heap
page read and write
2679DB8B000
trusted library allocation
page read and write
2679BCCD000
trusted library allocation
page read and write
2679DC48000
trusted library allocation
page read and write
26797F93000
trusted library allocation
page read and write
26796D51000
heap
page read and write
267A3150000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
267A38D9000
trusted library allocation
page read and write
267A36A9000
trusted library allocation
page read and write
5440000
heap
page read and write
2679BF8D000
trusted library allocation
page read and write
26796D7A000
heap
page read and write
26796D32000
heap
page read and write
26796D32000
heap
page read and write
26799D41000
trusted library allocation
page read and write
26799DEA000
trusted library allocation
page read and write
26796D32000
heap
page read and write
2679C48C000
trusted library allocation
page read and write
26799D7B000
trusted library allocation
page read and write
2679BD92000
trusted library allocation
page read and write
26796D84000
heap
page read and write
2679D012000
trusted library allocation
page read and write
267A38FC000
trusted library allocation
page read and write
2679C6C9000
trusted library allocation
page read and write
26799C07000
heap
page read and write
26799D5B000
trusted library allocation
page read and write
26799FF4000
trusted library allocation
page read and write
26796D4E000
heap
page read and write
26799C2D000
heap
page read and write
267A2C39000
trusted library allocation
page read and write
26796D51000
heap
page read and write
2679BDC1000
trusted library allocation
page read and write
2679C5C8000
trusted library allocation
page read and write
26797C6D000
trusted library allocation
page read and write
267973D2000
trusted library allocation
page read and write
26797C81000
trusted library allocation
page read and write
267A39F3000
trusted library allocation
page read and write
267973F8000
trusted library allocation
page read and write
267A3182000
trusted library allocation
page read and write
26799C09000
heap
page read and write
26797333000
trusted library allocation
page read and write
2679A2CE000
trusted library allocation
page read and write
2679DC68000
trusted library allocation
page read and write
267A60A4000
trusted library allocation
page read and write
26795A7E000
trusted library allocation
page read and write
26796D2B000
heap
page read and write
267A571F000
heap
page read and write
26796D3D000
heap
page read and write
1DB6AFF7000
remote allocation
page execute read
26796D5A000
heap
page read and write
2679A0F1000
trusted library allocation
page read and write
1EC87340000
trusted library section
page readonly
26796D36000
heap
page read and write
26795DB2000
trusted library allocation
page read and write
26799F27000
trusted library allocation
page read and write
267A2C6B000
trusted library allocation
page read and write
267A2C39000
trusted library allocation
page read and write
267981BE000
trusted library allocation
page read and write
26799E22000
trusted library allocation
page read and write
2679BF41000
trusted library allocation
page read and write
2679D077000
trusted library allocation
page read and write
26795A93000
trusted library allocation
page read and write
26799E22000
trusted library allocation
page read and write
26797C85000
trusted library allocation
page read and write
26796D73000
heap
page read and write
267A39C8000
trusted library allocation
page read and write
2679C490000
trusted library allocation
page read and write
2679D0BD000
trusted library allocation
page read and write
2679C3F4000
trusted library allocation
page read and write
267A2CF6000
trusted library allocation
page read and write
2679C5D2000
trusted library allocation
page read and write
26796D52000
heap
page read and write
267A38F2000
trusted library allocation
page read and write
267A38E9000
trusted library allocation
page read and write
267972DB000
trusted library allocation
page read and write
2679B1CC000
trusted library allocation
page read and write
2679D0DE000
trusted library allocation
page read and write
2679D04B000
trusted library allocation
page read and write
26796D52000
heap
page read and write
26798168000
trusted library allocation
page read and write
267A6080000
trusted library allocation
page read and write
267972F7000
trusted library allocation
page read and write
26795DFC000
trusted library allocation
page read and write
1EC87DE3000
heap
page read and write
26797FCE000
trusted library allocation
page read and write
267A60B9000
trusted library allocation
page read and write
26796BB6000
trusted library allocation
page read and write
267972DE000
trusted library allocation
page read and write
2679C584000
trusted library allocation
page read and write
2679C62D000
trusted library allocation
page read and write
2679DC68000
trusted library allocation
page read and write
2679C4AC000
trusted library allocation
page read and write
26796D56000
heap
page read and write
2679A2A7000
trusted library allocation
page read and write
267A36E7000
trusted library allocation
page read and write
26796A52000
trusted library allocation
page read and write
267A602E000
trusted library allocation
page read and write
267973F0000
trusted library allocation
page read and write
2679BDD0000
trusted library allocation
page read and write
2679C0F6000
trusted library allocation
page read and write
2679BBE6000
trusted library allocation
page read and write
26795DD3000
trusted library allocation
page read and write
26799FE0000
trusted library allocation
page read and write
267A38D9000
trusted library allocation
page read and write
2F6E67E000
stack
page read and write
26796B2B000
trusted library allocation
page read and write
2679C490000
trusted library allocation
page read and write
1EC87DA1000
heap
page read and write
2679DBE6000
trusted library allocation
page read and write
267955E4000
trusted library allocation
page read and write
2679D0B2000
trusted library allocation
page read and write
2679C6EF000
trusted library allocation
page read and write
26796D32000
heap
page read and write
26799DB8000
trusted library allocation
page read and write
1EC88185000
heap
page read and write
267A3579000
trusted library allocation
page read and write
26796D30000
heap
page read and write
6C732FE000
unkown
page readonly
26797311000
trusted library allocation
page read and write
267A3851000
trusted library allocation
page read and write
26796D32000
heap
page read and write
2679DBE4000
trusted library allocation
page read and write
26796BDA000
trusted library allocation
page read and write
26796D54000
heap
page read and write
267A3879000
trusted library allocation
page read and write
26799F92000
trusted library allocation
page read and write
26799D5B000
trusted library allocation
page read and write
2679C0EB000
trusted library allocation
page read and write
14F8000
heap
page read and write
26796D36000
heap
page read and write
2679C58A000
trusted library allocation
page read and write
2679C68E000
trusted library allocation
page read and write
267A3888000
trusted library allocation
page read and write
26799FF4000
trusted library allocation
page read and write
267A62ED000
trusted library allocation
page read and write
21ADA01D000
trusted library allocation
page read and write
26799D5A000
trusted library allocation
page read and write
26796D52000
heap
page read and write
26796D73000
heap
page read and write
2679A6A2000
trusted library allocation
page read and write
267972AD000
trusted library allocation
page read and write
2679A263000
trusted library allocation
page read and write
26799D93000
trusted library allocation
page read and write
22D0000
heap
page read and write
267A381B000
trusted library allocation
page read and write
26799C0D000
heap
page read and write
267986EB000
trusted library allocation
page read and write
1EC87D00000
heap
page read and write
267A3690000
trusted library allocation
page read and write
267972DB000
trusted library allocation
page read and write
2679DC68000
trusted library allocation
page read and write
26796CAA000
trusted library allocation
page read and write
26797C9F000
trusted library allocation
page read and write
26797FD8000
trusted library allocation
page read and write
1EC87DE6000
heap
page read and write
2679A697000
trusted library allocation
page read and write
2679B150000
trusted library allocation
page read and write
267A2C5A000
trusted library allocation
page read and write
26796D5A000
heap
page read and write
26796D56000
heap
page read and write
26796B73000
trusted library allocation
page read and write
2679A6A2000
trusted library allocation
page read and write
267A3D50000
trusted library allocation
page read and write
26795DBF000
trusted library allocation
page read and write
267A3853000
trusted library allocation
page read and write
26796D40000
heap
page read and write
2679DBE8000
trusted library allocation
page read and write
26799C0B000
heap
page read and write
267A3649000
trusted library allocation
page read and write
1EC87DF2000
heap
page read and write
26797F81000
trusted library allocation
page read and write
26796D32000
heap
page read and write
267A2C77000
trusted library allocation
page read and write
2679DBFE000
trusted library allocation
page read and write
21ADA007000
trusted library allocation
page read and write
267A38F5000
trusted library allocation
page read and write
26799FFB000
trusted library allocation
page read and write
267A3AE7000
trusted library allocation
page read and write
267A2CE2000
trusted library allocation
page read and write
21AD9AAA000
heap
page read and write
26795DE6000
trusted library allocation
page read and write
1002000
unkown
page readonly
2679BDC1000
trusted library allocation
page read and write
267A314C000
trusted library allocation
page read and write
2679BEC8000
trusted library allocation
page read and write
26796D84000
heap
page read and write
26796D41000
heap
page read and write
26796D52000
heap
page read and write
1EC88197000
heap
page read and write
3DE1000
heap
page read and write
2679BE92000
trusted library allocation
page read and write
1EC87090000
heap
page read and write
26796D52000
heap
page read and write
1EC87D6C000
heap
page read and write
1FE4470A000
trusted library allocation
page read and write
2679C0F1000
trusted library allocation
page read and write
267A3584000
trusted library allocation
page read and write
26797FA2000
trusted library allocation
page read and write
2679DC68000
trusted library allocation
page read and write
F41000
unkown
page execute read
267A35B5000
trusted library allocation
page read and write
1EC87DEB000
heap
page read and write
26798189000
trusted library allocation
page read and write
267981AE000
trusted library allocation
page read and write
2679B843000
trusted library allocation
page read and write
26797F7D000
trusted library allocation
page read and write
267A3DA1000
trusted library allocation
page read and write
26799C27000
heap
page read and write
26796D36000
heap
page read and write
267981E5000
trusted library allocation
page read and write
26796D29000
heap
page read and write
26799FF9000
trusted library allocation
page read and write
2679C6BF000
trusted library allocation
page read and write
2679AE07000
trusted library allocation
page read and write
26796D29000
heap
page read and write
26797F8A000
trusted library allocation
page read and write
26796D5C000
heap
page read and write
2679C4FC000
trusted library allocation
page read and write
26799D85000
trusted library allocation
page read and write
2679BDB7000
trusted library allocation
page read and write
26799FE6000
trusted library allocation
page read and write
26799DC8000
trusted library allocation
page read and write
267A3171000
trusted library allocation
page read and write
26799934000
trusted library allocation
page read and write
267953B3000
trusted library allocation
page read and write
267A36E6000
trusted library allocation
page read and write
26799873000
trusted library allocation
page read and write
267A2C9B000
trusted library allocation
page read and write
2679AAFE000
trusted library allocation
page read and write
267A388B000
trusted library allocation
page read and write
140B000
stack
page read and write
26796D2C000
heap
page read and write
26796D80000
heap
page read and write
2679C3EE000
trusted library allocation
page read and write
26797336000
trusted library allocation
page read and write
267A3960000
trusted library allocation
page read and write
2679B85A000
trusted library allocation
page read and write
267A2CF3000
trusted library allocation
page read and write
267A3848000
trusted library allocation
page read and write
2679B8CC000
trusted library allocation
page read and write
267A2C79000
trusted library allocation
page read and write
26799FE0000
trusted library allocation
page read and write
267A40A6000
trusted library allocation
page read and write
267A2C7D000
trusted library allocation
page read and write
1EC87DFC000
heap
page read and write
2679C6F6000
trusted library allocation
page read and write
2679C0BF000
trusted library allocation
page read and write
267A389B000
trusted library allocation
page read and write
267A3188000
trusted library allocation
page read and write
26797FFE000
trusted library allocation
page read and write
267A3642000
trusted library allocation
page read and write
267A35B1000
trusted library allocation
page read and write
1DB6B378000
trusted library allocation
page read and write
26796D39000
heap
page read and write
26796D32000
heap
page read and write
267953CC000
trusted library allocation
page read and write
267A3AD5000
trusted library allocation
page read and write
2679DBE0000
trusted library allocation
page read and write
26799D8A000
trusted library allocation
page read and write
1DB6B311000
trusted library allocation
page read and write
2679D09A000
trusted library allocation
page read and write
26796D52000
heap
page read and write
13FE000
stack
page read and write
2679DBA2000
trusted library allocation
page read and write
267A6091000
trusted library allocation
page read and write
2679C0BC000
trusted library allocation
page read and write
2679C356000
trusted library allocation
page read and write
26796A9A000
trusted library allocation
page read and write
2679BBD3000
trusted library allocation
page read and write
26798178000
trusted library allocation
page read and write
26795381000
trusted library allocation
page read and write
267973FB000
trusted library allocation
page read and write
1450000
trusted library allocation
page read and write
1EC87DF1000
heap
page read and write
26796CEB000
trusted library allocation
page read and write
2679AAE4000
trusted library allocation
page read and write
26796D52000
heap
page read and write
2679C092000
trusted library allocation
page read and write
26796A6A000
trusted library allocation
page read and write
26799D9D000
trusted library allocation
page read and write
2679BE92000
trusted library allocation
page read and write
2679AE05000
trusted library allocation
page read and write
2679D09E000
trusted library allocation
page read and write
267A3DCF000
trusted library allocation
page read and write
267A39D4000
trusted library allocation
page read and write
26795A1E000
trusted library allocation
page read and write
2679993B000
trusted library allocation
page read and write
26799EF9000
trusted library allocation
page read and write
2679C0D6000
trusted library allocation
page read and write
2679817D000
trusted library allocation
page read and write
1EC88160000
heap
page read and write
1DB6B4B0000
heap
page read and write
267A3142000
trusted library allocation
page read and write
26797C6A000
trusted library allocation
page read and write
267A3D55000
trusted library allocation
page read and write
1EC87D8A000
heap
page read and write
26799FEE000
trusted library allocation
page read and write
1DB6B3B9000
trusted library allocation
page read and write
26797FD8000
trusted library allocation
page read and write
26796D59000
heap
page read and write
267953BF000
trusted library allocation
page read and write
267A39F3000
trusted library allocation
page read and write
267A38EE000
trusted library allocation
page read and write
2679C5A4000
trusted library allocation
page read and write
3D237C004000
trusted library allocation
page read and write
2679A2E2000
trusted library allocation
page read and write
3DE1000
heap
page read and write
26796D3D000
heap
page read and write
2679AAEC000
trusted library allocation
page read and write
267A2C5D000
trusted library allocation
page read and write
26796D3E000
heap
page read and write
21AD9AA0000
heap
page read and write
26799DEE000
trusted library allocation
page read and write
2679A064000
trusted library allocation
page read and write
267A3AF2000
trusted library allocation
page read and write
2F6EE7E000
unkown
page readonly
2679BF43000
trusted library allocation
page read and write
26796D5A000
heap
page read and write
26797E08000
trusted library allocation
page read and write
2679C445000
trusted library allocation
page read and write
26796A2B000
trusted library allocation
page read and write
26797F58000
trusted library allocation
page read and write
2679C0CA000
trusted library allocation
page read and write
2679C47E000
trusted library allocation
page read and write
2679DBE2000
trusted library allocation
page read and write
2679C0EB000
trusted library allocation
page read and write
2679C6C9000
trusted library allocation
page read and write
26795DE6000
trusted library allocation
page read and write
267981DC000
trusted library allocation
page read and write
26796D29000
heap
page read and write
2679A263000
trusted library allocation
page read and write
267A316B000
trusted library allocation
page read and write
267981DF000
trusted library allocation
page read and write
2679B18B000
trusted library allocation
page read and write
26796D3B000
heap
page read and write
2679DBE2000
trusted library allocation
page read and write
1EC87D7D000
heap
page read and write
26797C64000
trusted library allocation
page read and write
26799C09000
heap
page read and write
26799951000
trusted library allocation
page read and write
D70000
heap
page read and write
26799E5D000
trusted library allocation
page read and write
26796B15000
trusted library allocation
page read and write
26799885000
trusted library allocation
page read and write
2679B831000
trusted library allocation
page read and write
26799FF4000
trusted library allocation
page read and write
26795352000
trusted library allocation
page read and write
2679C5D2000
trusted library allocation
page read and write
2679DBE0000
trusted library allocation
page read and write
26799D3B000
trusted library allocation
page read and write
26796C96000
trusted library allocation
page read and write
26799FEE000
trusted library allocation
page read and write
267A4088000
trusted library allocation
page read and write
1EC881B6000
heap
page read and write
2679C4C2000
trusted library allocation
page read and write
2679BE2D000
trusted library allocation
page read and write
267A60CB000
trusted library allocation
page read and write
26796C31000
trusted library allocation
page read and write
2679BD8D000
trusted library allocation
page read and write
26799D51000
trusted library allocation
page read and write
1DB6B130000
heap
page read and write
26799DC7000
trusted library allocation
page read and write
2679BB8B000
trusted library allocation
page read and write
26797F81000
trusted library allocation
page read and write
2A17FFE000
stack
page read and write
2679DB8C000
trusted library allocation
page read and write
2679C582000
trusted library allocation
page read and write
267959F6000
trusted library allocation
page read and write
2679DBAD000
trusted library allocation
page read and write
267A38C5000
trusted library allocation
page read and write
2679B1D3000
trusted library allocation
page read and write
2679A263000
trusted library allocation
page read and write
2679989C000
trusted library allocation
page read and write
2679BCAB000
trusted library allocation
page read and write
267A3841000
trusted library allocation
page read and write
26799C1F000
heap
page read and write
2679B843000
trusted library allocation
page read and write
26796D51000
heap
page read and write
26797FCE000
trusted library allocation
page read and write
26796D40000
heap
page read and write
267A38E0000
trusted library allocation
page read and write
2679BABF000
trusted library allocation
page read and write
26796D30000
heap
page read and write
26796D56000
heap
page read and write
26795DC6000
trusted library allocation
page read and write
2F6CBFE000
unkown
page readonly
267A38E9000
trusted library allocation
page read and write
1EC88164000
heap
page read and write
26799E82000
trusted library allocation
page read and write
2679B1DF000
trusted library allocation
page read and write
2679991A000
trusted library allocation
page read and write
6C709FE000
stack
page read and write
26799EFD000
trusted library allocation
page read and write
2679C5D6000
trusted library allocation
page read and write
21AD9EAB000
trusted library allocation
page read and write
1EC87423000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
2679A6CB000
trusted library allocation
page read and write
2679DB92000
trusted library allocation
page read and write
26796D32000
heap
page read and write
26796D32000
heap
page read and write
2679BFB4000
trusted library allocation
page read and write
2679C0D6000
trusted library allocation
page read and write
26796D46000
heap
page read and write
1EC87403000
trusted library allocation
page read and write
1EC87DF1000
heap
page read and write
26795DF4000
trusted library allocation
page read and write
2679BD87000
trusted library allocation
page read and write
1FE44400000
heap
page read and write
267A605A000
trusted library allocation
page read and write
2679C44B000
trusted library allocation
page read and write
2679DBE4000
trusted library allocation
page read and write
26796D84000
heap
page read and write
267A316D000
trusted library allocation
page read and write
26796D56000
heap
page read and write
2679989E000
trusted library allocation
page read and write
26796D56000
heap
page read and write
1EC87418000
trusted library allocation
page read and write
26796D32000
heap
page read and write
2679BEBF000
trusted library allocation
page read and write
2679DBDE000
trusted library allocation
page read and write
26796D7C000
heap
page read and write
267981D6000
trusted library allocation
page read and write
2679C48C000
trusted library allocation
page read and write
267973F0000
trusted library allocation
page read and write
2679A6FE000
trusted library allocation
page read and write
2679BCB3000
trusted library allocation
page read and write
2679AAF6000
trusted library allocation
page read and write
267981C0000
trusted library allocation
page read and write
267A35FD000
trusted library allocation
