IOC Report
SecuriteInfo.com.Program.Unwanted.5412.9308.3353.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Program.Unwanted.5412.9308.3353.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Program Files (x86)\Right Backup\is-1OA4D.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Right Backup\is-6ESI6.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Right Backup\is-7Q60P.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Right Backup\is-K8A67.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Right Backup\is-RSVNH.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Right Backup\is-UGSPB.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-FD3PS.tmp\SecuriteInfo.com.Program.Unwanted.5412.9308.3353.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Right Backup\AWSSDK.Core.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\AWSSDK.S3.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\AppResource.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\Chinese_rbkp_ZH-CN.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF, CR line terminators
dropped
C:\Program Files (x86)\Right Backup\Chinese_rbkp_ZH-TW.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\FSLibRsyncWrapper.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\Finnish_rbkp_FI.ini (copy)
Unicode text, UTF-16, little-endian text, with very long lines (429), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\HtmlRenderer.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\Interop.IWshRuntimeLibrary.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\Microsoft.SqlServer.Types.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\Microsoft.Win32.TaskScheduler.DLL (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\RBClientService.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\RBClientService.exe.config (copy)
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\RBNotifier.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\RBNotifier_log.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\RightBackup.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\RightBackup.exe.config (copy)
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\STBackupclient.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\SevenZipSharp.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\System.Core.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\System.Data.DataSetExtensions.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\System.Data.SQLite.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\System.Runtime.Serialization.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\System.Threading.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\danish_rbkp_DA.ini (copy)
Unicode text, UTF-16, little-endian text, with very long lines (393), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\dutch_rbkp_NL.ini (copy)
Unicode text, UTF-16, little-endian text, with very long lines (342), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\eng_rbkp_en.ini (copy)
Generic INItialization configuration [RBACKUP_STRINGS]
dropped
C:\Program Files (x86)\Right Backup\french_rbkp_FR.ini (copy)
Unicode text, UTF-16, little-endian text, with very long lines (425), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\german_rbkp_DE.ini (copy)
Unicode text, UTF-16, little-endian text, with very long lines (415), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\graph.avi (copy)
RIFF (little-endian) data, AVI, 136 x 136, 12.00 fps, video: uncompressed
dropped
C:\Program Files (x86)\Right Backup\graph_red.avi (copy)
RIFF (little-endian) data, AVI, 136 x 136, 12.00 fps, video: uncompressed, audio: uncompressed PCM (stereo, 48000 Hz)
dropped
C:\Program Files (x86)\Right Backup\greek_rbkp_EL.ini (copy)
Unicode text, UTF-16, little-endian text, with very long lines (431), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\is-10V6O.tmp
Unicode text, UTF-16, little-endian text, with very long lines (380), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\is-2DNNP.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\is-2T469.tmp
Unicode text, UTF-16, little-endian text, with very long lines (429), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\is-44SVA.tmp
Unicode text, UTF-16, little-endian text, with very long lines (372), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\is-5DNPD.tmp
Unicode text, UTF-16, little-endian text, with very long lines (425), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\is-65K01.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\is-6UOQU.tmp
Unicode text, UTF-16, little-endian text, with very long lines (441), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\is-772TG.tmp
Unicode text, UTF-16, little-endian text, with very long lines (393), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\is-83LLE.tmp
Generic INItialization configuration [RBACKUP_STRINGS]
dropped
C:\Program Files (x86)\Right Backup\is-86NQ8.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\is-9OJG3.tmp
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\is-A8JFA.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\is-AR7RJ.tmp
RIFF (little-endian) data, AVI, 136 x 136, 12.00 fps, video: uncompressed
dropped
C:\Program Files (x86)\Right Backup\is-BB995.tmp
Unicode text, UTF-16, little-endian text, with very long lines (415), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\is-BBM96.tmp
Unicode text, UTF-16, little-endian text, with very long lines (400), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\is-C7UUC.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\is-CUIAS.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\is-DSQK9.tmp
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\is-E6IFT.tmp
Unicode text, UTF-16, little-endian text, with very long lines (342), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\is-GEL0D.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\is-GQNVN.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\is-GR5UV.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\is-HS8VR.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\is-I6AVM.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\is-ILJ84.tmp
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\is-ILP9R.tmp
RIFF (little-endian) data, AVI, 136 x 136, 12.00 fps, video: uncompressed, audio: uncompressed PCM (stereo, 48000 Hz)
dropped
C:\Program Files (x86)\Right Backup\is-KH7G4.tmp
RIFF (little-endian) data, AVI, 25 x 36, 24.00 fps, video: uncompressed
dropped
C:\Program Files (x86)\Right Backup\is-LLLC0.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\is-M6CE2.tmp
Unicode text, UTF-16, little-endian text, with CRLF, CR line terminators
dropped
C:\Program Files (x86)\Right Backup\is-O4A3A.tmp
Unicode text, UTF-16, little-endian text, with very long lines (460), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\is-QJJ9M.tmp