page read and write
2679C496000
trusted library allocation
page read and write
267972DE000
trusted library allocation
page read and write
26797FC1000
trusted library allocation
page read and write
DB4000
heap
page read and write
1EC8745C000
trusted library allocation
page read and write
3DE1000
heap
page read and write
2679BD83000
trusted library allocation
page read and write
2679A2FD000
trusted library allocation
page read and write
2679727A000
trusted library allocation
page read and write
26796D84000
heap
page read and write
1DB6B303000
trusted library allocation
page read and write
267A5EE3000
trusted library allocation
page read and write
2679BC71000
trusted library allocation
page read and write
267A3627000
trusted library allocation
page read and write
267A3AED000
trusted library allocation
page read and write
267A3159000
trusted library allocation
page read and write
26797FA3000
trusted library allocation
page read and write
1FE44707000
trusted library allocation
page read and write
2679BFF7000
trusted library allocation
page read and write
2679A2FB000
trusted library allocation
page read and write
26796D57000
heap
page read and write
267981DF000
trusted library allocation
page read and write
26796D32000
heap
page read and write
267A2C3D000
trusted library allocation
page read and write
26799C53000
heap
page read and write
267A60A4000
trusted library allocation
page read and write
26799DE8000
trusted library allocation
page read and write
267A38EB000
trusted library allocation
page read and write
267998D5000
trusted library allocation
page read and write
2679AD26000
trusted library allocation
page read and write
2679B8F8000
trusted library allocation
page read and write
26799C26000
heap
page read and write
1EC87DFC000
heap
page read and write
2679C094000
trusted library allocation
page read and write
26798178000
trusted library allocation
page read and write
26796D40000
heap
page read and write
1EC87DE8000
heap
page read and write
2679A074000
trusted library allocation
page read and write
2679BD81000
trusted library allocation
page read and write
26797D08000
trusted library allocation
page read and write
26799DC5000
trusted library allocation
page read and write
2679B863000
trusted library allocation
page read and write
2679C5AE000
trusted library allocation
page read and write
26796BF3000
trusted library allocation
page read and write
267A605C000
trusted library allocation
page read and write
26799FE0000
trusted library allocation
page read and write
99C7FE000
unkown
page readonly
267A56E1000
heap
page read and write
26796D2C000
heap
page read and write
267A5EAB000
trusted library allocation
page read and write
267A3697000
trusted library allocation
page read and write
26796D56000
heap
page read and write
26797F9F000
trusted library allocation
page read and write
1DB6AF80000
unclassified section
page readonly
267A38FC000
trusted library allocation
page read and write
267A6023000
trusted library allocation
page read and write
21AD9E03000
trusted library allocation
page read and write
267A4090000
trusted library allocation
page read and write
267A2C6B000
trusted library allocation
page read and write
2679C351000
trusted library allocation
page read and write
2679BABF000
trusted library allocation
page read and write
26799934000
trusted library allocation
page read and write
2679C415000
trusted library allocation
page read and write
267A6023000
trusted library allocation
page read and write
26795DBD000
trusted library allocation
page read and write
26799FF4000
trusted library allocation
page read and write
26797FB1000
trusted library allocation
page read and write
2679B8CC000
trusted library allocation
page read and write
26798165000
trusted library allocation
page read and write
2679C59C000
trusted library allocation
page read and write
267A6023000
trusted library allocation
page read and write
267A2CCB000
trusted library allocation
page read and write
26796A41000
trusted library allocation
page read and write
2679699E000
trusted library allocation
page read and write
1EC87A23000
heap
page read and write
2679BD5D000
trusted library allocation
page read and write
1DB6B376000
trusted library allocation
page read and write
2679C697000
trusted library allocation
page read and write
2F6DDBE000
stack
page read and write
26798659000
trusted library allocation
page read and write
26795AF0000
trusted library allocation
page read and write
2679C08E000
trusted library allocation
page read and write
2679BEBB000
trusted library allocation
page read and write
99C6FE000
unkown
page readonly
26796D7A000
heap
page read and write
26796D39000
heap
page read and write
26797C98000
trusted library allocation
page read and write
2679B1DF000
trusted library allocation
page read and write
26796D51000
heap
page read and write
26799FFA000
trusted library allocation
page read and write
26797F6A000
trusted library allocation
page read and write
2679B881000
trusted library allocation
page read and write
26795A13000
trusted library allocation
page read and write
26795D63000
trusted library allocation
page read and write
267A605A000
trusted library allocation
page read and write
26796CDC000
trusted library allocation
page read and write
26796B87000
trusted library allocation
page read and write
2679BBF0000
trusted library allocation
page read and write
26796D5C000
heap
page read and write
26797286000
trusted library allocation
page read and write
541D000
stack
page read and write
26796D39000
heap
page read and write
2679699E000
trusted library allocation
page read and write
267A38E2000
trusted library allocation
page read and write
2679A08F000
trusted library allocation
page read and write
2679C456000
trusted library allocation
page read and write
26797C9F000
trusted library allocation
page read and write
26796D57000
heap
page read and write
267A389B000
trusted library allocation
page read and write
2679C092000
trusted library allocation
page read and write
267981D6000
trusted library allocation
page read and write
267A40A2000
trusted library allocation
page read and write
26799FE6000
trusted library allocation
page read and write
267954B5000
trusted library allocation
page read and write
26796D5C000
heap
page read and write
26796BFA000
trusted library allocation
page read and write
2679C3EE000
trusted library allocation
page read and write
26797C9F000
trusted library allocation
page read and write
17F9D2F0000
heap
page read and write
26796D7A000
heap
page read and write
2679C063000
trusted library allocation
page read and write
267A2C93000
trusted library allocation
page read and write
26796D32000
heap
page read and write
2679C055000
trusted library allocation
page read and write
26799FF0000
trusted library allocation
page read and write
267A60B9000
trusted library allocation
page read and write
2679BD5A000
trusted library allocation
page read and write
26796D80000
heap
page read and write
1EC87D01000
heap
page read and write
2679BC71000
trusted library allocation
page read and write
267A2C3C000
trusted library allocation
page read and write
26799C09000
heap
page read and write
26796D52000
heap
page read and write
26799835000
trusted library allocation
page read and write
2679BE07000
trusted library allocation
page read and write
2679BFC7000
trusted library allocation
page read and write
267A3DCC000
trusted library allocation
page read and write
2679BE32000
trusted library allocation
page read and write
1DB6B3F6000
trusted library allocation
page read and write
267A2C66000
trusted library allocation
page read and write
26796B3A000
trusted library allocation
page read and write
26799C53000
heap
page read and write
26799FF0000
trusted library allocation
page read and write
267A313A000
trusted library allocation
page read and write
2679C5D0000
trusted library allocation
page read and write
26799C09000
heap
page read and write
2679DBE4000
trusted library allocation
page read and write
267A3882000
trusted library allocation
page read and write
26799C53000
heap
page read and write
2679A070000
trusted library allocation
page read and write
1EC873E8000
unkown
page execute read
2679AAC3000
trusted library allocation
page read and write
26799FE6000
trusted library allocation
page read and write
26799D8C000
trusted library allocation
page read and write
17F9D160000
heap
page read and write
2679C4AC000
trusted library allocation
page read and write
267A60A1000
trusted library allocation
page read and write
2679869E000
trusted library allocation
page read and write
2679ADD8000
trusted library allocation
page read and write
26797F8A000
trusted library allocation
page read and write
267A605C000
trusted library allocation
page read and write
26796D53000
heap
page read and write
21AD9EE9000
trusted library allocation
page read and write
2679C6A4000
trusted library allocation
page read and write
26796D39000
heap
page read and write
267A3DE6000
trusted library allocation
page read and write
2679819A000
trusted library allocation
page read and write
267A2C93000
trusted library allocation
page read and write
267986A1000
trusted library allocation
page read and write
267954F1000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
26799D35000
trusted library allocation
page read and write
2679735F000
trusted library allocation
page read and write
26799EF9000
trusted library allocation
page read and write
26797356000
trusted library allocation
page read and write
17F9D300000
trusted library allocation
page read and write
26797C77000
trusted library allocation
page read and write
26799E5D000
trusted library allocation
page read and write
267A38A4000
trusted library allocation
page read and write
26796D73000
heap
page read and write
26797C81000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
267A60CB000
trusted library allocation
page read and write
26797310000
trusted library allocation
page read and write
2679BDFD000
trusted library allocation
page read and write
2679819A000
trusted library allocation
page read and write
267A3D99000
trusted library allocation
page read and write
DB4000
heap
page read and write
267954AD000
trusted library allocation
page read and write
26796D40000
heap
page read and write
26796D3C000
heap
page read and write
26799D1F000
trusted library allocation
page read and write
26796B9E000
trusted library allocation
page read and write
26799FF0000
trusted library allocation
page read and write
26796D32000
heap
page read and write
26799D70000
trusted library allocation
page read and write
2679C575000
trusted library allocation
page read and write
2679DBEA000
trusted library allocation
page read and write
267A3DCC000
trusted library allocation
page read and write
267A40C5000
trusted library allocation
page read and write
2679D0DE000
trusted library allocation
page read and write
2A177FB000
stack
page read and write
2679B8CC000
trusted library allocation
page read and write
267A6023000
trusted library allocation
page read and write
267A40A2000
trusted library allocation
page read and write
6C712BE000
stack
page read and write
1EC87DE0000
heap
page read and write
2F6D57E000
stack
page read and write
26796D56000
heap
page read and write
26795DCD000
trusted library allocation
page read and write
22D6000
heap
page read and write
2679BBE6000
trusted library allocation
page read and write
267A2C7C000
trusted library allocation
page read and write
2679DBEC000
trusted library allocation
page read and write
2679C0CF000
trusted library allocation
page read and write
2679C69E000
trusted library allocation
page read and write
2679BDCE000
trusted library allocation
page read and write
2679D0D4000
trusted library allocation
page read and write
2679B184000
trusted library allocation
page read and write
2679A2D7000
trusted library allocation
page read and write
26796D3D000
heap
page read and write
1FE44600000
trusted library allocation
page read and write
2679B8CC000
trusted library allocation
page read and write
1EC873D7000
unkown
page execute read
2679C6E2000
trusted library allocation
page read and write
2679B8E4000
trusted library allocation
page read and write
267A39E4000
trusted library allocation
page read and write
267A35DB000
trusted library allocation
page read and write
4FDF000
stack
page read and write
26796CC1000
trusted library allocation
page read and write
267A2CF3000
trusted library allocation
page read and write
2679C445000
trusted library allocation
page read and write
2679C0DB000
trusted library allocation
page read and write
267953C6000
trusted library allocation
page read and write
26796D40000
heap
page read and write
2679C496000
trusted library allocation
page read and write
26799FF0000
trusted library allocation
page read and write
2679C48C000
trusted library allocation
page read and write
267A62E9000
trusted library allocation
page read and write
2679C41E000
trusted library allocation
page read and write
2679ADFD000
trusted library allocation
page read and write
1EC870F0000
heap
page read and write
26797FAE000
trusted library allocation
page read and write
2679BDF6000
trusted library allocation
page read and write
26797FDB000
trusted library allocation
page read and write
2679BCAB000
trusted library allocation
page read and write
2679A6BF000
trusted library allocation
page read and write
267A362F000
trusted library allocation
page read and write
267A3D47000
trusted library allocation
page read and write
2679DBAD000
trusted library allocation
page read and write
26796D32000
heap
page read and write
1FE44420000
heap
page read and write
26797FB3000
trusted library allocation
page read and write
1EC870FA000
heap
page read and write
2679D07C000
trusted library allocation
page read and write
2F6DE7E000
unkown
page readonly
2679A074000
trusted library allocation
page read and write
267A3D47000
trusted library allocation
page read and write
1FE44440000
heap
page read and write
2679B168000
trusted library allocation
page read and write
2679C68A000
trusted library allocation
page read and write
26796BDA000
trusted library allocation
page read and write
26796D36000
heap
page read and write
2679A0F1000
trusted library allocation
page read and write
26797F60000
trusted library allocation
page read and write
267A38D4000
trusted library allocation
page read and write
26796D7C000
heap
page read and write
267A3DF1000
trusted library allocation
page read and write
26796D48000
heap
page read and write
26799D3E000
trusted library allocation
page read and write
267A3AED000
trusted library allocation
page read and write
21ADA032000
trusted library allocation
page read and write
267A3D47000
trusted library allocation
page read and write
99C77E000
unkown
page readonly
26796D41000
heap
page read and write
26795DD4000
trusted library allocation
page read and write
26797C98000
trusted library allocation
page read and write
2679B863000
trusted library allocation
page read and write
2679C52D000
trusted library allocation
page read and write
2679D04F000
trusted library allocation
page read and write
26796CBE000
trusted library allocation
page read and write
26796D2B000
heap
page read and write
1EC88181000
heap
page read and write
26796D52000
heap
page read and write
26795398000
trusted library allocation
page read and write
26797FD5000
trusted library allocation
page read and write
26799FE6000
trusted library allocation
page read and write
26796D48000
heap
page read and write
26799942000
trusted library allocation
page read and write
267A2CFE000
trusted library allocation
page read and write
3DE1000
heap
page read and write
2679C4BF000
trusted library allocation
page read and write
267A56E1000
heap
page read and write
1EC881A9000
heap
page read and write
26797FFE000
trusted library allocation
page read and write
26796D3A000
heap
page read and write
2679D07E000
trusted library allocation
page read and write
26796A79000
trusted library allocation
page read and write
3DE1000
heap
page read and write
1DB6B4B4000
heap
page read and write
26795B00000
trusted library allocation
page read and write
2679A070000
trusted library allocation
page read and write
2679D06F000
trusted library allocation
page read and write
1EC87DF1000
heap
page read and write
2679BE24000
trusted library allocation
page read and write
26796D80000
heap
page read and write
267981EE000
trusted library allocation
page read and write
26796D51000
heap
page read and write
1FE44700000
trusted library allocation
page read and write
26796D40000
heap
page read and write
2679DC3C000
trusted library allocation
page read and write
26797232000
trusted library allocation
page read and write
26796A49000
trusted library allocation
page read and write
2679BE07000
trusted library allocation
page read and write
21AD9E7E000
trusted library allocation
page read and write
267A5716000
heap
page read and write
26796B73000
trusted library allocation
page read and write
2679987E000
trusted library allocation
page read and write
267A38E0000
trusted library allocation
page read and write
26796D41000
heap
page read and write
2679ADFC000
trusted library allocation
page read and write
26799C25000
heap
page read and write
2679C55D000
trusted library allocation
page read and write
267A395C000
trusted library allocation
page read and write
26796CA1000
trusted library allocation
page read and write
26797C98000
trusted library allocation
page read and write
26796D33000
heap
page read and write
9A027E000
stack
page read and write
1B0FC3C1E000
trusted library allocation
page read and write
26799FF0000
trusted library allocation
page read and write
2679993E000
trusted library allocation
page read and write
26796D32000
heap
page read and write
501C000
stack
page read and write
3DE1000
heap
page read and write
267A39D4000
trusted library allocation
page read and write
2679DBAD000
trusted library allocation
page read and write
2679BE2D000
trusted library allocation
page read and write
2F6CC3C000
stack
page read and write
26796D3B000
heap
page read and write
2679BA88000
trusted library allocation
page read and write
26799D19000
trusted library allocation
page read and write
26799FF0000
trusted library allocation
page read and write
26796D56000
heap
page read and write
2679817B000
trusted library allocation
page read and write
26799C0B000
heap
page read and write
DB4000
heap
page read and write
2679B1D3000
trusted library allocation
page read and write
267973C7000
trusted library allocation
page read and write
2679BDC9000
trusted library allocation
page read and write
26796D73000
heap
page read and write
6B79B1E000
trusted library allocation
page read and write
267A2CF6000
trusted library allocation
page read and write
26796D52000
heap
page read and write
26797F72000
trusted library allocation
page read and write
267A6068000
trusted library allocation
page read and write
2F6F67E000
stack
page read and write
2679C67D000
trusted library allocation
page read and write
267A35DB000
trusted library allocation
page read and write
26796D40000
heap
page read and write
2679C684000
trusted library allocation
page read and write
26796D52000
heap
page read and write
26797CC8000
trusted library allocation
page read and write
21AD9E79000
trusted library allocation
page read and write
1EC87050000
unclassified section
page readonly
26799C26000
heap
page read and write
26796BC6000
trusted library allocation
page read and write
267A3169000
trusted library allocation
page read and write
26796D2B000
heap
page read and write
26797F4A000
trusted library allocation
page read and write
2679A2FB000
trusted library allocation
page read and write
26796D32000
heap
page read and write
1EC873F0000
trusted library allocation
page read and write
267972AD000
trusted library allocation
page read and write
26799942000
trusted library allocation
page read and write
267986FC000
trusted library allocation
page read and write
26796D46000
heap
page read and write
1EC881B6000
heap
page read and write
2679C44B000
trusted library allocation
page read and write
2679BE92000
trusted library allocation
page read and write
2679C4F7000
trusted library allocation
page read and write
2679BE27000
trusted library allocation
page read and write
267972E5000
trusted library allocation
page read and write
267973F8000
trusted library allocation
page read and write
267A60B9000
trusted library allocation
page read and write
26799896000
trusted library allocation
page read and write
26796D56000
heap
page read and write
2679BE3C000
trusted library allocation
page read and write
26796BFC000
trusted library allocation
page read and write
267A6023000
trusted library allocation
page read and write
26799FC3000
trusted library allocation
page read and write
3DE1000
heap
page read and write
21AD9E60000
trusted library allocation
page read and write
1EC8704D000
remote allocation
page execute read
2679DBDE000
trusted library allocation
page read and write
267A2C6E000
trusted library allocation
page read and write
267973F1000
trusted library allocation
page read and write
26796D2B000
heap
page read and write
2679C0F6000
trusted library allocation
page read and write
2679C6E0000
trusted library allocation
page read and write
267A38F5000
trusted library allocation
page read and write
26796D32000
heap
page read and write
2679D096000
trusted library allocation
page read and write
2679BA31000
trusted library allocation
page read and write
26796D40000
heap
page read and write
2679A263000
trusted library allocation
page read and write
26797FCF000
trusted library allocation
page read and write
2679C0EB000
trusted library allocation
page read and write
2679B873000
trusted library allocation
page read and write
26796D57000
heap
page read and write
2679B18B000
trusted library allocation
page read and write
2679C0F3000
trusted library allocation
page read and write
2679C6E9000
trusted library allocation
page read and write
26797294000
trusted library allocation
page read and write
26796D32000
heap
page read and write
1DB6B35D000
trusted library allocation
page read and write
1DB6B349000
trusted library allocation
page read and write
2679C35F000
trusted library allocation
page read and write
267A388B000
trusted library allocation
page read and write
2679B84B000
trusted library allocation
page read and write
2679C6F6000
trusted library allocation
page read and write
2679C096000
trusted library allocation
page read and write
267A36F2000
trusted library allocation
page read and write
2679BD5A000
trusted library allocation
page read and write
2679B871000
trusted library allocation
page read and write
2679BE79000
trusted library allocation
page read and write
26796CDC000
trusted library allocation
page read and write
2679C63A000
trusted library allocation
page read and write
267A35C6000
trusted library allocation
page read and write
2679BE3C000
trusted library allocation
page read and write
1EC881B6000
heap
page read and write
267A315F000
trusted library allocation
page read and write
26796D32000
heap
page read and write
DB4000
heap
page read and write
267A38D4000
trusted library allocation
page read and write
26796D32000
heap
page read and write
267A39AA000
trusted library allocation
page read and write
26797C9F000
trusted library allocation
page read and write
26796D3B000
heap
page read and write
26797F8A000
trusted library allocation
page read and write
26796D2E000
heap
page read and write
26796D33000
heap
page read and write
267A2C80000
trusted library allocation
page read and write
26796BC2000
trusted library allocation
page read and write
21AD9A10000
unclassified section
page readonly
267A35B1000
trusted library allocation
page read and write
26797233000
trusted library allocation
page read and write
21AD9C44000
heap
page read and write
26796D29000
heap
page read and write
26796D32000
heap
page read and write
2679C5BA000
trusted library allocation
page read and write
267A2C35000
trusted library allocation
page read and write
2679B83A000
trusted library allocation
page read and write
26796D32000
heap
page read and write
26795DF4000
trusted library allocation
page read and write
2679D01A000
trusted library allocation
page read and write
26796A79000
trusted library allocation
page read and write
2679A2E2000
trusted library allocation
page read and write
2679BCAB000
trusted library allocation
page read and write
267A3582000
trusted library allocation
page read and write
1EC87DB9000
heap
page read and write
26796B97000
trusted library allocation
page read and write
26797232000
trusted library allocation
page read and write
2679BE79000
trusted library allocation
page read and write
26797C98000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
26799D35000
trusted library allocation
page read and write
267A39E4000
trusted library allocation
page read and write
267A523D000
trusted library allocation
page read and write
26799FA7000
trusted library allocation
page read and write
2679819A000
trusted library allocation
page read and write
26795DF4000
trusted library allocation
page read and write
26795DBD000
trusted library allocation
page read and write
1014000
unkown
page readonly
2679AAFA000
trusted library allocation
page read and write
2679A6BF000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
26797363000
trusted library allocation
page read and write
26796B78000
trusted library allocation
page read and write
21ADA00F000
trusted library allocation
page read and write
2679800A000
trusted library allocation
page read and write
26796D40000
heap
page read and write
267A2C7D000
trusted library allocation
page read and write
1EC87DEB000
heap
page read and write
26798189000
trusted library allocation
page read and write
2679A6B3000
trusted library allocation
page read and write
1DB6B330000
trusted library allocation
page read and write
28E8BA51000
trusted library allocation
page execute read
26796D32000
heap
page read and write
26796D54000
heap
page read and write
26796D40000
heap
page read and write
21AD9E47000
trusted library allocation
page read and write
26796D39000
heap
page read and write
267A384A000
trusted library allocation
page read and write
267A40B9000
trusted library allocation
page read and write
267A38EE000
trusted library allocation
page read and write
26795D25000
trusted library allocation
page read and write
267969E7000
trusted library allocation
page read and write
2679BBF6000
trusted library allocation
page read and write
2679D0DC000
trusted library allocation
page read and write
267981D6000
trusted library allocation
page read and write
2679C625000
trusted library allocation
page read and write
267A313D000
trusted library allocation
page read and write
26797FC1000
trusted library allocation
page read and write
26799DC8000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
2679BCCD000
trusted library allocation
page read and write
2679DBE8000
trusted library allocation
page read and write
267A5DDA000
trusted library allocation
page read and write
1FE444B9000
heap
page read and write
26799DFD000
trusted library allocation
page read and write
2679C450000
trusted library allocation
page read and write
267973F6000
trusted library allocation
page read and write
2679987E000
trusted library allocation
page read and write
26797C98000
trusted library allocation
page read and write
267A5244000
trusted library allocation
page read and write
267A2C3D000
trusted library allocation
page read and write
26796D73000
heap
page read and write
1DB6B387000
trusted library allocation
page read and write
267A3D3B000
trusted library allocation
page read and write
267A38EE000
trusted library allocation
page read and write
26797C4D000
trusted library allocation
page read and write
DB0000
heap
page read and write
26796D73000
heap
page read and write
2679B18B000
trusted library allocation
page read and write
2679AABB000
trusted library allocation
page read and write
2F6CD7E000
unkown
page readonly
2679C6A4000
trusted library allocation
page read and write
2679C571000
trusted library allocation
page read and write
26795DB2000
trusted library allocation
page read and write
26797F8F000
trusted library allocation
page read and write
26796D36000
heap
page read and write
267A39FE000
trusted library allocation
page read and write
267A39E7000
trusted library allocation
page read and write
2679AAB8000
trusted library allocation
page read and write
267A573C000
heap
page read and write
26796D40000
heap
page read and write
2679C090000
trusted library allocation
page read and write
267A3DCC000
trusted library allocation
page read and write
267998D5000
trusted library allocation
page read and write
2679AAFE000
trusted library allocation
page read and write
2679C528000
trusted library allocation
page read and write
21AD9E23000
trusted library allocation
page read and write
26799892000
trusted library allocation
page read and write
2679C0F6000
trusted library allocation
page read and write
267A3654000
trusted library allocation
page read and write
2679C59C000
trusted library allocation
page read and write
26795D12000
trusted library allocation
page read and write
2679A0A4000
trusted library allocation
page read and write
2679B1A4000
trusted library allocation
page read and write
2679BE2D000
trusted library allocation
page read and write
2679D080000
trusted library allocation
page read and write
2679AAF0000
trusted library allocation
page read and write
1EC87448000
trusted library allocation
page read and write
2679B168000
trusted library allocation
page read and write
26796D36000
heap
page read and write
267A38E6000
trusted library allocation
page read and write
F40000
unkown
page readonly
26796D33000
heap
page read and write
26796D56000
heap
page read and write
26796B9E000
trusted library allocation
page read and write
267955F1000
trusted library allocation
page read and write
26796D32000
heap
page read and write
2679DBEA000
trusted library allocation
page read and write
26797C9F000
trusted library allocation
page read and write
26796D73000
heap
page read and write
1EC874FE000
trusted library allocation
page read and write
267A60A1000
trusted library allocation
page read and write
267A2CD2000
trusted library allocation
page read and write
26797F4A000
trusted library allocation
page read and write
2679C664000
trusted library allocation
page read and write
21AD9C10000
heap
page read and write
26796D3A000
heap
page read and write
267A35C6000
trusted library allocation
page read and write
267972AC000
trusted library allocation
page read and write
26797FAE000
trusted library allocation
page read and write
26796D29000
heap
page read and write
26795388000
trusted library allocation
page read and write
2679C490000
trusted library allocation
page read and write
267A3148000
trusted library allocation
page read and write
2679BE2D000
trusted library allocation
page read and write
26796D3B000
heap
page read and write
26796D39000
heap
page read and write
267A3960000
trusted library allocation
page read and write
26796D33000
heap
page read and write
2679C4FC000
trusted library allocation
page read and write
3DE1000
heap
page read and write
26797263000
trusted library allocation
page read and write
267A56E1000
heap
page read and write
3DE1000
heap
page read and write
26796D2A000
heap
page read and write
267A605C000
trusted library allocation
page read and write
17F9EDAE000
heap
page read and write
26799C31000
heap
page read and write
26797FA7000
trusted library allocation
page read and write
26796D36000
heap
page read and write
3DE1000
heap
page read and write
1EC8745F000
trusted library allocation
page read and write
26799D53000
trusted library allocation
page read and write
267A3DE9000
trusted library allocation
page read and write
26799DE8000
trusted library allocation
page read and write
13EF000
stack
page read and write
26796D52000
heap
page read and write
26796D5A000
heap
page read and write
26796D40000
heap
page read and write
26796BDA000
trusted library allocation
page read and write
2679C5A9000
trusted library allocation
page read and write
2679C0BF000
trusted library allocation
page read and write
26797FB1000
trusted library allocation
page read and write
2679AAFA000
trusted library allocation
page read and write
267953DF000
trusted library allocation
page read and write
26796A5D000
trusted library allocation
page read and write
21AD9C90000
heap
page read and write
267A60A4000
trusted library allocation
page read and write
26795468000
trusted library allocation
page read and write
26796D5A000
heap
page read and write
1EC87A00000
heap
page read and write
2679BAAB000
trusted library allocation
page read and write
21AD9C80000
unclassified section
page read and write
26797F8E000
trusted library allocation
page read and write
26796D40000
heap
page read and write
2679C0B0000
trusted library allocation
page read and write
2679B171000
trusted library allocation
page read and write
2679988C000
trusted library allocation
page read and write
26795DB2000
trusted library allocation
page read and write
26795AF0000
trusted library allocation
page read and write
267A2C2F000
trusted library allocation
page read and write
26797F7B000
trusted library allocation
page read and write
1EC86FE0000
unclassified section
page readonly
1FE444B0000
heap
page read and write
267A38EB000
trusted library allocation
page read and write
267981C7000
trusted library allocation
page read and write
267A2C20000
trusted library allocation
page read and write
2679D0E2000
trusted library allocation
page read and write
2679A2C5000
trusted library allocation
page read and write
26797F60000
trusted library allocation
page read and write
26797FDE000
trusted library allocation
page read and write
26795AB6000
trusted library allocation
page read and write
2679A2E4000
trusted library allocation
page read and write
26796D84000
heap
page read and write
2679DBFE000
trusted library allocation
page read and write
2679A2C7000
trusted library allocation
page read and write
26799949000
trusted library allocation
page read and write
26796A99000
trusted library allocation
page read and write
26796D41000
heap
page read and write
26796D57000
heap
page read and write
267A39F1000
trusted library allocation
page read and write
6C712FE000
unkown
page readonly
26796A3B000
trusted library allocation
page read and write
26796D40000
heap
page read and write
26797C81000
trusted library allocation
page read and write
2F6FE7E000
unkown
page readonly
26796D29000
heap
page read and write
1DB6B110000
heap
page read and write
2679C445000
trusted library allocation
page read and write
26796D29000
heap
page read and write
2679C5B8000
trusted library allocation
page read and write
267A3DA1000
trusted library allocation
page read and write
26795DF9000
trusted library allocation
page read and write
2679C100000
trusted library allocation
page read and write
26798150000
trusted library allocation
page read and write
2679C0FA000
trusted library allocation
page read and write
26796D32000
heap
page read and write
267A387B000
trusted library allocation
page read and write
26796B89000
trusted library allocation
page read and write
267986BD000
trusted library allocation
page read and write
1EC8742F000
trusted library allocation
page read and write
2679B1B7000
trusted library allocation
page read and write
DB4000
heap
page read and write
2679C6BB000
trusted library allocation
page read and write
1DB6B200000
trusted library allocation
page read and write
26796D4A000
heap
page read and write
100C000
unkown
page write copy
2679C5AE000
trusted library allocation
page read and write
26799DB6000
trusted library allocation
page read and write
2679C561000
trusted library allocation
page read and write
26796D57000
heap
page read and write
2679B841000
trusted library allocation
page read and write
26796D84000
heap
page read and write
267A2C10000
trusted library allocation
page read and write
267A38E0000
trusted library allocation
page read and write
267A312D000
trusted library allocation
page read and write
1523000
heap
page read and write
26796D3B000
heap
page read and write
26795381000
trusted library allocation
page read and write
26796D36000
heap
page read and write
267A2CEB000
trusted library allocation
page read and write
2679BE92000
trusted library allocation
page read and write
1EC8817B000
heap
page read and write
2679BE07000
trusted library allocation
page read and write
2679BE32000
trusted library allocation
page read and write
1EC86FD0000
unclassified section
page readonly
267A3DE9000
trusted library allocation
page read and write
26796D40000
heap
page read and write
26797F81000
trusted library allocation
page read and write
26797FB1000
trusted library allocation
page read and write
267A36FC000
trusted library allocation
page read and write
3DE1000
heap
page read and write
26797388000
trusted library allocation
page read and write
26796D2B000
heap
page read and write
26796D24000
heap
page read and write
26797239000
trusted library allocation
page read and write
2679C3F4000
trusted library allocation
page read and write
26796D3D000
heap
page read and write
26799FE6000
trusted library allocation
page read and write
2679C59C000
trusted library allocation
page read and write
26796D32000
heap
page read and write
26795D1C000
trusted library allocation
page read and write
26796D35000
heap
page read and write
2679C580000
trusted library allocation
page read and write
267998D9000
trusted library allocation
page read and write
2679B16E000
trusted library allocation
page read and write
267972FE000
trusted library allocation
page read and write
267A572D000
heap
page read and write
267972E5000
trusted library allocation
page read and write
26797F7B000
trusted library allocation
page read and write
267A3128000
trusted library allocation
page read and write
26797F94000
trusted library allocation
page read and write
26796D36000
heap
page read and write
2679C5A4000
trusted library allocation
page read and write
26799FF4000
trusted library allocation
page read and write
2679BDC9000
trusted library allocation
page read and write
2679985E000
trusted library allocation
page read and write
2679BE88000
trusted library allocation
page read and write
267A39FE000
trusted library allocation
page read and write
26797390000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
2679C3E5000
trusted library allocation
page read and write
267A3D58000
trusted library allocation
page read and write
267A3AFD000
trusted library allocation
page read and write
26797FB1000
trusted library allocation
page read and write
26799FE0000
trusted library allocation
page read and write
267A3A97000
trusted library allocation
page read and write
26799949000
trusted library allocation
page read and write
267A38BB000
trusted library allocation
page read and write
2679DC3F000
trusted library allocation
page read and write
2679C490000
trusted library allocation
page read and write
2679BEB2000
trusted library allocation
page read and write
26799C53000
heap
page read and write
267973FB000
trusted library allocation
page read and write
26796D36000
heap
page read and write
26796D40000
heap
page read and write
26796D52000
heap
page read and write
267A2C79000
trusted library allocation
page read and write
26799DC5000
trusted library allocation
page read and write
267A3AFD000
trusted library allocation
page read and write
2679BEBF000
trusted library allocation
page read and write
26796D36000
heap
page read and write
2679A6A2000
trusted library allocation
page read and write
17F9D470000
heap
page read and write
1EC881B6000
heap
page read and write
26799C53000
heap
page read and write
26796D3B000
heap
page read and write
2679C47E000
trusted library allocation
page read and write
2679C5DC000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
267954A3000
trusted library allocation
page read and write
267A2C5A000
trusted library allocation
page read and write
26796D48000
heap
page read and write
2679988C000
trusted library allocation
page read and write
267A522F000
trusted library allocation
page read and write
26796D29000
heap
page read and write
26796D2C000
heap
page read and write
26796D40000
heap
page read and write
26796D39000
heap
page read and write
2679BCF7000
trusted library allocation
page read and write
26796D2B000
heap
page read and write
2679BFF1000
trusted library allocation
page read and write
2679B8CC000
trusted library allocation
page read and write
26796D52000
heap
page read and write
26796D84000
heap
page read and write
2679B8CC000
trusted library allocation
page read and write
26797F5F000
trusted library allocation
page read and write
26796CEB000
trusted library allocation
page read and write
2679C35D000
trusted library allocation
page read and write
2679C5BA000
trusted library allocation
page read and write
267A2CF1000
trusted library allocation
page read and write
2679BEAF000
trusted library allocation
page read and write
2679BC7D000
trusted library allocation
page read and write
267A3A8D000
trusted library allocation
page read and write
26799FF4000
trusted library allocation
page read and write
267A3989000
trusted library allocation
page read and write
2679D063000
trusted library allocation
page read and write
26795DBD000
trusted library allocation
page read and write
26795463000
trusted library allocation
page read and write
1EC87D7F000
heap
page read and write
26796D3D000
heap
page read and write
26796D32000
heap
page read and write
2679A2E4000
trusted library allocation
page read and write
26799DD8000
trusted library allocation
page read and write
26796D5A000
heap
page read and write
26796D51000
heap
page read and write
21ADA102000
heap
page read and write
21AD9E64000
trusted library allocation
page read and write
2679B1AA000
trusted library allocation
page read and write
26796D56000
heap
page read and write
2679D0E0000
trusted library allocation
page read and write
26796D29000
heap
page read and write
21AD9E73000
trusted library allocation
page read and write
21AD9BF0000
heap
page read and write
26796CF3000
trusted library allocation
page read and write
26799C53000
heap
page read and write
2679BEC8000
trusted library allocation
page read and write
2679C6A9000
trusted library allocation
page read and write
267973F1000
trusted library allocation
page read and write
26796A36000
trusted library allocation
page read and write
267981DC000
trusted library allocation
page read and write
26796D36000
heap
page read and write
26796B67000
trusted library allocation
page read and write
26796D41000
heap
page read and write
26796D76000
heap
page read and write
26799FE0000
trusted library allocation
page read and write
267A56E1000
heap
page read and write
267A39C8000
trusted library allocation
page read and write
2679C4B8000
trusted library allocation
page read and write
26799C05000
heap
page read and write
26797C83000
trusted library allocation
page read and write
475E000
stack
page read and write
267A36EA000
trusted library allocation
page read and write
26797FA8000
trusted library allocation
page read and write
2679C088000
trusted library allocation
page read and write
26796B80000
trusted library allocation
page read and write
267A5779000
heap
page read and write
2679C68A000
trusted library allocation
page read and write
3A90000
heap
page read and write
26799DD8000
trusted library allocation
page read and write
3DE1000
heap
page read and write
2679C3EE000
trusted library allocation
page read and write
2679B863000
trusted library allocation
page read and write
2679BDBE000
trusted library allocation
page read and write
26796D39000
heap
page read and write
26796D3B000
heap
page read and write
267A2C79000
trusted library allocation
page read and write
26799D8C000
trusted library allocation
page read and write
26799D53000
trusted library allocation
page read and write
26795390000
trusted library allocation
page read and write
267953BF000
trusted library allocation
page read and write
2679B150000
trusted library allocation
page read and write
267953EF000
trusted library allocation
page read and write
26797FAE000
trusted library allocation
page read and write
2679BEBB000
trusted library allocation
page read and write
26799C1F000
heap
page read and write
26796D48000
heap
page read and write
2679BDA6000
trusted library allocation
page read and write
267A3863000
trusted library allocation
page read and write
267A524E000
trusted library allocation
page read and write
21AD9C40000
heap
page read and write
26799C1F000
heap
page read and write
2679D037000
trusted library allocation
page read and write
2679A697000
trusted library allocation
page read and write
2679BE32000
trusted library allocation
page read and write
2679BF83000
trusted library allocation
page read and write
2679BCF7000
trusted library allocation
page read and write
2679C361000
trusted library allocation
page read and write
2679ADDE000
trusted library allocation
page read and write
267A39A7000
trusted library allocation
page read and write
267A367E000
trusted library allocation
page read and write
26799C1F000
heap
page read and write
267A40BB000
trusted library allocation
page read and write
1EC87DE9000
heap
page read and write
267A2C77000
trusted library allocation
page read and write
26799C25000
heap
page read and write
26796D39000
heap
page read and write
26796D5A000
heap
page read and write
2679BE79000
trusted library allocation
page read and write
267A3844000
trusted library allocation
page read and write
2679987A000
trusted library allocation
page read and write
26799D39000
trusted library allocation
page read and write
26799D31000
trusted library allocation
page read and write
26795DF9000
trusted library allocation
page read and write
26796D84000
heap
page read and write
26796D29000
heap
page read and write
26799FC3000
trusted library allocation
page read and write
26796A99000
trusted library allocation
page read and write
26799E90000
trusted library allocation