Unicode text, UTF-16, little-endian text, with very long lines (370), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\is-QUK8H.tmp
Unicode text, UTF-16, little-endian text, with very long lines (399), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\is-R278I.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\is-RHSP2.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\is-S4F4B.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\is-SGCSF.tmp
Unicode text, UTF-16, little-endian text, with very long lines (374), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\is-U9DNA.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\is-UO3MV.tmp
Unicode text, UTF-16, little-endian text, with very long lines (400), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\is-VKH9R.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\is-VU0HR.tmp
Unicode text, UTF-16, little-endian text, with very long lines (431), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\italian_rbkp_IT.ini (copy)
Unicode text, UTF-16, little-endian text, with very long lines (400), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\japanese_rbkp_JA.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\korean_rbkp_KO.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\loadingbg.avi (copy)
RIFF (little-endian) data, AVI, 25 x 36, 24.00 fps, video: uncompressed
dropped
C:\Program Files (x86)\Right Backup\norwegian_rbkp_NO.ini (copy)
Unicode text, UTF-16, little-endian text, with very long lines (372), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\notifier.ini (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\notifierlib.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\polish_rbkp_PL.ini (copy)
Unicode text, UTF-16, little-endian text, with very long lines (400), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\portuguese_rbkp_PT-BR.ini (copy)
Unicode text, UTF-16, little-endian text, with very long lines (370), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\portuguese_rbkp_PT_PT.ini (copy)
Unicode text, UTF-16, little-endian text, with very long lines (374), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\russian_rbkp_ru.ini (copy)
Unicode text, UTF-16, little-endian text, with very long lines (441), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\spanish_rbkp_ES.ini (copy)
Unicode text, UTF-16, little-endian text, with very long lines (460), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\swedish_rbkp_SV.ini (copy)
Unicode text, UTF-16, little-endian text, with very long lines (399), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\turkish_rbkp_TR.ini (copy)
Unicode text, UTF-16, little-endian text, with very long lines (380), with CRLF line terminators
dropped
C:\Program Files (x86)\Right Backup\unins000.dat
InnoSetup Log Right Backup, version 0x418, 153583 bytes, 701188\37\user\37, C:\Program Files (x86)\Right Backup\376\37
dropped
C:\Program Files (x86)\Right Backup\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Right Backup\unins000.msg
InnoSetup messages, version 6.0.0, 261 messages (UTF-16), Cancel installation
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xbe3d1c7e, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Right Backup\Right Backup.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Apr 18 22:33:17 2024, mtime=Thu Apr 18 22:33:17 2024, atime=Wed Jul 12 16:39:26 2023, length=6809984, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Right Backup\Uninstall Right Backup.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Apr 18 22:33:17 2024, mtime=Thu Apr 18 22:33:17 2024, atime=Thu Apr 18 22:32:56 2024, length=3238784, window=hide
dropped
C:\ProgramData\Systweak\Right Backup\-1\DB\SettingDB.db
data
dropped
C:\ProgramData\Systweak\Right Backup\-1\DB\SettingDB.db-journal
SQLite Rollback Journal
dropped
C:\ProgramData\Systweak\Right Backup\Logs\RBClientService.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
modified
C:\ProgramData\Systweak\Right Backup\Logs\RightBackup.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Systweak\Right Backup\rules\ignorerules.xml (copy)
XML 1.0 document, ASCII text, with very long lines (6128), with no line terminators
dropped
C:\ProgramData\Systweak\Right Backup\rules\is-FLJIB.tmp
XML 1.0 document, ASCII text, with very long lines (6128), with no line terminators
dropped
C:\ProgramData\Systweak\Right Backup\rules\is-GBDPB.tmp
XML 1.0 document, ASCII text, with very long lines (2125), with no line terminators
dropped
C:\ProgramData\Systweak\Right Backup\rules\is-UKI8B.tmp
SQLite 3.x database, last written using SQLite version 0, page size 1024, file counter 2, database pages 0, cookie 0x1, schema 4, UTF-8, version-valid-for 0
dropped
C:\ProgramData\Systweak\Right Backup\rules\sfe.db (copy)
SQLite 3.x database, last written using SQLite version 0, page size 1024, file counter 2, database pages 0, cookie 0x1, schema 4, UTF-8, version-valid-for 0
dropped
C:\ProgramData\Systweak\Right Backup\rules\smartbackuprules.xml (copy)
XML 1.0 document, ASCII text, with very long lines (2125), with no line terminators
dropped
C:\Users\Public\Desktop\Right Backup.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Apr 18 22:33:17 2024, mtime=Thu Apr 18 22:33:19 2024, atime=Wed Jul 12 16:39:26 2023, length=6809984, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RBNotifier.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RightBackup.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\DOMStore\E32A7KZM\www.rightbackup[1].xml
ASCII text, with very long lines (415), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\Alert_icon[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 49x51, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\FullScreenNormal[1]
GIF image data, version 89a, 19 x 15
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\Red_strip[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 734x51, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\Small_fixerror_dis_left[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 12x36, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\Small_fixerror_dis_left[2]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 12x36, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\Small_fixerror_dis_right[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 33x36, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\Small_fixerror_n_right[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 33x36, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\afterinstall[1].htm
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\amazon[1]
GIF image data, version 89a, 132 x 82
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\awards_blank[1]
GIF image data, version 89a, 166 x 53
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\backup_status_bg_bottom[1]
GIF image data, version 89a, 210 x 10
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\btn_Upgrade_full_version_down[1]