page read and write
26795AB2000
trusted library allocation
page read and write
267A3D57000
trusted library allocation
page read and write
1EC87469000
trusted library allocation
page read and write
2679D058000
trusted library allocation
page read and write
2679B1C4000
trusted library allocation
page read and write
267A39F8000
trusted library allocation
page read and write
26796D4A000
heap
page read and write
26796D3D000
heap
page read and write
26796D32000
heap
page read and write
2679BDFE000
trusted library allocation
page read and write
1DB6B1A2000
unclassified section
page read and write
26797FAE000
trusted library allocation
page read and write
26797809000
trusted library allocation
page read and write
2679B153000
trusted library allocation
page read and write
2679C44B000
trusted library allocation
page read and write
2679C547000
trusted library allocation
page read and write
267998B8000
trusted library allocation
page read and write
2679C4BB000
trusted library allocation
page read and write
267A40AB000
trusted library allocation
page read and write
267A3AF2000
trusted library allocation
page read and write
26796D32000
heap
page read and write
1DB6B600000
trusted library allocation
page read and write
26799FAB000
trusted library allocation
page read and write
2679C055000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
1EC87DE8000
heap
page read and write
267A3148000
trusted library allocation
page read and write
267A35D6000
trusted library allocation
page read and write
26796D36000
heap
page read and write
26796D73000
heap
page read and write
267998D8000
trusted library allocation
page read and write
26796D4A000
heap
page read and write
2679DBEC000
trusted library allocation
page read and write
26797CC8000
trusted library allocation
page read and write
26799C0D000
heap
page read and write
2679B198000
trusted library allocation
page read and write
26796D84000
heap
page read and write
26797FA4000
trusted library allocation
page read and write
2679C5B7000
trusted library allocation
page read and write
26797FBD000
trusted library allocation
page read and write
267973D2000
trusted library allocation
page read and write
2679C3E5000
trusted library allocation
page read and write
2679C657000
trusted library allocation
page read and write
2679C47A000
trusted library allocation
page read and write
26799C53000
heap
page read and write
26796BFC000
trusted library allocation
page read and write
26799E76000
trusted library allocation
page read and write
267A3D50000
trusted library allocation
page read and write
26799C09000
heap
page read and write
1EC87D5F000
heap
page read and write
26796D57000
heap
page read and write
26799FFD000
trusted library allocation
page read and write
1DB6B000000
unclassified section
page readonly
267A605A000
trusted library allocation
page read and write
26796C52000
trusted library allocation
page read and write
267A39D8000
trusted library allocation
page read and write
26796D4C000
heap
page read and write
F41000
unkown
page execute read
26795486000
trusted library allocation
page read and write
2679B889000
trusted library allocation
page read and write
267953A1000
trusted library allocation
page read and write
2679AE02000
trusted library allocation
page read and write
26796D56000
heap
page read and write
267981D6000
trusted library allocation
page read and write
26796D42000
heap
page read and write
26795443000
trusted library allocation
page read and write
267A35AE000
trusted library allocation
page read and write
2679DBE6000
trusted library allocation
page read and write
2679BCAB000
trusted library allocation
page read and write
267A3D57000
trusted library allocation
page read and write
267A39C8000
trusted library allocation
page read and write
2679BFC7000
trusted library allocation
page read and write
2679C0CA000
trusted library allocation
page read and write
26796BC6000
trusted library allocation
page read and write
267981E5000
trusted library allocation
page read and write
2679A2C7000
trusted library allocation
page read and write
2679C44B000
trusted library allocation
page read and write
2679A2D9000
trusted library allocation
page read and write
26796D40000
heap
page read and write
26799E9C000
trusted library allocation
page read and write
26796D3A000
heap
page read and write
26796D39000
heap
page read and write
2679D032000
trusted library allocation
page read and write
26796CA6000
trusted library allocation
page read and write
267A35D6000
trusted library allocation
page read and write
26796D56000
heap
page read and write
26796BE7000
trusted library allocation
page read and write
1EC8748D000
trusted library allocation
page read and write
2679C58B000
trusted library allocation
page read and write
2679C5AC000
trusted library allocation
page read and write
3DE1000
heap
page read and write
26796D36000
heap
page read and write
2679760A000
trusted library allocation
page read and write
26799FE0000
trusted library allocation
page read and write
26796C9D000
trusted library allocation
page read and write
2679DBE2000
trusted library allocation
page read and write
267A388B000
trusted library allocation
page read and write
2679A04B000
trusted library allocation
page read and write
2679BF9F000
trusted library allocation
page read and write
26796D73000
heap
page read and write
26796D41000
heap
page read and write
26796D3A000
heap
page read and write
267A39DA000
trusted library allocation
page read and write
2679B8C4000
trusted library allocation
page read and write
267A2CF1000
trusted library allocation
page read and write
1EC88183000
heap
page read and write
2679987A000
trusted library allocation
page read and write
267973FB000
trusted library allocation
page read and write
1EC87DE0000
heap
page read and write
26799FEE000
trusted library allocation
page read and write
2679539E000
trusted library allocation
page read and write
267A3621000
trusted library allocation
page read and write
2679BE3C000
trusted library allocation
page read and write
2679C666000
trusted library allocation
page read and write
189F59703000
trusted library allocation
page read and write
3DE1000
heap
page read and write
267A3150000
trusted library allocation
page read and write
267A2C6B000
trusted library allocation
page read and write
1010000
unkown
page write copy
26799F1F000
trusted library allocation
page read and write
2679D080000
trusted library allocation
page read and write
267A3DE6000
trusted library allocation
page read and write
2679C6A4000
trusted library allocation
page read and write
267975F8000
trusted library allocation
page read and write
17F9D1BA000
heap
page read and write
26796D29000
heap
page read and write
2679BDC9000
trusted library allocation
page read and write
267A3838000
trusted library allocation
page read and write
267A40B9000
trusted library allocation
page read and write
26797278000
trusted library allocation
page read and write
2679DBEA000
trusted library allocation
page read and write
267A318B000
trusted library allocation
page read and write
26799D53000
trusted library allocation
page read and write
26797FB6000
trusted library allocation
page read and write
26796D52000
heap
page read and write
2679A6FE000
trusted library allocation
page read and write
26799885000
trusted library allocation
page read and write
267A3D9E000
trusted library allocation
page read and write
26796D32000
heap
page read and write
267A363B000
trusted library allocation
page read and write
2679C0ED000
trusted library allocation
page read and write
26796D56000
heap
page read and write
26797358000
trusted library allocation
page read and write
26795DE9000
trusted library allocation
page read and write
2679986C000
trusted library allocation
page read and write
267A2C6B000
trusted library allocation
page read and write
26797F93000
trusted library allocation
page read and write
267A2C20000
trusted library allocation
page read and write
26796B97000
trusted library allocation
page read and write
267A40A6000
trusted library allocation
page read and write
26796D33000
heap
page read and write
267998BA000
trusted library allocation
page read and write
2679C6A9000
trusted library allocation
page read and write
2679BCCD000
trusted library allocation
page read and write
267A3A85000
trusted library allocation
page read and write
26796D52000
heap
page read and write
267981C0000
trusted library allocation
page read and write
26797FAC000
trusted library allocation
page read and write
267A3145000
trusted library allocation
page read and write
267A3169000
trusted library allocation
page read and write
2679ADB1000
trusted library allocation
page read and write
2679BDA8000
trusted library allocation
page read and write
2679C5D0000
trusted library allocation
page read and write
2679C496000
trusted library allocation
page read and write
2679BEBF000
trusted library allocation
page read and write
2679B198000
trusted library allocation
page read and write
267973F8000
trusted library allocation
page read and write
267953BF000
trusted library allocation
page read and write
267972FE000
trusted library allocation
page read and write
267A5EE3000
trusted library allocation
page read and write
2679537F000
trusted library allocation
page read and write
2679C67D000
trusted library allocation
page read and write
26796BE7000
trusted library allocation
page read and write
2679AB24000
trusted library allocation
page read and write
2679C5E7000
trusted library allocation
page read and write
26796D39000
heap
page read and write
26799E9C000
trusted library allocation
page read and write
1EC87D5C000
heap
page read and write
2679BE79000
trusted library allocation
page read and write
2679C3E5000
trusted library allocation
page read and write
2679C415000
trusted library allocation
page read and write
1EC87D4D000
heap
page read and write
2679A90A000
trusted library allocation
page read and write
26798133000
trusted library allocation
page read and write
2679BD5D000
trusted library allocation
page read and write
267999C3000
trusted library allocation
page read and write
26796D40000
heap
page read and write
21AD9E6E000
trusted library allocation
page read and write
267A39E4000
trusted library allocation
page read and write
26799D7B000
trusted library allocation
page read and write
26795A66000
trusted library allocation
page read and write
26795DAA000
trusted library allocation
page read and write
2679C361000
trusted library allocation
page read and write
26796D3A000
heap
page read and write
26796D3B000
heap
page read and write
17F9D50A000
trusted library allocation
page read and write
267A60A1000
trusted library allocation
page read and write
267A2C04000
trusted library allocation
page read and write
267A2C7D000
trusted library allocation
page read and write
2679C55F000
trusted library allocation
page read and write
21ADA03D000
trusted library allocation
page read and write
267A35C6000
trusted library allocation
page read and write
26797262000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
1EC87DE8000
heap
page read and write
26796B9B000
trusted library allocation
page read and write
26796BDA000
trusted library allocation
page read and write
1DB6B363000
trusted library allocation
page read and write
26796D56000
heap
page read and write
1DB6B365000
trusted library allocation
page read and write
267A39CB000
trusted library allocation
page read and write
2679B1E4000
trusted library allocation
page read and write
2679ADC5000
trusted library allocation
page read and write
26795AFE000
trusted library allocation
page read and write
1EC87DEB000
heap
page read and write
26799DEA000
trusted library allocation
page read and write
17F9D1AF000
heap
page read and write
2679BD76000
trusted library allocation
page read and write
267A3943000
trusted library allocation
page read and write
26796D39000
heap
page read and write
2679ADEE000
trusted library allocation
page read and write
2679A727000
trusted library allocation
page read and write
26795DD4000
trusted library allocation
page read and write
2679C5A4000
trusted library allocation
page read and write
267A3DF4000
trusted library allocation
page read and write
2679C59F000
trusted library allocation
page read and write
26796D29000
heap
page read and write
26796D52000
heap
page read and write
26796D84000
heap
page read and write
26799D79000
trusted library allocation
page read and write
2679C4F7000
trusted library allocation
page read and write
2679C5AC000
trusted library allocation
page read and write
2679BCDC000
trusted library allocation
page read and write
26797F8A000
trusted library allocation
page read and write
26799C53000
heap
page read and write
26796D32000
heap
page read and write
26797F52000
trusted library allocation
page read and write
2679BE32000
trusted library allocation
page read and write
2679B1E2000
trusted library allocation
page read and write
3DE1000
heap
page read and write
2679C44B000
trusted library allocation
page read and write
DB4000
heap
page read and write
267A3AB4000
trusted library allocation
page read and write
1EC87D69000
heap
page read and write
267A3853000
trusted library allocation
page read and write
267A2C4F000
trusted library allocation
page read and write
26797F7B000
trusted library allocation
page read and write
2679B841000
trusted library allocation
page read and write
1DB6B1A0000
unclassified section
page read and write
267973F0000
trusted library allocation
page read and write
1EC88183000
heap
page read and write
2679C496000
trusted library allocation
page read and write
26796D84000
heap
page read and write
2679C4E3000
trusted library allocation
page read and write
3DE1000
heap
page read and write
267A3169000
trusted library allocation
page read and write
26796A36000
trusted library allocation
page read and write
26796D3E000
heap
page read and write
2679AAF0000
trusted library allocation
page read and write
267A3D3E000
trusted library allocation
page read and write
2679A0E4000
trusted library allocation
page read and write
26796D49000
heap
page read and write
21AD9AE0000
unclassified section
page readonly
2679BBC3000
trusted library allocation
page read and write
26796D80000
heap
page read and write
267A38E2000
trusted library allocation
page read and write
2679C55F000
trusted library allocation
page read and write
26796D52000
heap
page read and write
2679A2E4000
trusted library allocation
page read and write
26796D2B000
heap
page read and write
26796D2C000
heap
page read and write
26796B89000
trusted library allocation
page read and write
267A316B000
trusted library allocation
page read and write
26797FAE000
trusted library allocation
page read and write
267A36F2000
trusted library allocation
page read and write
2679B868000
trusted library allocation
page read and write
26796D2E000
heap
page read and write
26796D3E000
heap
page read and write
2679C58F000
trusted library allocation
page read and write
2679A0FD000
trusted library allocation
page read and write
26799C16000
heap
page read and write
26798149000
trusted library allocation
page read and write
2679C58F000
trusted library allocation
page read and write
267A60A4000
trusted library allocation
page read and write
26796D29000
heap
page read and write
1EC881B8000
heap
page read and write
2679ADFA000
trusted library allocation
page read and write
21ADA100000
heap
page read and write
2679BD65000
trusted library allocation
page read and write
267955CC000
trusted library allocation
page read and write
2679BE8D000
trusted library allocation
page read and write
2679BEBB000
trusted library allocation
page read and write
26796D40000
heap
page read and write
2679C5D6000
trusted library allocation
page read and write
267A60A1000
trusted library allocation
page read and write
2679BCF7000
trusted library allocation
page read and write
2679C0BC000
trusted library allocation
page read and write
2679C6F9000
trusted library allocation
page read and write
267A40C5000
trusted library allocation
page read and write
26797F8A000
trusted library allocation
page read and write
2679DB75000
trusted library allocation
page read and write
267A398E000
trusted library allocation
page read and write
267A3AF9000
trusted library allocation
page read and write
26796D32000
heap
page read and write
267A3AB7000
trusted library allocation
page read and write
26795D14000
trusted library allocation
page read and write
267A315F000
trusted library allocation
page read and write
2679BA92000
trusted library allocation
page read and write
21ADA00C000
trusted library allocation
page read and write
2679C0D3000
trusted library allocation
page read and write
26796D36000
heap
page read and write
26796D56000
heap
page read and write
26799E82000
trusted library allocation
page read and write
1EC87B90000
heap
page read and write
2F6DE3E000
stack
page read and write
2679AB00000
trusted library allocation
page read and write
26796D73000
heap
page read and write
26797FBD000
trusted library allocation
page read and write
26795DC3000
trusted library allocation
page read and write
267972AD000
trusted library allocation
page read and write
267A39B7000
trusted library allocation
page read and write
2679C520000
trusted library allocation
page read and write
26796D51000
heap
page read and write
2679DC6B000
trusted library allocation
page read and write
1EC8746F000
trusted library allocation
page read and write
26796D7C000
heap
page read and write
1CEE000
stack
page read and write
2679C5D2000
trusted library allocation
page read and write
26798157000
trusted library allocation
page read and write
C79000
stack
page read and write
1DB6B370000
trusted library allocation
page read and write
2679C0F8000
trusted library allocation
page read and write
2679AE0A000
trusted library allocation
page read and write
2679DBE2000
trusted library allocation
page read and write
26796B87000
trusted library allocation
page read and write
26797FD8000
trusted library allocation
page read and write
26796C52000
trusted library allocation
page read and write
2679C4E3000
trusted library allocation
page read and write
1EC873B0000
heap
page read and write
26796D5A000
heap
page read and write
26796D56000
heap
page read and write
26795976000
trusted library allocation
page read and write
26796D80000
heap
page read and write
2679A2D7000
trusted library allocation
page read and write
267A5725000
heap
page read and write
2679BDF6000
trusted library allocation
page read and write
3DE1000
heap
page read and write
26796D55000
heap
page read and write
2679C4C4000
trusted library allocation
page read and write
2679C647000
trusted library allocation
page read and write
267A60B9000
trusted library allocation
page read and write
267998FB000
trusted library allocation
page read and write
1EC87C00000
trusted library allocation
page read and write
26796D52000
heap
page read and write
26797F7D000
trusted library allocation
page read and write
2679C6F6000
trusted library allocation
page read and write
2679D090000
trusted library allocation
page read and write
2679BE0D000
trusted library allocation
page read and write
267A35B6000
trusted library allocation
page read and write
267A3D33000
trusted library allocation
page read and write
267981D2000
trusted library allocation
page read and write
6B79B4F000
trusted library allocation
page read and write
26796D4A000
heap
page read and write
26799FE0000
trusted library allocation
page read and write
2679C4B8000
trusted library allocation
page read and write
1EC874BD000
trusted library allocation
page read and write
479E000
stack
page read and write
26796A1E000
trusted library allocation
page read and write
26797FC8000
trusted library allocation
page read and write
26796D56000
heap
page read and write
1EC881B6000
heap
page read and write
2679984D000
trusted library allocation
page read and write
1EC87DF1000
heap
page read and write
26799D6A000
trusted library allocation
page read and write
2679C68E000
trusted library allocation
page read and write
26796D41000
heap
page read and write
26796D7A000
heap
page read and write
267A3D3C000
trusted library allocation
page read and write
26795DF4000
trusted library allocation
page read and write
1EC88169000
heap
page read and write
267A3AFB000
trusted library allocation
page read and write
267A36AD000
trusted library allocation
page read and write
2679729E000
trusted library allocation
page read and write
26796D52000
heap
page read and write
267A38E2000
trusted library allocation
page read and write
2679C5C8000
trusted library allocation
page read and write
2679B85A000
trusted library allocation
page read and write
2679B1DF000
trusted library allocation
page read and write
26796D36000
heap
page read and write
26796B97000
trusted library allocation
page read and write
26797C98000
trusted library allocation
page read and write
26799E9C000
trusted library allocation
page read and write
6C6EFFE000
unkown
page readonly
26799E90000
trusted library allocation
page read and write
267A5798000
heap
page read and write
26795A80000
trusted library allocation
page read and write
1DB6B1C0000
heap
page read and write
2679BBA6000
trusted library allocation
page read and write
1EC881A9000
heap
page read and write
267A2C7D000
trusted library allocation
page read and write
2679817D000
trusted library allocation
page read and write
267A409F000
trusted library allocation
page read and write
26799FF0000
trusted library allocation
page read and write
26796D36000
heap
page read and write
26799C05000
heap
page read and write
2679C35F000
trusted library allocation
page read and write
2679D096000
trusted library allocation
page read and write
2679D0E0000
trusted library allocation
page read and write
26797C98000
trusted library allocation
page read and write
FDC000
unkown
page readonly
26796D80000
heap
page read and write
2679C4BF000
trusted library allocation
page read and write
2679BE0D000
trusted library allocation
page read and write
267959FE000
trusted library allocation
page read and write
26796D29000
heap
page read and write
1EC88197000
heap
page read and write
267A3D99000
trusted library allocation
page read and write
26796D41000
heap
page read and write
26796D76000
heap
page read and write
26796D41000
heap
page read and write
267A38F2000
trusted library allocation
page read and write
267A2C79000
trusted library allocation
page read and write
1EC87D60000
heap
page read and write
26796D2C000
heap
page read and write
26796D3A000
heap
page read and write
267A39D8000
trusted library allocation
page read and write
26796D52000
heap
page read and write
2679C325000
trusted library allocation
page read and write
26799FE6000
trusted library allocation
page read and write
267955C6000
trusted library allocation
page read and write
26796D40000
heap
page read and write
26796D2C000
heap
page read and write
26795DC3000
trusted library allocation
page read and write
2679A062000
trusted library allocation
page read and write
2679B1AA000
trusted library allocation