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 246x43, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\btn_blue_left_d[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 15x53, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\btn_blue_middle_d[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x53, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\btn_blue_middle_h[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x53, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\btn_blue_right_h[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 15x53, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\calculate[1]
GIF image data, version 89a, 19 x 19
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\close_btn[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 30x10, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\cloudBackup_restore[1]
GIF image data, version 89a, 155 x 163
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\cloud_effect[1]
GIF image data, version 89a, 733 x 326
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\emailconfirm[1]
GIF image data, version 89a, 15 x 15
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\error_bg[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x65, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\flags_strip[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 280x11, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\free_space_bg_2[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 79x56, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\getipaddress[1].htm
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\graph_bg_left[1]
PNG image data, 8 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\graph_bg_middle[1]
PNG image data, 1 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\graph_bg_right[1]
PNG image data, 8 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\graph_bg_right[2]
PNG image data, 8 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\home_status_bottom_left_green[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 225x86, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\home_status_bottom_left_red[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 225x86, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\home_status_bottom_middle_green[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x86, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\home_status_bottom_middle_red[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x86, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\home_status_top_left_green[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 225x182, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\home_status_top_left_red[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 225x182, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\home_status_top_left_red[2]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 225x182, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\home_status_top_middle_green[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x182, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\home_status_top_middle_red[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x182, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\home_status_top_middle_red[2]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x182, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\infoBackupPriority[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=3, software=Adobe Photoshop CC 2018 (Macintosh), datetime=2018-06-07T07:02:37+05:30], baseline, precision 8, 12x12, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\inner_page_btn_bg[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x65, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\inner_page_btn_bg[2]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x65, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\js[1].js
ASCII text, with very long lines (4179)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\js[2].js
ASCII text, with very long lines (5955)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\left_black_bg[1]
GIF image data, version 89a, 32 x 32
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\left_mgcp[1]
GIF image data, version 89a, 170 x 59
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\left_tel[1]
GIF image data, version 89a, 165 x 41
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\left_tel[2]
GIF image data, version 89a, 165 x 41
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\link[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 20x20, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\minimize_btn[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 30x10, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\my-account-btn[1].png
PNG image data, 149 x 43, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\new_schedule[1]
GIF image data, version 89a, 19 x 19
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\on[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 48x22, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\play[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\play_disable[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\popper.min[1].js
ASCII text, with very long lines (19015)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\progress_green[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=12, height=18, bps=158, PhotometricIntepretation=RGB, orientation=upper-left, width=1], baseline, precision 8, 1x18, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\progress_yellow[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x18, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\refersh[1]
GIF image data, version 89a, 13 x 16
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\smartBackup_icon[1]
GIF image data, version 89a, 270 x 30
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\smart_bg_bottom_middle[1]
GIF image data, version 89a, 1 x 9
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\smart_bg_bottom_right[1]
GIF image data, version 89a, 9 x 9
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\smart_bg_left_middle[1]
GIF image data, version 89a, 9 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\smart_bg_top_right[1]
GIF image data, version 89a, 9 x 17
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\start-bck-btn[1].png
PNG image data, 139 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\stop[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\stop_disable[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\storgae_bg_frame_right[1]
GIF image data, version 89a, 6 x 97
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\titlebar_bg[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x19, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\titlebar_bg[2]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x19, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\tooltip_bottom_middle[1]
PNG image data, 1 x 8, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\tooltip_right_top[1]
PNG image data, 8 x 8, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\upgrade_bg_left[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 3x187, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\user[1]
GIF image data, version 89a, 15 x 15
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\username_bg_left[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 13x23, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\1x1[1].png
PNG image data, 1 x 1, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\Alert_icon2[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 49x49, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\Expand[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 13x13, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\FullScreenNormal[1]
GIF image data, version 89a, 19 x 15
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\Restore_icon[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 56x38, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\Small_fixerror_dis_middle[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x36, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\Small_fixerror_dis_middle[2]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x36, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\Small_fixerror_n_left[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 12x36, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\Small_fixerror_n_middle[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x36, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\Small_fixerror_n_middle[2]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x36, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\Small_fixerror_n_right[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 33x36, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\afterinstall_ss_windows_notms[1].png
PNG image data, 367 x 290, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\alert_popup[1]
GIF image data, version 89a, 34 x 34
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\awards[1]
GIF image data, version 89a, 166 x 53
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\backup_icon[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 56x38, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\backup_status_bg_bottom[1]
GIF image data, version 89a, 210 x 10
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\backup_status_bg_middle[1]
GIF image data, version 89a, 210 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\btn_Upgrade_full_version_down[1]
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 246x43, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\btn_Upgrade_full_version_down[2]
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 246x43, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\btn_Upgrade_full_version_hover[1]
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 246x43, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\btn_blue_left_d[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 15x53, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\btn_blue_left_h[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 15x53, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\btn_blue_middle_h[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x53, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\btn_blue_right_n[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 15x53, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\circle[1]
GIF image data, version 89a, 79 x 79
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\common[1].js
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\company_logo[1]
GIF image data, version 89a, 158 x 24
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\email[1]
GIF image data, version 89a, 15 x 15
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\error_bg[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x65, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\error_info[1]
GIF image data, version 89a, 15 x 15
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\getipaddress[1].asp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\graph_bg[1]
GIF image data, version 89a, 136 x 135
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\graph_bg_left[1]
PNG image data, 8 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\gray_dummy[1]
PNG image data, 132 x 34, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\home_refersh[1]
GIF image data, version 89a, 16 x 16
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\home_status_bottom_left_green[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 225x86, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\home_status_bottom_left_red[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 225x86, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\home_status_bottom_middle_red[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x86, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\home_status_top_right_green[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 10x182, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\inner_page_btn_bg[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x65, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\inner_tab_right[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 30x28, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\jquery.min[1].js
ASCII text, with very long lines (32038)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\left_black_bg[1]
GIF image data, version 89a, 32 x 32
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\left_mgcp[1]
GIF image data, version 89a, 170 x 59
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\logo[1].png
PNG image data, 259 x 51, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\new_schedule[1]
GIF image data, version 89a, 19 x 19
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\pause_disable[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\play[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\progressBar[1]
GIF image data, version 89a, 729 x 16
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\progress_green[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=12, height=18, bps=158, PhotometricIntepretation=RGB, orientation=upper-left, width=1], baseline, precision 8, 1x18, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\progress_orange[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=12, height=18, bps=158, PhotometricIntepretation=RGB, orientation=upper-left, width=1], baseline, precision 8, 1x18, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\progress_orange[2]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=12, height=18, bps=158, PhotometricIntepretation=RGB, orientation=upper-left, width=1], baseline, precision 8, 1x18, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\progressbar_middle[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x7, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\progressbar_right[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=12, height=20, bps=158, PhotometricIntepretation=RGB, orientation=upper-left, width=2], progressive, precision 8, 1x20, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\smart_bg_bottom_left[1]