page read and write
2679B153000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
2679A6CB000
trusted library allocation
page read and write
26796D5A000
heap
page read and write
2679BE07000
trusted library allocation
page read and write
2679C48C000
trusted library allocation
page read and write
21ADA03B000
trusted library allocation
page read and write
26796CC1000
trusted library allocation
page read and write
1EC881B9000
heap
page read and write
26799DFA000
trusted library allocation
page read and write
26796C54000
trusted library allocation
page read and write
3DE1000
heap
page read and write
2679C4B8000
trusted library allocation
page read and write
267959FB000
trusted library allocation
page read and write
26797F4D000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
1EC87DF1000
heap
page read and write
2679A2CE000
trusted library allocation
page read and write
2679BE8D000
trusted library allocation
page read and write
26795AFE000
trusted library allocation
page read and write
2679C6C5000
trusted library allocation
page read and write
26797FAC000
trusted library allocation
page read and write
2679C6C3000
trusted library allocation
page read and write
1EC87D8A000
heap
page read and write
2679DBAD000
trusted library allocation
page read and write
2679C4AC000
trusted library allocation
page read and write
26799DE8000
trusted library allocation
page read and write
26796B67000
trusted library allocation
page read and write
26799FE0000
trusted library allocation
page read and write
2679B1EB000
trusted library allocation
page read and write
267A60B9000
trusted library allocation
page read and write
2679AD61000
trusted library allocation
page read and write
26796B2B000
trusted library allocation
page read and write
2679C47A000
trusted library allocation
page read and write
2679AAF6000
trusted library allocation
page read and write
2679C4BF000
trusted library allocation
page read and write
2679BD6F000
trusted library allocation
page read and write
2679C6CB000
trusted library allocation
page read and write
DB4000
heap
page read and write
267954CD000
trusted library allocation
page read and write
267A2CDF000
trusted library allocation
page read and write
26796D36000
heap
page read and write
2679C547000
trusted library allocation
page read and write
26796D32000
heap
page read and write
17F9D507000
trusted library allocation
page read and write
26799934000
trusted library allocation
page read and write
267A60A4000
trusted library allocation
page read and write
26796D73000
heap
page read and write
2679DC3F000
trusted library allocation
page read and write
2679C69E000
trusted library allocation
page read and write
2679BA92000
trusted library allocation
page read and write
26796D56000
heap
page read and write
2679BF41000
trusted library allocation
page read and write
2679C57B000
trusted library allocation
page read and write
26796D39000
heap
page read and write
2679C47A000
trusted library allocation
page read and write
1DB6B313000
trusted library allocation
page read and write
267A605A000
trusted library allocation
page read and write
17F9D180000
heap
page read and write
1EC881A9000
heap
page read and write
267A3165000
trusted library allocation
page read and write
26799FF4000
trusted library allocation
page read and write
267969AE000
trusted library allocation
page read and write
2679C47E000
trusted library allocation
page read and write
26796D29000
heap
page read and write
1EC87DAA000
heap
page read and write
267A5236000
trusted library allocation
page read and write
6C7123D000
stack
page read and write
2679BFF1000
trusted library allocation
page read and write
2679DBE0000
trusted library allocation
page read and write
26799C53000
heap
page read and write
2679C54E000
trusted library allocation
page read and write
21AD9C70000
heap
page readonly
267981C0000
trusted library allocation
page read and write
2679BD6B000
trusted library allocation
page read and write
2679AAFA000
trusted library allocation
page read and write
267A3959000
trusted library allocation
page read and write
2679DC68000
trusted library allocation
page read and write
26796D52000
heap
page read and write
26795DFC000
trusted library allocation
page read and write
26796D40000
heap
page read and write
26796D33000
heap
page read and write
267A3ACA000
trusted library allocation
page read and write
267A56E1000
heap
page read and write
2679B864000
trusted library allocation
page read and write
2679BD6F000
trusted library allocation
page read and write
2A18FFE000
stack
page read and write
1EC87D5F000
heap
page read and write
26799DC7000
trusted library allocation
page read and write
26797F60000
trusted library allocation
page read and write
2679984A000
trusted library allocation
page read and write
267A3D9B000
trusted library allocation
page read and write
26796B89000
trusted library allocation
page read and write
2679D087000
trusted library allocation
page read and write
267A3171000
trusted library allocation
page read and write
26796D29000
heap
page read and write
26796CC1000
trusted library allocation
page read and write
21AD9E7B000
trusted library allocation
page read and write
267981AD000
trusted library allocation
page read and write
2679C48C000
trusted library allocation
page read and write
26796D52000
heap
page read and write
26796D46000
heap
page read and write
2679C6E2000
trusted library allocation
page read and write
267981DC000
trusted library allocation
page read and write
267A39EF000
trusted library allocation
page read and write
26796D36000
heap
page read and write
267A3D9B000
trusted library allocation
page read and write
267A36E4000
trusted library allocation
page read and write
26799C05000
heap
page read and write
26796A52000
trusted library allocation
page read and write
2679DB92000
trusted library allocation
page read and write
26796D29000
heap
page read and write
2A187FF000
stack
page read and write
26799FAB000
trusted library allocation
page read and write
1EC8816D000
heap
page read and write
26796D4C000
heap
page read and write
26796D52000
heap
page read and write
1EC87D60000
heap
page read and write
26797F8A000
trusted library allocation
page read and write
267A3D47000
trusted library allocation
page read and write
1525000
heap
page read and write
2679DBA0000
trusted library allocation
page read and write
267A316B000
trusted library allocation
page read and write
26796D4E000
heap
page read and write
267A3DFB000
trusted library allocation
page read and write
267972FA000
trusted library allocation
page read and write
267969E6000
trusted library allocation
page read and write
26796D29000
heap
page read and write
1EC87DE1000
heap
page read and write
267A2C09000
trusted library allocation
page read and write
2679B1E4000
trusted library allocation
page read and write
2679A2D9000
trusted library allocation
page read and write
267A3AF3000
trusted library allocation
page read and write
267973FB000
trusted library allocation
page read and write
26796D48000
heap
page read and write
2679867B000
trusted library allocation
page read and write
26796A79000
trusted library allocation
page read and write
2679C4FC000
trusted library allocation
page read and write
1EC87D69000
heap
page read and write
1530000
heap
page read and write
2679BFFA000
trusted library allocation
page read and write
26796D48000
heap
page read and write
2F6CC7E000
unkown
page readonly
26795DF9000
trusted library allocation
page read and write
548C000
stack
page read and write
1DB6B35F000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
26796D2C000
heap
page read and write
2679C4BB000
trusted library allocation
page read and write
2679A2B4000
trusted library allocation
page read and write
26799E82000
trusted library allocation
page read and write
26797C98000
trusted library allocation
page read and write
100C000
unkown
page read and write
26796D52000
heap
page read and write
26798690000
trusted library allocation
page read and write
2679A2C7000
trusted library allocation
page read and write
26795DF9000
trusted library allocation
page read and write
26797F48000
trusted library allocation
page read and write
DB4000
heap
page read and write
2679C68E000
trusted library allocation
page read and write
2679BE24000
trusted library allocation
page read and write
267A2C44000
trusted library allocation
page read and write
2679C47A000
trusted library allocation
page read and write
26797C40000
trusted library allocation
page read and write
26795DE6000
trusted library allocation
page read and write
26796D36000
heap
page read and write
2679A6A2000
trusted library allocation
page read and write
26796D52000
heap
page read and write
6C711FE000
unkown
page readonly
3DE1000
heap
page read and write
2679C6B9000
trusted library allocation
page read and write
267972A4000
trusted library allocation
page read and write
267A40C1000
trusted library allocation
page read and write
99C7BE000
stack
page read and write
2679DCCF000
trusted library allocation
page read and write
1EC87D8D000
heap
page read and write
26799C53000
heap
page read and write
2679C445000
trusted library allocation
page read and write
26799880000
trusted library allocation
page read and write
2679AAFE000
trusted library allocation
page read and write
26799C1F000
heap
page read and write
26797231000
trusted library allocation
page read and write
267A3DBF000
trusted library allocation
page read and write
26799C1F000
heap
page read and write
26796B24000
trusted library allocation
page read and write
267A2C66000
trusted library allocation
page read and write
26796D73000
heap
page read and write
267986EB000
trusted library allocation
page read and write
2679BDF7000
trusted library allocation
page read and write
2679B184000
trusted library allocation
page read and write
1EC88197000
heap
page read and write
26799C16000
heap
page read and write
2679DBDE000
trusted library allocation
page read and write
26796D40000
heap
page read and write
26796D36000
heap
page read and write
1523000
heap
page read and write
2679C6EF000
trusted library allocation
page read and write
26795AB9000
trusted library allocation
page read and write
267A60B9000
trusted library allocation
page read and write
267A3DF1000
trusted library allocation
page read and write
20EF000
stack
page read and write
26796D56000
heap
page read and write
2679C693000
trusted library allocation
page read and write
26796D54000
heap
page read and write
26796D2B000
heap
page read and write
26796D42000
heap
page read and write
26797708000
trusted library allocation
page read and write
2679B1D3000
trusted library allocation
page read and write
F40000
unkown
page readonly
2679C552000
trusted library allocation
page read and write
267A3D55000
trusted library allocation
page read and write
26796D73000
heap
page read and write
267A2C6E000
trusted library allocation
page read and write
21AD9E00000
trusted library allocation
page read and write
26795DBD000
trusted library allocation
page read and write
26796CBE000
trusted library allocation
page read and write
26796D41000
heap
page read and write
1014000
unkown
page readonly
2679C5D6000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
2679B8CC000
trusted library allocation
page read and write
26796D39000
heap
page read and write
267A5EE4000
trusted library allocation
page read and write
26796D41000
heap
page read and write
267A2C17000
trusted library allocation
page read and write
2679C6F1000
trusted library allocation
page read and write
17F9D1B1000
heap
page read and write
2679988C000
trusted library allocation
page read and write
26797311000
trusted library allocation
page read and write
26796D32000
heap
page read and write
1EC87070000
heap
page read and write
2679B885000
trusted library allocation
page read and write
2679A05E000
trusted library allocation
page read and write
267A2C5D000
trusted library allocation
page read and write
267A57C3000
heap
page read and write
267A2C6B000
trusted library allocation
page read and write
267A39C3000
trusted library allocation
page read and write
26797230000
trusted library allocation
page read and write
2679C58C000
trusted library allocation
page read and write
26796D84000
heap
page read and write
1EC87DE0000
heap
page read and write
26797C75000
trusted library allocation
page read and write
26797C9F000
trusted library allocation
page read and write
2679BC71000
trusted library allocation
page read and write
2679C0F1000
trusted library allocation
page read and write
26797336000
trusted library allocation
page read and write
2679A062000
trusted library allocation
page read and write
267A2CA0000
trusted library allocation
page read and write
2679C697000
trusted library allocation
page read and write
267A2C17000
trusted library allocation
page read and write
26795DC6000
trusted library allocation
page read and write
2679C581000
trusted library allocation
page read and write
26795DE6000
trusted library allocation
page read and write
2679C47E000
trusted library allocation
page read and write
141F000
stack
page read and write
26797C98000
trusted library allocation
page read and write
21ADA013000
trusted library allocation
page read and write
26796D32000
heap
page read and write
2679BF9F000
trusted library allocation
page read and write
26796D84000
heap
page read and write
2679C08C000
trusted library allocation
page read and write
267A60A4000
trusted library allocation
page read and write
2679BCDC000
trusted library allocation
page read and write
26796D51000
heap
page read and write
26797C7D000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
1DB6B605000
trusted library allocation
page read and write
26799D39000
trusted library allocation
page read and write
2679C5D2000
trusted library allocation
page read and write
26796D84000
heap
page read and write
26797262000
trusted library allocation
page read and write
2679DB9F000
trusted library allocation
page read and write
267A2C77000
trusted library allocation
page read and write
2679BC7D000
trusted library allocation
page read and write
26796B9E000
trusted library allocation
page read and write
1EC873B4000
heap
page read and write
2679C0CD000
trusted library allocation
page read and write
26798154000
trusted library allocation
page read and write
26797C7B000
trusted library allocation
page read and write
267A3586000
trusted library allocation
page read and write
267A605A000
trusted library allocation
page read and write
2679C4BF000
trusted library allocation
page read and write
2679A0E4000
trusted library allocation
page read and write
267A39F1000
trusted library allocation
page read and write
26796D80000
heap
page read and write
26796D33000
heap
page read and write
1DB6B3A8000
trusted library allocation
page read and write
2679C334000
trusted library allocation
page read and write
1EC88185000
heap
page read and write
267972A6000
trusted library allocation
page read and write
2679DBE0000
trusted library allocation
page read and write
26799FF4000
trusted library allocation
page read and write
2679869A000
trusted library allocation
page read and write
267A3D57000
trusted library allocation
page read and write
2679BBFD000
trusted library allocation
page read and write
2679A6FE000
trusted library allocation
page read and write
26796D73000
heap
page read and write
26795DBF000
trusted library allocation
page read and write
26796D36000
heap
page read and write
26799D8C000
trusted library allocation
page read and write
2679C08E000
trusted library allocation
page read and write
2679B1AA000
trusted library allocation
page read and write
26799C53000
heap
page read and write
267A35DB000
trusted library allocation
page read and write
2679817B000
trusted library allocation
page read and write
1DB6B382000
trusted library allocation
page read and write
26796D36000
heap
page read and write
2679BE88000
trusted library allocation
page read and write
26796D3F000
heap
page read and write
1EC87410000
trusted library allocation
page read and write
26797FFE000
trusted library allocation
page read and write
2679A697000
trusted library allocation
page read and write
26799D3E000
trusted library allocation
page read and write
26797C2C000
trusted library allocation
page read and write
267A60A4000
trusted library allocation
page read and write
588D000
stack
page read and write
1DB6B4C0000
heap
page read and write
26799C1F000
heap
page read and write
26796D51000
heap
page read and write
2679C445000
trusted library allocation
page read and write
2679BA31000
trusted library allocation
page read and write
267A3DF1000
trusted library allocation
page read and write
26796D56000
heap
page read and write
1EC87D5F000
heap
page read and write
267A3ABE000
trusted library allocation
page read and write
2679C47E000
trusted library allocation
page read and write
267A359F000
trusted library allocation
page read and write
267A2CEF000
trusted library allocation
page read and write
2679D03C000
trusted library allocation
page read and write
26796D4E000
heap
page read and write
267A3D50000
trusted library allocation
page read and write
26796BC2000
trusted library allocation
page read and write
26796D29000
heap
page read and write
267A38C5000
trusted library allocation
page read and write
26796B3A000
trusted library allocation
page read and write
2679C450000
trusted library allocation
page read and write
26796B15000
trusted library allocation
page read and write
2679C350000
trusted library allocation
page read and write
1EC87D69000
heap
page read and write
26796D3B000
heap
page read and write
267A364B000
trusted library allocation
page read and write
26796D46000
heap
page read and write
142E000
stack
page read and write
26796D54000
heap
page read and write
2679D087000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
2679C55F000
trusted library allocation
page read and write
26796D32000
heap
page read and write
2679B1DF000
trusted library allocation
page read and write
26799FB7000
trusted library allocation
page read and write
26799DD8000
trusted library allocation
page read and write
26796D2B000
heap
page read and write
26795A26000
trusted library allocation
page read and write
2679A04F000
trusted library allocation
page read and write
267A3165000
trusted library allocation
page read and write
6C71AFE000
stack
page read and write
435E000
stack
page read and write
17F9EDB6000
heap
page read and write
26796BE7000
trusted library allocation
page read and write
1EC87D6C000
heap
page read and write
26796D56000
heap
page read and write
2679BFF7000
trusted library allocation
page read and write
267981D6000
trusted library allocation
page read and write
1523000
heap
page read and write
2679AD2A000
trusted library allocation
page read and write
26796D3D000
heap
page read and write
1430000
heap
page read and write
1EC873DA000
unkown
page execute read
26796D41000
heap
page read and write
2679C0FA000
trusted library allocation
page read and write
26799C01000
heap
page read and write
26796CE0000
trusted library allocation
page read and write
267A3993000
trusted library allocation
page read and write
17F9D120000
heap
page read and write
267A3AA8000
trusted library allocation
page read and write
267A3D3B000
trusted library allocation
page read and write
2679B1CC000
trusted library allocation
page read and write
26795398000
trusted library allocation
page read and write
2679BEC8000
trusted library allocation
page read and write
2679BFFA000
trusted library allocation
page read and write
2679D077000
trusted library allocation
page read and write
2679C0EF000
trusted library allocation
page read and write
26799E90000
trusted library allocation
page read and write
26796D39000
heap
page read and write
267972A1000
trusted library allocation
page read and write
267A2C66000
trusted library allocation
page read and write
26798149000
trusted library allocation
page read and write
267A5ED5000
trusted library allocation
page read and write
267A2C2F000
trusted library allocation
page read and write
26797F81000
trusted library allocation
page read and write
26796D41000
heap
page read and write
2679B1A4000
trusted library allocation
page read and write
2679695E000
trusted library allocation
page read and write
26796D52000
heap
page read and write
26799DCE000
trusted library allocation
page read and write
2679A697000
trusted library allocation
page read and write
2679C55D000
trusted library allocation
page read and write
26799FEE000
trusted library allocation
page read and write
267A394A000
trusted library allocation
page read and write
26799951000
trusted library allocation
page read and write
2679548A000
trusted library allocation
page read and write
267A2CFE000
trusted library allocation
page read and write
26799DFA000
trusted library allocation
page read and write
267972B1000
trusted library allocation
page read and write
26796928000
trusted library allocation
page read and write
2679A05E000
trusted library allocation
page read and write
26796D32000
heap
page read and write
2679C490000
trusted library allocation
page read and write
2679BF48000
trusted library allocation
page read and write
2679C59F000
trusted library allocation
page read and write
2679BEBB000
trusted library allocation
page read and write
26796CC7000
trusted library allocation
page read and write
99D1D8000
stack
page read and write
26796D29000
heap
page read and write
267969A7000
trusted library allocation
page read and write
2679C6E4000
trusted library allocation
page read and write
267A2C5A000
trusted library allocation
page read and write
267981DF000
trusted library allocation
page read and write
26797B08000
trusted library allocation
page read and write
2679D05B000
trusted library allocation
page read and write
2679BDA7000
trusted library allocation
page read and write
26799951000
trusted library allocation
page read and write
267A3D40000
trusted library allocation
page read and write
2679BAAB000
trusted library allocation
page read and write
2679B85A000
trusted library allocation
page read and write
2679C68C000
trusted library allocation
page read and write
26796D32000
heap
page read and write
26796D80000
heap
page read and write
2679C47A000
trusted library allocation
page read and write
26795AB6000
trusted library allocation
page read and write
267A2CFE000
trusted library allocation
page read and write
26796D52000
heap
page read and write
267981DC000
trusted library allocation
page read and write
2679D0A2000
trusted library allocation
page read and write
26799862000
trusted library allocation
page read and write
2679DBEC000
trusted library allocation
page read and write
267A3DFB000
trusted library allocation
page read and write
2679BFBE000
trusted library allocation
page read and write
26799880000
trusted library allocation
page read and write
1EC87D60000
heap
page read and write
2679C360000
trusted library allocation
page read and write
2679BCB3000
trusted library allocation
page read and write
2679BDA8000
trusted library allocation
page read and write
267A3DF4000
trusted library allocation
page read and write
267A605C000
trusted library allocation
page read and write
2679D0E2000
trusted library allocation
page read and write
3DE1000
heap
page read and write
2679C0CD000
trusted library allocation
page read and write
2679DBE8000
trusted library allocation
page read and write
2679C5D2000
trusted library allocation
page read and write
21AD9CD3000
heap
page read and write
267A2C77000
trusted library allocation
page read and write
2679BDC9000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
26799800000
trusted library allocation
page read and write
26796D56000
heap
page read and write
267A2CA0000
trusted library allocation
page read and write
26796D3B000
heap
page read and write
267981D2000
trusted library allocation
page read and write
267A2C20000
trusted library allocation
page read and write
267A408C000
trusted library allocation
page read and write
26796B15000
trusted library allocation
page read and write
267A40BB000
trusted library allocation
page read and write
267A38E6000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
26799FF0000
trusted library allocation
page read and write
267A36C7000
trusted library allocation
page read and write
14F0000
heap
page read and write
26799D6A000
trusted library allocation
page read and write
267A5716000
heap
page read and write
267A38F5000
trusted library allocation
page read and write
2679C4E3000
trusted library allocation
page read and write
2679AAF6000
trusted library allocation
page read and write
2679B16E000
trusted library allocation
page read and write
2679BF43000
trusted library allocation
page read and write
267A3863000
trusted library allocation
page read and write
26796BB6000
trusted library allocation
page read and write
26796D40000
heap
page read and write
2679BD68000
trusted library allocation
page read and write
26796D4E000
heap
page read and write
2679C361000
trusted library allocation
page read and write
26796C9A000
trusted library allocation
page read and write
2679C66F000
trusted library allocation
page read and write
2679C5A9000
trusted library allocation
page read and write
26796D39000
heap
page read and write
267A3DCF000
trusted library allocation
page read and write
26796D53000
heap
page read and write
267955FB000
trusted library allocation
page read and write
2679C4B8000
trusted library allocation
page read and write
2679A697000
trusted library allocation
page read and write
26796D41000
heap
page read and write
26796D41000
heap
page read and write
2679AAF6000
trusted library allocation
page read and write
26796D52000
heap
page read and write
2679C5BA000
trusted library allocation
page read and write
26796D40000
heap
page read and write
2679546E000
trusted library allocation
page read and write
267A60CB000
trusted library allocation
page read and write
26796B97000
trusted library allocation
page read and write
26796BC2000
trusted library allocation
page read and write
2679C0B0000
trusted library allocation
page read and write
26799C05000
heap
page read and write
267A3962000
trusted library allocation
page read and write
2679BCB3000
trusted library allocation
page read and write
26799F83000
trusted library allocation
page read and write
2679AAF8000
trusted library allocation
page read and write
DB4000
heap
page read and write
2679D0A2000
trusted library allocation
page read and write
26796D73000
heap
page read and write
2679C5AC000
trusted library allocation
page read and write
26796D41000
heap
page read and write
26797F6D000
trusted library allocation
page read and write
2679B1C4000
trusted library allocation
page read and write
26796D3E000
heap
page read and write
26796D41000
heap
page read and write
2679C4C4000
trusted library allocation
page read and write
267A3AFD000
trusted library allocation
page read and write
26796BC6000
trusted library allocation
page read and write
2679B866000
trusted library allocation
page read and write
26796D41000
heap
page read and write
26796D30000
heap
page read and write
26796D7A000
heap
page read and write
2679C063000
trusted library allocation
page read and write
26795AB9000
trusted library allocation
page read and write
2A197FF000
stack
page read and write
1EC873D1000
unkown
page execute read
2679ADF8000
trusted library allocation
page read and write
26796CBC000
trusted library allocation
page read and write
2679DC6B000
trusted library allocation
page read and write
2679B85E000
trusted library allocation
page read and write
26795A9F000
trusted library allocation
page read and write
26796BDE000
trusted library allocation
page read and write
3DE1000
heap
page read and write
267A38D9000
trusted library allocation
page read and write
26796D41000
heap
page read and write
26796D2C000
heap
page read and write
26799D2F000
trusted library allocation
page read and write
26796D36000
heap
page read and write
26797F8A000
trusted library allocation
page read and write
2679BBC3000
trusted library allocation
page read and write
267A316D000
trusted library allocation
page read and write
21AD9D00000
trusted library allocation
page read and write
267A2C80000
trusted library allocation
page read and write
2679C575000
trusted library allocation
page read and write
26796D29000
heap
page read and write
26796D73000
heap
page read and write
267A60A1000
trusted library allocation
page read and write
26797275000
trusted library allocation
page read and write
2679C6E4000
trusted library allocation
page read and write
267986A1000
trusted library allocation
page read and write
267A2C93000
trusted library allocation
page read and write
26795DFC000
trusted library allocation
page read and write
26796D3A000
heap
page read and write
2679BCDC000
trusted library allocation
page read and write
26799E7F000
trusted library allocation
page read and write
267A2CEF000
trusted library allocation
page read and write
267A2CF1000
trusted library allocation
page read and write
2679C697000
trusted library allocation
page read and write
26796D5A000
heap
page read and write
26799BFC000
heap
page read and write
1FE448D0000
heap
page read and write
26796BFA000
trusted library allocation
page read and write
1DB6B020000
heap
page read and write
2679C0BB000
trusted library allocation
page read and write
2679981D000
trusted library allocation
page read and write
26796D5C000
heap
page read and write
26796B73000
trusted library allocation
page read and write
26796D84000
heap
page read and write
26796C56000
trusted library allocation
page read and write
26796D48000
heap
page read and write
267A35BE000
trusted library allocation
page read and write
267A6060000
trusted library allocation
page read and write
1EC87DE3000
heap
page read and write
267973F6000
trusted library allocation
page read and write
26797C86000
trusted library allocation
page read and write
1EC8817B000
heap
page read and write
1EC870B0000
heap
page read and write
26797C98000
trusted library allocation
page read and write
26796D40000
heap
page read and write
2679AAF8000
trusted library allocation
page read and write
26796D52000
heap
page read and write
1EC87D7D000
heap
page read and write
26796D49000
heap
page read and write
26795AA7000
trusted library allocation
page read and write
1EC8817B000
heap
page read and write
1EC88183000
heap
page read and write
267A2C80000
trusted library allocation
page read and write
3DE1000
heap
page read and write
26796D40000
heap
page read and write
26799D3E000
trusted library allocation
page read and write
26797F7A000
trusted library allocation
page read and write
2679A287000
trusted library allocation
page read and write
1EC873E0000
unkown
page execute read
1DB6B4B6000
heap
page read and write
2679D09E000
trusted library allocation
page read and write
267A60A4000
trusted library allocation
page read and write
26797C66000
trusted library allocation
page read and write
2679989B000
trusted library allocation
page read and write
26796CF6000
trusted library allocation
page read and write
267A2C6B000
trusted library allocation
page read and write
26797F4E000
trusted library allocation
page read and write
1EC88197000
heap
page read and write
2679C5A9000
trusted library allocation
page read and write
2679C445000
trusted library allocation
page read and write
267A35BE000
trusted library allocation
page read and write
26796B83000
trusted library allocation
page read and write
2679BDC3000
trusted library allocation
page read and write
267A364E000
trusted library allocation
page read and write
2679B1B7000
trusted library allocation
page read and write
2679BC71000
trusted library allocation
page read and write
1EC87D6C000
heap
page read and write
267A2C4F000
trusted library allocation
page read and write
26795DCD000
trusted library allocation
page read and write
26797F5C000
trusted library allocation
page read and write
26796D36000
heap
page read and write
2679C5C8000
trusted library allocation
page read and write
26797FBD000
trusted library allocation
page read and write
267A3D47000
trusted library allocation
page read and write
2679A074000
trusted library allocation
page read and write
2679BF41000
trusted library allocation
page read and write
267A36DD000
trusted library allocation
page read and write
267A6096000
trusted library allocation
page read and write
2679A0FD000
trusted library allocation
page read and write
1DB6B30E000
trusted library allocation
page read and write
DB4000
heap
page read and write
2679C496000
trusted library allocation
page read and write
2679D0DC000
trusted library allocation
page read and write
17F9D19D000
heap
page read and write
26799885000
trusted library allocation
page read and write
1DB6AFE0000
remote allocation
page read and write
26796D43000
heap
page read and write
2679C096000
trusted library allocation
page read and write
26796D36000
heap
page read and write
2679D03C000
trusted library allocation
page read and write
267A3D50000
trusted library allocation
page read and write
26799F92000
trusted library allocation
page read and write
2679C59F000
trusted library allocation
page read and write
2679C58C000
trusted library allocation
page read and write
FDC000
unkown
page readonly
2679D067000
trusted library allocation
page read and write
2679C08A000
trusted library allocation
page read and write
26796D3C000
heap
page read and write
267A36C7000
trusted library allocation
page read and write
26795923000
trusted library allocation
page read and write
267981C0000
trusted library allocation
page read and write
2F6CCFB000
stack
page read and write
267A38FC000
trusted library allocation
page read and write
2679DB92000
trusted library allocation
page read and write
267A60CB000
trusted library allocation
page read and write
2679C596000
trusted library allocation
page read and write
267A3D56000
trusted library allocation
page read and write
2679C54E000
trusted library allocation
page read and write
2679B841000
trusted library allocation
page read and write
26796A65000
trusted library allocation
page read and write
26799BFB000
heap
page read and write
99E9FE000
unkown
page readonly
21AD9ECB000
trusted library allocation
page read and write
2679BE88000
trusted library allocation
page read and write
2679C0F8000
trusted library allocation
page read and write
267A39B4000
trusted library allocation
page read and write
2679BA88000
trusted library allocation
page read and write
267973FB000
trusted library allocation
page read and write
DB4000
heap
page read and write
26796D84000
heap
page read and write
1DB6B30C000
trusted library allocation
page read and write
26799F63000
trusted library allocation
page read and write
2679C47E000
trusted library allocation
page read and write
26799C53000
heap
page read and write
2679BE07000
trusted library allocation
page read and write
1EC87492000
trusted library allocation
page read and write
267A3174000
trusted library allocation
page read and write
2679B828000
trusted library allocation
page read and write
26796CF3000
trusted library allocation
page read and write
26799951000
trusted library allocation
page read and write
DB4000
heap
page read and write
26796D3C000
heap
page read and write
26796D3D000
heap
page read and write
1EC87DE8000
heap
page read and write
1DB6B3B5000
trusted library allocation
page read and write
26799880000
trusted library allocation
page read and write
1EC87DEB000
heap
page read and write
21AD9A80000
remote allocation
page read and write
26797F7B000
trusted library allocation
page read and write
2679BC7D000
trusted library allocation
page read and write
2679537B000
trusted library allocation
page read and write
26797F6C000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
26796D84000
heap
page read and write
267A314C000
trusted library allocation
page read and write
26799DD8000
trusted library allocation
page read and write
26796D32000
heap
page read and write
1EC88185000
heap
page read and write
267A2C66000
trusted library allocation
page read and write
26797C49000
trusted library allocation
page read and write
3DE1000
heap
page read and write
2679B8CC000
trusted library allocation
page read and write
267A36D1000
trusted library allocation
page read and write
3DE0000
heap
page read and write
26796D52000
heap
page read and write
1EC87D5C000
heap
page read and write
2679C33F000
trusted library allocation
page read and write
26796D29000
heap
page read and write
267955C8000
trusted library allocation
page read and write
17F9D475000
heap
page read and write
267A605C000
trusted library allocation
page read and write
267A5EDE000
trusted library allocation
page read and write
267A38EB000
trusted library allocation
page read and write
26796D5A000
heap
page read and write
26796D56000
heap
page read and write
2679DBA0000
trusted library allocation
page read and write
2679BCDC000
trusted library allocation
page read and write
26796B9B000
trusted library allocation
page read and write
267A2CF6000
trusted library allocation
page read and write
26796D32000
heap
page read and write
26798164000
trusted library allocation
page read and write
2679BCF7000
trusted library allocation
page read and write
267A3D23000
trusted library allocation
page read and write
26799C53000
heap
page read and write
26796D40000
heap
page read and write
2679D037000
trusted library allocation
page read and write
2679D0DA000
trusted library allocation
page read and write
1EC87D9C000
heap
page read and write
26796B65000
trusted library allocation
page read and write
26798186000
trusted library allocation
page read and write
2679C517000
trusted library allocation
page read and write
2679BF6C000
trusted library allocation
page read and write
2679A2D9000
trusted library allocation
page read and write
21AD9E66000
trusted library allocation
page read and write
267A2C08000
trusted library allocation
page read and write
267A39FC000
trusted library allocation
page read and write
2A177FF000
stack
page read and write
26796D36000
heap
page read and write
26796D4A000
heap
page read and write
26796D84000
heap
page read and write
26796D41000
heap
page read and write
2679C684000
trusted library allocation
page read and write
2679545A000
trusted library allocation
page read and write
267A408C000
trusted library allocation
page read and write
2679C0CF000
trusted library allocation
page read and write
3DE1000
heap
page read and write
2679C4C2000
trusted library allocation
page read and write
26796D84000
heap
page read and write
DB4000
heap
page read and write
26796D52000
heap
page read and write
267A34E2000
trusted library allocation
page read and write
267A605C000
trusted library allocation
page read and write
3DE1000
heap
page read and write
2679B831000
trusted library allocation
page read and write
1EC87D08000
heap
page read and write
26799D70000
trusted library allocation
page read and write
267981DF000
trusted library allocation
page read and write
2679DB84000
trusted library allocation
page read and write
267A39DA000
trusted library allocation
page read and write
2679C058000
trusted library allocation
page read and write
1DB6B1AF000
unclassified section
page read and write
1DB6B190000
heap
page readonly
26796D32000
heap
page read and write
26796B87000
trusted library allocation
page read and write
267A3D3E000
trusted library allocation
page read and write
2679C6F1000
trusted library allocation
page read and write
26796D39000
heap
page read and write
2679BBD3000
trusted library allocation
page read and write
267A6074000
trusted library allocation
page read and write
26799F43000
trusted library allocation
page read and write
267A39C4000
trusted library allocation
page read and write
267A3DBF000
trusted library allocation
page read and write
2679B85A000
trusted library allocation
page read and write
26799FF0000
trusted library allocation
page read and write
1EC87400000
trusted library allocation
page read and write
2679B8DE000
trusted library allocation
page read and write
26799DEA000
trusted library allocation
page read and write
267A3DFB000
trusted library allocation
page read and write
267A5EE3000
trusted library allocation
page read and write
2679D025000
trusted library allocation
page read and write
2679B843000
trusted library allocation
page read and write
267973D2000
trusted library allocation
page read and write
267A369F000
trusted library allocation
page read and write
267A3D3E000
trusted library allocation
page read and write
21AD9E12000
trusted library allocation
page read and write
2679ADD4000
trusted library allocation
page read and write
26799D53000
trusted library allocation
page read and write
26796D40000
heap
page read and write
2679A2FD000
trusted library allocation
page read and write
DB4000
heap
page read and write
2679C5A9000
trusted library allocation
page read and write
D6E000
stack
page read and write
267955F5000
trusted library allocation
page read and write
2679C598000
trusted library allocation
page read and write
267A60CB000
trusted library allocation
page read and write
26796D57000
heap
page read and write
26796D2B000
heap
page read and write
1EC87D5C000
heap
page read and write
26797FD3000
trusted library allocation
page read and write
2679C6B7000
trusted library allocation
page read and write
267A315C000
trusted library allocation
page read and write
2679B8C3000
trusted library allocation
page read and write
2679BE0D000
trusted library allocation
page read and write
267A2C79000
trusted library allocation
page read and write
26796B83000
trusted library allocation
page read and write
267A2CA0000
trusted library allocation
page read and write
2679544C000
trusted library allocation
page read and write
267A3DE9000
trusted library allocation
page read and write
267A5706000
heap
page read and write
26797FA4000
trusted library allocation
page read and write
26799F30000
trusted library allocation
page read and write
1EC88160000
heap
page read and write
CE0000
heap
page read and write
267A3D55000
trusted library allocation
page read and write
2679BD8B000
trusted library allocation
page read and write
26796D29000
heap
page read and write
26797FAE000
trusted library allocation
page read and write
267A3AFB000
trusted library allocation
page read and write
1DB6B369000
trusted library allocation
page read and write
2679C0F3000
trusted library allocation
page read and write
6B79B89000
trusted library allocation
page read and write
267A40CA000
trusted library allocation
page read and write
26799DB0000
trusted library allocation
page read and write
26795D0D000
trusted library allocation
page read and write
2679BDC1000
trusted library allocation
page read and write
267A3A93000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
2679A2B4000
trusted library allocation
page read and write
2679992B000
trusted library allocation
page read and write
2679BF8D000
trusted library allocation
page read and write
267A35DD000
trusted library allocation
page read and write
26798178000
trusted library allocation
page read and write
2679C528000
trusted library allocation
page read and write
1EC874F9000
trusted library allocation
page read and write
26796D48000
heap
page read and write
2679BDC4000
trusted library allocation
page read and write
267A3875000
trusted library allocation
page read and write
26797CC8000
trusted library allocation
page read and write
26796D84000
heap
page read and write
267A3AA3000
trusted library allocation
page read and write
2679DCAF000
trusted library allocation
page read and write
26796D3E000
heap
page read and write
26796D29000
heap
page read and write
26799FF4000
trusted library allocation
page read and write
26799D50000
trusted library allocation
page read and write
1DB6B70C000
trusted library allocation
page read and write
267A315C000
trusted library allocation
page read and write
267A2CA5000
trusted library allocation
page read and write
26799E5D000
trusted library allocation
page read and write
2679C0EF000
trusted library allocation
page read and write
2679AAFE000
trusted library allocation
page read and write
1EC88169000
heap
page read and write
26796D52000
heap
page read and write
267A56E1000
heap
page read and write
2679DB9F000
trusted library allocation
page read and write
267A39F3000
trusted library allocation
page read and write
26795D66000
trusted library allocation
page read and write
2679BCB3000
trusted library allocation
page read and write
26796D5A000
heap
page read and write
267973FB000
trusted library allocation
page read and write
26795971000
trusted library allocation
page read and write
2679C5BA000
trusted library allocation
page read and write
26796D56000
heap
page read and write
26796D42000
heap
page read and write
26795D1F000
trusted library allocation
page read and write
267A3165000
trusted library allocation
page read and write
26798149000
trusted library allocation
page read and write
2679732F000
trusted library allocation
page read and write
26796D51000
heap
page read and write
267A2C5A000
trusted library allocation
page read and write
26796D29000
heap
page read and write
2679C4C2000
trusted library allocation
page read and write
2679B854000
trusted library allocation
page read and write
267998BC000
trusted library allocation
page read and write
2679D032000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
267A3888000
trusted library allocation
page read and write
2679B1AA000
trusted library allocation
page read and write
26796BF3000
trusted library allocation
page read and write
1EC87D63000
heap
page read and write
26798189000
trusted library allocation
page read and write
267A2C12000
trusted library allocation
page read and write
26796BF3000
trusted library allocation
page read and write
26796D73000
heap
page read and write
26799FE6000
trusted library allocation
page read and write
2679C0D3000
trusted library allocation
page read and write
2679ADC9000
trusted library allocation
page read and write
26797262000
trusted library allocation
page read and write
267A3687000
trusted library allocation