GIF image data, version 89a, 9 x 9
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\smart_bg_bottom_middle[1]
GIF image data, version 89a, 1 x 9
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\smart_bg_top_middle[1]
GIF image data, version 89a, 1 x 17
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\smart_bg_top_right[1]
GIF image data, version 89a, 9 x 17
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\storgae_bg_frame_mid[1]
GIF image data, version 89a, 1 x 97
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\sync_pc_enable[1]
GIF image data, version 89a, 16 x 16
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\sync_tick[1]
GIF image data, version 89a, 14 x 14
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\system_tray_disable[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\tooltip_left_bottom[1]
PNG image data, 8 x 8, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\tooltip_top_middle[1]
PNG image data, 1 x 8, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\used_space_bg_2[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=12, height=56, bps=158, PhotometricIntepretation=RGB, orientation=upper-left, width=79], baseline, precision 8, 79x56, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\used_space_bg_2[2]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=12, height=56, bps=158, PhotometricIntepretation=RGB, orientation=upper-left, width=79], baseline, precision 8, 79x56, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\username_bg_middle[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x23, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\username_bg_right[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 13x23, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\Collapse[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 13x13, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\Expand[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 13x13, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\Fix_errors_n_left[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 12x36, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\Fix_errors_n_middle[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x36, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\RB_folder_sync[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 31x35, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\Small_fixerror_dis_right[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 33x36, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\Tick_gray[1]
GIF image data, version 89a, 14 x 14
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\admin[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 15x23, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\after-install[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (955), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\afterinstall[1].aspx
ASCII text, with very long lines (704), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\afterinstall_upload[1].png
PNG image data, 110 x 102, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\alert_popup[1]
GIF image data, version 89a, 34 x 34
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\analytics[1].js
ASCII text, with very long lines (2343)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\backup_status_bg_top[1]
GIF image data, version 89a, 210 x 84
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\bat[1].js
Unicode text, UTF-8 text, with very long lines (46429), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\btn_Upgrade_full_version_normal[1]
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 246x43, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\btn_Upgrade_full_version_normal[2]
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 246x43, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\btn_blue_left_n[1]
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 15x53, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\btn_blue_left_n[2]
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 15x53, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\btn_blue_middle_d[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x53, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\btn_blue_middle_n[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x53, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\btn_blue_right_d[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 15x53, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\btn_blue_right_h[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 15x53, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\calculate[1]
GIF image data, version 89a, 19 x 19
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\close_btn[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 30x10, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\cloudBackup[1]
GIF image data, version 89a, 155 x 163
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\cloudstorage_icon[1]
GIF image data, version 89a, 32 x 32
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\cloudstorage_icon[2]
GIF image data, version 89a, 32 x 32
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\free_space_bg_2[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 79x56, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\getipaddress[1].txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\graph_bg[1]
GIF image data, version 89a, 136 x 135
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\graph_bg_middle[1]
PNG image data, 1 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\home_refersh[1]
GIF image data, version 89a, 16 x 16
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\home_status_bottom_left_red[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 225x86, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\home_status_bottom_middle_green[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x86, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\home_status_bottom_middle_red[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x86, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\home_status_bottom_right_green[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 10x86, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\home_status_top_left_red[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 225x182, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\home_status_top_middle_red[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x182, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\inner_page_btn_bg[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x65, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\inner_page_btn_bg[2]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x65, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\inner_tab_left[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 30x28, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\js[1].js