page read and write
267A40B1000
trusted library allocation
page read and write
CDCDBFF000
stack
page read and write
26796D52000
heap
page read and write
2679C66B000
trusted library allocation
page read and write
2679DBFE000
trusted library allocation
page read and write
267A2C74000
trusted library allocation
page read and write
2679C34F000
trusted library allocation
page read and write
267A2C77000
trusted library allocation
page read and write
26796D48000
heap
page read and write
1EC87DE9000
heap
page read and write
267A60A1000
trusted library allocation
page read and write
26796D36000
heap
page read and write
26796D2B000
heap
page read and write
2679BE0D000
trusted library allocation
page read and write
26796BFA000
trusted library allocation
page read and write
1DB6B3C8000
trusted library allocation
page read and write
26796D32000
heap
page read and write
2679D020000
trusted library allocation
page read and write
2679989C000
trusted library allocation
page read and write
2679DBFE000
trusted library allocation
page read and write
3DE1000
heap
page read and write
26799DED000
trusted library allocation
page read and write
2679987E000
trusted library allocation
page read and write
2679AAFE000
trusted library allocation
page read and write
1EC87474000
trusted library allocation
page read and write
26796D42000
heap
page read and write
267A3661000
trusted library allocation
page read and write
2679B83A000
trusted library allocation
page read and write
3DE1000
heap
page read and write
26796A5D000
trusted library allocation
page read and write
267A3DCF000
trusted library allocation
page read and write
26799FF4000
trusted library allocation
page read and write
267A6023000
trusted library allocation
page read and write
267A2C80000
trusted library allocation
page read and write
267A35AE000
trusted library allocation
page read and write
2679BE88000
trusted library allocation
page read and write
267A3AF2000
trusted library allocation
page read and write
267A3159000
trusted library allocation
page read and write
26799C0D000
heap
page read and write
26799865000
trusted library allocation
page read and write
2679C445000
trusted library allocation
page read and write
26796D40000
heap
page read and write
1EC88199000
heap
page read and write
26799D7B000
trusted library allocation
page read and write
267A3692000
trusted library allocation
page read and write
267A60A4000
trusted library allocation
page read and write
267A2CF6000
trusted library allocation
page read and write
2679C59F000
trusted library allocation
page read and write
267A35DD000
trusted library allocation
page read and write
267A35FA000
trusted library allocation
page read and write
2679B1CC000
trusted library allocation
page read and write
2679A2C5000
trusted library allocation
page read and write
1EC87332000
unclassified section
page read and write
2679993B000
trusted library allocation
page read and write
267981DF000
trusted library allocation
page read and write
2679D04F000
trusted library allocation
page read and write
26796928000
trusted library allocation
page read and write
267A6000000
trusted library allocation
page read and write
26796D5A000
heap
page read and write
2679B86B000
trusted library allocation
page read and write
26797C17000
trusted library allocation
page read and write
2679D09A000
trusted library allocation
page read and write
2679C5AC000
trusted library allocation
page read and write
26796D5A000
heap
page read and write
26799FE6000
trusted library allocation
page read and write
26796D29000
heap
page read and write
2679C5C8000
trusted library allocation
page read and write
2679C584000
trusted library allocation
page read and write
2679BBB7000
trusted library allocation
page read and write
3DE1000
heap
page read and write
2679AAB2000
trusted library allocation
page read and write
26796D48000
heap
page read and write
2679C0BB000
trusted library allocation
page read and write
2679BF40000
trusted library allocation
page read and write
26796D3D000
heap
page read and write
267A3D52000
trusted library allocation
page read and write
267A3947000
trusted library allocation
page read and write
267A409B000
trusted library allocation
page read and write
267A3633000
trusted library allocation
page read and write
26799D98000
trusted library allocation
page read and write
267981FE000
trusted library allocation
page read and write
26797287000
trusted library allocation
page read and write
267A3D55000
trusted library allocation
page read and write
26799C16000
heap
page read and write
1DB6B373000
trusted library allocation
page read and write
26796D3B000
heap
page read and write
21AD9EB7000
trusted library allocation
page read and write
26796D80000
heap
page read and write
26796D32000
heap
page read and write
1EC874BF000
trusted library allocation
page read and write
267A35D6000
trusted library allocation
page read and write
2679C5D6000
trusted library allocation
page read and write
26795DBF000
trusted library allocation
page read and write
26799FF4000
trusted library allocation
page read and write
26796D33000
heap
page read and write
2679DBAD000
trusted library allocation
page read and write
267A60CB000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
2679C5D6000
trusted library allocation
page read and write
2679BBF0000
trusted library allocation
page read and write
267A2C68000
trusted library allocation
page read and write
267969E4000
trusted library allocation
page read and write
267981FE000
trusted library allocation
page read and write
2679ADF0000
trusted library allocation
page read and write
267A60CB000
trusted library allocation
page read and write
26796D4C000
heap
page read and write
26796BB6000
trusted library allocation
page read and write
26797262000
trusted library allocation
page read and write
2679BE32000
trusted library allocation
page read and write
2679C5D6000
trusted library allocation
page read and write
267A2C17000
trusted library allocation
page read and write
267A3160000
trusted library allocation
page read and write
267959F6000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
267A4090000
trusted library allocation
page read and write
26796D40000
heap
page read and write
267A2C44000
trusted library allocation
page read and write
2679A2B4000
trusted library allocation
page read and write
26795DAA000
trusted library allocation
page read and write
26797FB1000
trusted library allocation
page read and write
26799DFA000
trusted library allocation
page read and write
26797FC1000
trusted library allocation
page read and write
2679A2E2000
trusted library allocation
page read and write
267A40B8000
trusted library allocation
page read and write
2679C5A4000
trusted library allocation
page read and write
267A3668000
trusted library allocation
page read and write
26797CC8000
trusted library allocation
page read and write
3DE1000
heap
page read and write
21AD9F00000
unclassified section
page readonly
267A2C3E000
trusted library allocation
page read and write
267A2CEF000
trusted library allocation
page read and write
267A2C9B000
trusted library allocation
page read and write
1002000
unkown
page readonly
2F6DDFE000
unkown
page readonly
267981AD000
trusted library allocation
page read and write
267969A7000
trusted library allocation
page read and write
1EC87477000
trusted library allocation
page read and write
26798157000
trusted library allocation
page read and write
267A409F000
trusted library allocation
page read and write
26797C47000
trusted library allocation
page read and write
DB4000
heap
page read and write
2679C5D0000
trusted library allocation
page read and write
267A3DD9000
trusted library allocation
page read and write
267999D4000
trusted library allocation
page read and write
267A3D50000
trusted library allocation
page read and write
2679C57E000
trusted library allocation
page read and write
26799DFE000
trusted library allocation
page read and write
3DE1000
heap
page read and write
17F9EDA0000
heap
page read and write
1EC87D5F000
heap
page read and write
2679C4BB000
trusted library allocation
page read and write
26799F92000
trusted library allocation
page read and write
26799FF3000
trusted library allocation
page read and write
26798680000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
2679A2C5000
trusted library allocation
page read and write
1530000
heap
page read and write
1EC873D4000
unkown
page execute read
26797C9F000
trusted library allocation
page read and write
2679BDC3000
trusted library allocation
page read and write
267A366A000
trusted library allocation
page read and write
2679C5A4000
trusted library allocation
page read and write
26796D52000
heap
page read and write
1EC87380000
trusted library allocation
page read and write
2679C496000
trusted library allocation
page read and write
26796D36000
heap
page read and write
2679AAFA000
trusted library allocation
page read and write
26796D29000
heap
page read and write
3DE1000
heap
page read and write
2679C59C000
trusted library allocation
page read and write
26799DED000
trusted library allocation
page read and write
26796D4E000
heap
page read and write
2679C35D000
trusted library allocation
page read and write
2679A0B3000
trusted library allocation
page read and write
26796D80000
heap
page read and write
267A3AC6000
trusted library allocation
page read and write
2679DBEC000
trusted library allocation
page read and write
267A6023000
trusted library allocation
page read and write
2679C4FC000
trusted library allocation
page read and write
267986EB000
trusted library allocation
page read and write
26799FF2000
trusted library allocation
page read and write
267A3DBF000
trusted library allocation
page read and write
2679AAF8000
trusted library allocation
page read and write
26795A75000
trusted library allocation
page read and write
26796D32000
heap
page read and write
2679C0F8000
trusted library allocation
page read and write
2679DBE6000
trusted library allocation
page read and write
267A5ECA000
trusted library allocation
page read and write
1DB6B324000
trusted library allocation
page read and write
26796D33000
heap
page read and write
26795DC3000
trusted library allocation
page read and write
26799C1F000
heap
page read and write
21AD9B00000
heap
page read and write
26799E82000
trusted library allocation
page read and write
26796D80000
heap
page read and write
267A3AFD000
trusted library allocation
page read and write
26796D32000
heap
page read and write
26797FAE000
trusted library allocation
page read and write
267981BE000
trusted library allocation
page read and write
2679B83A000
trusted library allocation
page read and write
2679B82C000
trusted library allocation
page read and write
26796D32000
heap
page read and write
2679C6E2000
trusted library allocation
page read and write
26797F54000
trusted library allocation
page read and write
26796D32000
heap
page read and write
26796D73000
heap
page read and write
26797C57000
trusted library allocation
page read and write
26797CC8000
trusted library allocation
page read and write
3DE1000
heap
page read and write
267981AE000
trusted library allocation
page read and write
26796D32000
heap
page read and write
2679709B000
trusted library allocation
page read and write
2679BDB2000
trusted library allocation
page read and write
2679B198000
trusted library allocation
page read and write
2679A0A0000
trusted library allocation
page read and write
2679AAF6000
trusted library allocation
page read and write
26799D50000
trusted library allocation
page read and write
26796D2B000
heap
page read and write
2679C574000
trusted library allocation
page read and write
267954DA000
trusted library allocation
page read and write
26796D73000
heap
page read and write
267A3D55000
trusted library allocation
page read and write
26795A26000
trusted library allocation
page read and write
267A319E000
trusted library allocation
page read and write
2F6C3FE000
stack
page read and write
26796D73000
heap
page read and write
26796A34000
trusted library allocation
page read and write
1EC87486000
trusted library allocation
page read and write
2679C659000
trusted library allocation
page read and write
26796D36000
heap
page read and write
2679A2FB000
trusted library allocation
page read and write
267969E7000
trusted library allocation
page read and write
267A3DE6000
trusted library allocation
page read and write
26797CC8000
trusted library allocation
page read and write
26799FF0000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
2679C58F000
trusted library allocation
page read and write
26799C1F000
heap
page read and write
2679AAEC000
trusted library allocation
page read and write
2679C44B000
trusted library allocation
page read and write
2679C508000
trusted library allocation
page read and write
26796B9E000
trusted library allocation
page read and write
267A575E000
heap
page read and write
99FA7E000
unkown
page readonly
2679D063000
trusted library allocation
page read and write
154C000
heap
page read and write
26797F9F000
trusted library allocation
page read and write
267973F8000
trusted library allocation
page read and write
267A2C35000
trusted library allocation
page read and write
26796D40000
heap
page read and write
2679C59F000
trusted library allocation
page read and write
26797CC8000
trusted library allocation
page read and write
26799D9B000
trusted library allocation
page read and write
267A574B000
heap
page read and write
2679C088000
trusted library allocation
page read and write
267A5751000
heap
page read and write
2679D0B2000
trusted library allocation
page read and write
26796D4A000
heap
page read and write
26796C2F000
trusted library allocation
page read and write
26795AA7000
trusted library allocation
page read and write
6C6F9D8000
stack
page read and write
267A5769000
heap
page read and write
26799C42000
heap
page read and write
267A60B9000
trusted library allocation
page read and write
26795DC3000
trusted library allocation
page read and write
2679C57B000
trusted library allocation
page read and write
267973CD000
trusted library allocation
page read and write
26799942000
trusted library allocation
page read and write
267A605A000
trusted library allocation
page read and write
26799C53000
heap
page read and write
26799919000
trusted library allocation
page read and write
26799873000
trusted library allocation
page read and write
2679B18B000
trusted library allocation
page read and write
26796D4A000
heap
page read and write
26796D51000
heap
page read and write
26799C16000
heap
page read and write
2679B854000
trusted library allocation
page read and write
1EC873C0000
trusted library allocation
page read and write
4B9F000
stack
page read and write
267A2C79000
trusted library allocation
page read and write
2679C4C4000
trusted library allocation
page read and write
267A2CF1000
trusted library allocation
page read and write
26795DFC000
trusted library allocation
page read and write
26797FD5000
trusted library allocation
page read and write
267A389B000
trusted library allocation
page read and write
26796D54000
heap
page read and write
26799FAB000
trusted library allocation
page read and write
1DB6B420000
unclassified section
page readonly
D2D000
stack
page read and write
26796D36000
heap
page read and write
267A2C80000
trusted library allocation
page read and write
26796D4E000
heap
page read and write
DB5000
heap
page read and write
267A2CF3000
trusted library allocation
page read and write
2679B1EB000
trusted library allocation
page read and write
2679ADA9000
trusted library allocation
page read and write
CDCD3FF000
stack
page read and write
2679C5B5000
trusted library allocation
page read and write
267A2CE8000
trusted library allocation
page read and write
1EC87DE6000
heap
page read and write
26796D2C000
heap
page read and write
1EC87DF1000
heap
page read and write
267A2C32000
trusted library allocation
page read and write
26799DA6000
trusted library allocation
page read and write
2679BF48000
trusted library allocation
page read and write
2679BE0D000
trusted library allocation
page read and write
267A605A000
trusted library allocation
page read and write
267972DB000
trusted library allocation
page read and write
267A2CA0000
trusted library allocation
page read and write
2679A6A2000
trusted library allocation
page read and write
267A2C6B000
trusted library allocation
page read and write
267981DF000
trusted library allocation
page read and write
267A40B0000
trusted library allocation
page read and write
267A3D23000
trusted library allocation
page read and write
267A4088000
trusted library allocation
page read and write
267A38D4000
trusted library allocation
page read and write
26796D32000
heap
page read and write
267A6023000
trusted library allocation
page read and write
267972FE000
trusted library allocation
page read and write
267A38E9000
trusted library allocation
page read and write
26796D5A000
heap
page read and write
2679C5AA000
trusted library allocation
page read and write
26796BE7000
trusted library allocation
page read and write
26796A3A000
trusted library allocation
page read and write
6C722FE000
unkown
page readonly
2679BB8B000
trusted library allocation
page read and write
26797F37000
trusted library allocation
page read and write
2679986C000
trusted library allocation
page read and write
2679B841000
trusted library allocation
page read and write
2679BEAF000
trusted library allocation
page read and write
1EC87D69000
heap
page read and write
2679D06F000
trusted library allocation
page read and write
26796D52000
heap
page read and write
26796D52000
heap
page read and write
21AD9E81000
trusted library allocation
page read and write
26796D2B000
heap
page read and write
2679C0F1000
trusted library allocation
page read and write
267A35F8000
trusted library allocation
page read and write
1DB6B318000
trusted library allocation
page read and write
26799DEA000
trusted library allocation
page read and write
2679BEAF000
trusted library allocation
page read and write
26796D40000
heap
page read and write
267955D5000
trusted library allocation
page read and write
26796D73000
heap
page read and write
2679D025000
trusted library allocation
page read and write
2679869E000
trusted library allocation
page read and write
267A3D57000
trusted library allocation
page read and write
2679BE24000
trusted library allocation
page read and write
26796D40000
heap
page read and write
267986FC000
trusted library allocation
page read and write
2679C051000
trusted library allocation
page read and write
2679BD73000
trusted library allocation
page read and write
26796D42000
heap
page read and write
26797FD5000
trusted library allocation
page read and write
2679B841000
trusted library allocation
page read and write
26799832000
trusted library allocation
page read and write
2679C6E9000
trusted library allocation
page read and write
267972DA000
trusted library allocation
page read and write
26797C81000
trusted library allocation
page read and write
1523000
heap
page read and write
267A357F000
trusted library allocation
page read and write
267A3188000
trusted library allocation
page read and write
3DF1000
heap
page read and write
2679A07A000
trusted library allocation
page read and write
26796D29000
heap
page read and write
26796D84000
heap
page read and write
26796D7C000
heap
page read and write
2679DC41000
trusted library allocation
page read and write
26796D52000
heap
page read and write
267A605A000
trusted library allocation
page read and write
1EC87DA8000
heap
page read and write
267A2C5A000
trusted library allocation
page read and write
267A35B6000
trusted library allocation
page read and write
267A3D57000
trusted library allocation
page read and write
26799D58000
trusted library allocation
page read and write
26796BC2000
trusted library allocation
page read and write
2679C0F3000
trusted library allocation
page read and write
267A605A000
trusted library allocation
page read and write
26797287000
trusted library allocation
page read and write
3DE1000
heap
page read and write
2679AAE4000
trusted library allocation
page read and write
267A38BB000
trusted library allocation
page read and write
26798168000
trusted library allocation
page read and write
267A39C8000
trusted library allocation
page read and write
26796D4D000
heap
page read and write
267973BA000
trusted library allocation
page read and write
2679C5BA000
trusted library allocation
page read and write
26796B78000
trusted library allocation
page read and write
2679A263000
trusted library allocation
page read and write
26799FF0000
trusted library allocation
page read and write
1EC88197000
heap
page read and write
6C7127E000
unkown
page readonly
26796D48000
heap
page read and write
2679ADDB000
trusted library allocation
page read and write
2679BF5F000
trusted library allocation
page read and write
26795D89000
trusted library allocation
page read and write
26799DAB000
trusted library allocation
page read and write
267A2C41000
trusted library allocation
page read and write
26796D39000
heap
page read and write
2679C4C2000
trusted library allocation
page read and write
2679B1A4000
trusted library allocation
page read and write
26796CC7000
trusted library allocation
page read and write
26796B80000
trusted library allocation
page read and write
2679DBE8000
trusted library allocation
page read and write
21AD9A20000
unclassified section
page readonly
26799EFD000
trusted library allocation
page read and write
26797C9F000
trusted library allocation
page read and write
26795DCD000
trusted library allocation
page read and write
2679D025000
trusted library allocation
page read and write
267A39FC000
trusted library allocation
page read and write
267A316D000
trusted library allocation
page read and write
2679BFB4000
trusted library allocation
page read and write
2679C08A000
trusted library allocation
page read and write
2679C44B000
trusted library allocation
page read and write
2679C0ED000
trusted library allocation
page read and write
2679C424000
trusted library allocation
page read and write
26797FCE000
trusted library allocation
page read and write
2679C4F7000
trusted library allocation
page read and write
26796D29000
heap
page read and write
2679B500000
trusted library allocation
page read and write
2679A05E000
trusted library allocation
page read and write
267A579C000
heap
page read and write
26797FB1000
trusted library allocation
page read and write
2679B1E2000
trusted library allocation
page read and write
1EC879F0000
heap
page read and write
26796D84000
heap
page read and write
26799D9A000
trusted library allocation
page read and write
26797F72000
trusted library allocation
page read and write
267A605A000
trusted library allocation
page read and write
21AD9E2E000
trusted library allocation
page read and write
2679C6BF000
trusted library allocation
page read and write
2679C0EF000
trusted library allocation
page read and write
2679D0D4000
trusted library allocation
page read and write
2679A0D6000
trusted library allocation
page read and write
21AD9EC8000
trusted library allocation
page read and write
267A31B0000
trusted library allocation
page read and write
21AD9CD0000
heap
page read and write
2679C0CA000
trusted library allocation
page read and write
1EC88197000
heap
page read and write
26799FE6000
trusted library allocation
page read and write
267A2C9B000
trusted library allocation
page read and write
26796D73000
heap
page read and write
26796D29000
heap
page read and write
1DB6B1CA000
heap
page read and write
2679BCCD000
trusted library allocation
page read and write
2F6CCF8000
stack
page read and write
26796D36000
heap
page read and write
26795D89000
trusted library allocation
page read and write
2679BBF6000
trusted library allocation
page read and write
2679C54D000
trusted library allocation
page read and write
267A3863000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
21AD9E68000
trusted library allocation
page read and write
2679DB84000
trusted library allocation
page read and write
267A409B000
trusted library allocation
page read and write
26799D61000
trusted library allocation
page read and write
267A3A90000
trusted library allocation
page read and write
2679BDBF000
trusted library allocation
page read and write
2679C6C7000
trusted library allocation
page read and write
267A60A1000
trusted library allocation
page read and write
CDCCBFC000
stack
page read and write
26796D42000
heap
page read and write
26796B78000
trusted library allocation
page read and write
267986BD000
trusted library allocation
page read and write
26796D32000
heap
page read and write
2679C365000
trusted library allocation
page read and write
2679C6E0000
trusted library allocation
page read and write
2679C6C3000
trusted library allocation
page read and write
2679989C000
trusted library allocation
page read and write
26796D56000
heap
page read and write
26797C41000
trusted library allocation
page read and write
1DB6B150000
heap
page read and write
2679A074000
trusted library allocation
page read and write
2679BE27000
trusted library allocation
page read and write
2679C5D6000
trusted library allocation
page read and write
26796D32000
heap
page read and write
2679A2D7000
trusted library allocation
page read and write
267A38E6000
trusted library allocation
page read and write
1EC874CF000
trusted library allocation
page read and write
267A3182000
trusted library allocation
page read and write
2679C69E000
trusted library allocation
page read and write
2679BE8D000
trusted library allocation
page read and write
26799942000
trusted library allocation
page read and write
26797FB8000
trusted library allocation
page read and write
26796D73000
heap
page read and write
26796D36000
heap
page read and write
3DE1000
heap
page read and write
26796D56000
heap
page read and write
1EC881B6000
heap
page read and write
2679C4C4000
trusted library allocation
page read and write
2679C490000
trusted library allocation
page read and write
26797294000
trusted library allocation
page read and write
2679592F000
trusted library allocation
page read and write
26796D42000
heap
page read and write
267A2C6E000
trusted library allocation
page read and write
26796D51000
heap
page read and write
26797272000
trusted library allocation
page read and write
6C6EFBE000
stack
page read and write
26797F58000
trusted library allocation
page read and write
26797F70000
trusted library allocation
page read and write
26799C05000
heap
page read and write
2679C094000
trusted library allocation
page read and write
2679BE0D000
trusted library allocation
page read and write
26796B87000
trusted library allocation
page read and write
26796D52000
heap
page read and write
267A3D3E000
trusted library allocation
page read and write
267A40BB000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
267A6023000
trusted library allocation
page read and write
26796B67000
trusted library allocation
page read and write
2679B171000
trusted library allocation
page read and write
26796D56000
heap
page read and write
2679C311000
trusted library allocation
page read and write
26796D3C000
heap
page read and write
26796D39000
heap
page read and write
267A56E1000
heap
page read and write
26796D40000
heap
page read and write
267A39B0000
trusted library allocation
page read and write
267A315C000
trusted library allocation
page read and write
267A399D000
trusted library allocation
page read and write
26796D33000
heap
page read and write
26796D84000
heap
page read and write
DB4000
heap
page read and write
1490000
heap
page read and write
267A36D6000
trusted library allocation
page read and write
26797FD8000
trusted library allocation
page read and write
1DB6B400000
heap
page read and write
26796D52000
heap
page read and write
267A36E3000
trusted library allocation
page read and write
1EC873DC000
unkown
page execute read
26A0003F000
trusted library allocation
page read and write
2679813D000
trusted library allocation
page read and write
2679C363000
trusted library allocation
page read and write
267A605C000
trusted library allocation
page read and write
2679B83A000
trusted library allocation
page read and write
2679A0FD000
trusted library allocation
page read and write
2679DC6B000
trusted library allocation
page read and write
26796BDE000
trusted library allocation
page read and write
267A2C7D000
trusted library allocation
page read and write
2679C584000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
26796D4A000
heap
page read and write
267A605A000
trusted library allocation
page read and write
2679A0CD000
trusted library allocation
page read and write
26797CC8000
trusted library allocation
page read and write
26796D41000
heap
page read and write
26797C49000
trusted library allocation
page read and write
2679DBEA000
trusted library allocation
page read and write
26797F39000
trusted library allocation
page read and write
26799DA0000
trusted library allocation
page read and write
1DB6B700000
trusted library allocation
page read and write
267A60A1000
trusted library allocation
page read and write
1EC8733F000
unclassified section
page read and write
1EC88185000
heap
page read and write
267A35CA000
trusted library allocation
page read and write
26797F6A000
trusted library allocation
page read and write
2679A07A000
trusted library allocation
page read and write
26797F6D000
trusted library allocation
page read and write
267A3AEF000
trusted library allocation
page read and write
2679DBDE000
trusted library allocation
page read and write
2679DBE4000
trusted library allocation
page read and write
2679BC7D000
trusted library allocation
page read and write
26797FD5000
trusted library allocation
page read and write
267A56E1000
heap
page read and write
2679A064000
trusted library allocation
page read and write
1EC87465000
trusted library allocation
page read and write
26796D4A000
heap
page read and write
2F6B3D8000
stack
page read and write
2679BDCD000
trusted library allocation
page read and write
26799865000
trusted library allocation
page read and write
2679A062000
trusted library allocation
page read and write
2679DBE6000
trusted library allocation
page read and write
26796D32000
heap
page read and write
26796D52000
heap
page read and write
26796D35000
heap
page read and write
26796D29000
heap
page read and write
26796D34000
heap
page read and write
26795DB2000
trusted library allocation
page read and write
26796D3B000
heap
page read and write
26795961000
trusted library allocation
page read and write
2679B1D3000
trusted library allocation
page read and write
3A94000
heap
page read and write
26796D3B000
heap
page read and write
26796D52000
heap
page read and write
26796D32000
heap
page read and write
2679C6E0000
trusted library allocation
page read and write
26799E7F000
trusted library allocation
page read and write
26796D3D000
heap
page read and write
267998FB000
trusted library allocation
page read and write
2679699E000
trusted library allocation
page read and write
3DE1000
heap
page read and write
1EC88183000
heap
page read and write
2679790A000
trusted library allocation
page read and write
267A5EE4000
trusted library allocation
page read and write
2679BEAF000
trusted library allocation
page read and write
2679B81B000
trusted library allocation
page read and write
2679C3F4000
trusted library allocation
page read and write
267A36D2000
trusted library allocation
page read and write
26796D33000
heap
page read and write
26796D36000
heap
page read and write
267A35EB000
trusted library allocation
page read and write
26796B83000
trusted library allocation
page read and write
267A389B000
trusted library allocation
page read and write
2679A08F000
trusted library allocation
page read and write
21ADA000000
trusted library allocation
page read and write
2679C6C5000
trusted library allocation
page read and write
26799D3B000
trusted library allocation
page read and write
26797C6D000
trusted library allocation
page read and write
2679C5AC000
trusted library allocation
page read and write
267A3AC7000
trusted library allocation
page read and write
2679BFA6000
trusted library allocation
page read and write
26796D36000
heap
page read and write
26796D32000
heap
page read and write
28E8BA71000
trusted library allocation
page execute read
26799FF0000
trusted library allocation
page read and write
26796A4A000
trusted library allocation
page read and write
267A2C9B000
trusted library allocation
page read and write
26796D3D000
heap
page read and write
267972FE000
trusted library allocation
page read and write
1EC88198000
heap
page read and write
267A357D000
trusted library allocation
page read and write
26799FF0000
trusted library allocation
page read and write
2679BDF6000
trusted library allocation
page read and write
267986BD000
trusted library allocation
page read and write
26799FC3000
trusted library allocation
page read and write
267A5EDE000
trusted library allocation
page read and write
2679B854000
trusted library allocation
page read and write
2679545F000
trusted library allocation
page read and write
267A2C3A000
trusted library allocation
page read and write
DB4000
heap
page read and write
267A56E1000
heap
page read and write
26796B7B000
trusted library allocation
page read and write
26796D56000
heap
page read and write
2679BFB4000
trusted library allocation
page read and write
26797CC8000
trusted library allocation
page read and write
2679C6EF000
trusted library allocation
page read and write
267A2CE2000
trusted library allocation
page read and write
CDCCBFF000
stack
page read and write
1523000
heap
page read and write
26797294000
trusted library allocation
page read and write
17F9D1A2000
heap
page read and write
1EC87D64000
heap
page read and write
26796BC6000
trusted library allocation
page read and write
26796B89000
trusted library allocation
page read and write
26796D54000
heap
page read and write
26796B9B000
trusted library allocation
page read and write
26796D40000
heap
page read and write
2679D0BD000
trusted library allocation
page read and write
21AD9C46000
heap
page read and write
267A574D000
heap
page read and write
26799FF2000
trusted library allocation
page read and write
267981D2000
trusted library allocation
page read and write
2679BE2D000
trusted library allocation
page read and write
1EC87482000
trusted library allocation
page read and write
267981C0000
trusted library allocation
page read and write
26797C9F000
trusted library allocation
page read and write
267998D8000
trusted library allocation
page read and write
26797FFE000
trusted library allocation
page read and write
2679C51B000
trusted library allocation
page read and write
26795DC6000
trusted library allocation
page read and write
1EC87200000
trusted library allocation
page read and write
26796CF6000
trusted library allocation
page read and write
267A2CE2000
trusted library allocation
page read and write
26796D73000
heap
page read and write
26799FC3000
trusted library allocation
page read and write
26795357000
trusted library allocation
page read and write
26796D32000
heap
page read and write
26796BB6000
trusted library allocation
page read and write
2679C0ED000
trusted library allocation
page read and write
3DE1000
heap
page read and write
DB4000
heap
page read and write
26797F48000
trusted library allocation
page read and write
3DE1000
heap
page read and write
267A3ACB000
trusted library allocation
page read and write
2679993B000
trusted library allocation
page read and write
26799C16000
heap
page read and write
26799C53000
heap
page read and write
21AD9E96000
trusted library allocation
page read and write
1EC87DFC000
heap
page read and write
26796D48000
heap
page read and write
26796D40000
heap
page read and write
26799FF8000
trusted library allocation
page read and write
26795D89000
trusted library allocation
page read and write
26796D4A000
heap
page read and write
26799D76000
trusted library allocation
page read and write
26797C43000
trusted library allocation
page read and write
6C72AFE000
stack
page read and write
267981DC000
trusted library allocation
page read and write
2679C55D000
trusted library allocation
page read and write
26796D2B000
heap
page read and write
3DE1000
heap
page read and write
26797C6C000
trusted library allocation
page read and write
26797F87000
trusted library allocation
page read and write
2679C6E9000
trusted library allocation
page read and write
267981C4000
trusted library allocation
page read and write
26797234000
trusted library allocation
page read and write
26796BF3000
trusted library allocation
page read and write
267A2CFE000
trusted library allocation
page read and write
26796B24000
trusted library allocation
page read and write
2679BE79000
trusted library allocation
page read and write
99E1FE000
stack
page read and write
1DB6B300000
trusted library allocation
page read and write
26796D29000
heap
page read and write
2679B1A4000
trusted library allocation
page read and write
26796BFA000
trusted library allocation
page read and write
26796D29000
heap
page read and write
2679BD56000
trusted library allocation
page read and write
2679C660000
trusted library allocation
page read and write
17F9D500000
trusted library allocation
page read and write
26797CC8000
trusted library allocation
page read and write
267972AD000
trusted library allocation
page read and write
26799FF3000
trusted library allocation
page read and write
2679BE88000
trusted library allocation
page read and write
26798177000
trusted library allocation
page read and write
1EC87C06000
trusted library allocation
page read and write
267A3DF4000
trusted library allocation
page read and write
267A3ABE000
trusted library allocation
page read and write
2679ADA1000
trusted library allocation
page read and write
2679B184000
trusted library allocation
page read and write
26796D52000
heap
page read and write
26796D36000
heap
page read and write
2679C051000
trusted library allocation
page read and write
26797C6D000
trusted library allocation
page read and write
1EC881A9000
heap
page read and write
2679A070000
trusted library allocation
page read and write
154C000
heap
page read and write
26796D48000
heap
page read and write
26799D3B000
trusted library allocation
page read and write
26799949000
trusted library allocation
page read and write
2679C6F1000
trusted library allocation
page read and write
2679B1C4000
trusted library allocation
page read and write
26799E9C000
trusted library allocation
page read and write
267981AE000
trusted library allocation
page read and write
1DB6AF70000
unclassified section
page readonly
26796D40000
heap
page read and write
26797FAE000
trusted library allocation
page read and write
2679C4E3000
trusted library allocation
page read and write
2679A0FD000
trusted library allocation
page read and write
26796D41000
heap
page read and write
2679AD33000
trusted library allocation
page read and write
267986FC000
trusted library allocation
page read and write
2679DBA2000
trusted library allocation
page read and write
26799949000
trusted library allocation
page read and write
2679B1B7000
trusted library allocation
page read and write
2679C4F7000
trusted library allocation
page read and write
1EC88169000
heap
page read and write
26799FE0000
trusted library allocation
page read and write
2679C456000
trusted library allocation
page read and write
26795481000
trusted library allocation
page read and write
26799E7F000
trusted library allocation
page read and write
26796D5B000
heap
page read and write
26795A82000
trusted library allocation
page read and write
26796D2C000
heap
page read and write
26796D51000
heap
page read and write
2679C59B000
trusted library allocation
page read and write
2679BD5F000
trusted library allocation
page read and write
26795DBF000
trusted library allocation
page read and write
26796D4A000
heap
page read and write
2679B86D000
trusted library allocation
page read and write
267A35AE000
trusted library allocation
page read and write
26799DE8000
trusted library allocation
page read and write
2679C48C000
trusted library allocation
page read and write
26796D2E000
heap
page read and write
267A2CE2000
trusted library allocation
page read and write
267A39EF000
trusted library allocation
page read and write
2679C4BB000
trusted library allocation
page read and write
267A2C66000
trusted library allocation
page read and write
26796D56000
heap
page read and write
267A2CF3000
trusted library allocation
page read and write
26797C9F000
trusted library allocation
page read and write
26796BFC000
trusted library allocation
page read and write
26796D36000
heap
page read and write
2679ADC9000
trusted library allocation
page read and write
2679D059000
trusted library allocation
page read and write
1EC87412000
trusted library allocation
page read and write
DB4000
heap
page read and write
26796D30000
heap
page read and write
267A40BB000
trusted library allocation
page read and write
2A19FFF000
stack
page read and write
2679A070000
trusted library allocation
page read and write
267A6023000
trusted library allocation
page read and write
267981BE000
trusted library allocation
page read and write
267A35A9000
trusted library allocation
page read and write
26796D32000
heap
page read and write
267A2C93000
trusted library allocation
page read and write
267A605C000
trusted library allocation
page read and write
2679A2CE000
trusted library allocation
page read and write
26797238000
trusted library allocation
page read and write
26796B9B000
trusted library allocation
page read and write
2679BBA6000
trusted library allocation
page read and write
2679BD92000
trusted library allocation
page read and write
2679C4AC000
trusted library allocation
page read and write
26799F83000
trusted library allocation
page read and write
2679A062000
trusted library allocation
page read and write
2679869E000
trusted library allocation
page read and write
26799C16000
heap
page read and write
2679C68E000
trusted library allocation
page read and write
2679A263000
trusted library allocation
page read and write
26796D3D000
heap
page read and write
26796B80000
trusted library allocation
page read and write
2679817D000
trusted library allocation
page read and write
26796D32000
heap
page read and write
267A2CB0000
trusted library allocation
page read and write
9A0A7E000
unkown
page readonly
2679DB75000
trusted library allocation
page read and write
267A3145000
trusted library allocation
page read and write
99C73D000
stack
page read and write
267A35DD000
trusted library allocation
page read and write
267A3AFC000
trusted library allocation
page read and write
26797FA7000
trusted library allocation
page read and write
21AD9C8F000
unclassified section
page read and write
2679C058000
trusted library allocation
page read and write
26796D7A000
heap
page read and write
2679BBFD000
trusted library allocation
page read and write
1EC87D60000
heap
page read and write
26796D57000
heap
page read and write
267998B8000
trusted library allocation
page read and write
267A39DB000
trusted library allocation
page read and write
267A3182000
trusted library allocation
page read and write
267A57C3000
heap
page read and write
2679DB8B000
trusted library allocation
page read and write
1EC87330000
unclassified section
page read and write
26796B15000
trusted library allocation
page read and write
26799BFB000
heap
page read and write
267A38F2000
trusted library allocation
page read and write
2679C6A9000
trusted library allocation
page read and write
21AD9E5D000
trusted library allocation
page read and write
2679D0DA000
trusted library allocation
page read and write
267A2C41000
trusted library allocation
page read and write
1EC88140000
heap
page read and write
26796D73000
heap
page read and write
267A3DD9000
trusted library allocation
page read and write
2679A08C000
trusted library allocation
page read and write
26796A46000
trusted library allocation
page read and write
2679543B000
trusted library allocation
page read and write
2679B184000
trusted library allocation
page read and write
267981DC000
trusted library allocation
page read and write
26796D80000
heap
page read and write
26797FCE000
trusted library allocation
page read and write
2679A05E000
trusted library allocation
page read and write
2679D090000
trusted library allocation
page read and write
26796D84000
heap
page read and write
267981FE000
trusted library allocation
page read and write
2679817B000
trusted library allocation
page read and write
2679B198000
trusted library allocation
page read and write
26798150000
trusted library allocation
page read and write
2679B8C3000
trusted library allocation
page read and write
26796D46000
heap
page read and write
2679C550000
trusted library allocation
page read and write
26796D32000
heap
page read and write
2679A2FD000
trusted library allocation
page read and write
2679D04B000
trusted library allocation
page read and write
2679DC68000
trusted library allocation
page read and write
26797FB1000
trusted library allocation
page read and write
17F9EDB8000
heap
page read and write
26799D3B000
trusted library allocation
page read and write
26796D29000
heap
page read and write
26795DD4000
trusted library allocation
page read and write
26797FD3000
trusted library allocation
page read and write
2679BEB2000
trusted library allocation
page read and write
F91B7680000
trusted library allocation
page read and write
2679BBB7000
trusted library allocation
page read and write
267A2CEF000
trusted library allocation
page read and write
26799DD8000
trusted library allocation
page read and write
26799933000
trusted library allocation
page read and write
2679BE07000
trusted library allocation
page read and write
267998D8000
trusted library allocation
page read and write
2679AAA2000
trusted library allocation
page read and write
2679BF8D000
trusted library allocation
page read and write
26796D3D000
heap
page read and write
26796D39000
heap
page read and write
There are 3586 hidden memdumps, click here to show them.