ASCII text, with very long lines (5955)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\js[2].js
ASCII text, with very long lines (7432)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\login_icon[1].png
PNG image data, 15 x 15, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\logo[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 184x72, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\modal[1].css
ASCII text, with very long lines (598)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\new_schedule[1]
GIF image data, version 89a, 19 x 19
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\password[1]
GIF image data, version 89a, 15 x 15
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\pause[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\play_disable[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\process_done[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 49x48, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\progress_yellow[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x18, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\progressbar_middle[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x7, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\smartBackup_icon[1]
GIF image data, version 89a, 270 x 30
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\smart_bg_bottom_right[1]
GIF image data, version 89a, 9 x 9
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\smart_bg_left_middle[1]
GIF image data, version 89a, 9 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\smart_bg_right_middle[1]
GIF image data, version 89a, 9 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\smart_bg_top_left[1]
GIF image data, version 89a, 9 x 17
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\stop[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\stop_disable[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\storgae_bg_frame_left[1]
GIF image data, version 89a, 6 x 97
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\storgae_bg_frame_left[2]
GIF image data, version 89a, 6 x 97
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\storgae_bg_frame_mid[1]
GIF image data, version 89a, 1 x 97
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\storgae_bg_frame_right[1]
GIF image data, version 89a, 6 x 97
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\sync_cloud_enable[1]
GIF image data, version 89a, 16 x 16
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\system_tray[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\tick[1]
GIF image data, version 89a, 15 x 15
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\tooltip_left_middle[1]
PNG image data, 8 x 1, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\tooltip_right_bottom[1]
PNG image data, 8 x 8, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\trservice[1].js
ASCII text, with very long lines (1676)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\upgrade_bg_right[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 3x187, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\used_space_bg_1[1]
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 79x56, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\wizard_saperator[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 50x221, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Collapse[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 13x13, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Fix_errors_n_right[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 31x36, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Green_strip[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=12, height=49, bps=158, PhotometricIntepretation=RGB, orientation=upper-left, width=1], progressive, precision 8, 1x49, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Small_fixerror_n_left[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 12x36, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\about_mgcp[1]
GIF image data, version 89a, 204 x 43
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\afterinstall[1].htm
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\afterpages[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\arrow[1]
GIF image data, version 89a, 10 x 10
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\awards[1]
GIF image data, version 89a, 166 x 53
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\back_arrow[1]
GIF image data, version 89a, 14 x 14
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\backup_status_bg_middle[1]
GIF image data, version 89a, 210 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\backup_status_bg_top[1]
GIF image data, version 89a, 210 x 84
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\btn_Upgrade_full_version_hover[1]
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 246x43, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\btn_Upgrade_full_version_hover[2]
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 246x43, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\btn_Upgrade_full_version_normal[1]
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 246x43, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\btn_blue_left_h[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 15x53, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\btn_blue_middle_n[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x53, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\btn_blue_right_d[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 15x53, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\btn_blue_right_n[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 15x53, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\calander_icon[1]
GIF image data, version 89a, 20 x 20
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\calculate[1]
GIF image data, version 89a, 19 x 19
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\circle[1]
GIF image data, version 89a, 79 x 79
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\down_arrow[1]
GIF image data, version 89a, 7 x 4
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\free_space_cloud_poup[1].png
PNG image data, 271 x 164, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\getipaddress[1].htm
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\graph_bg[1]
GIF image data, version 89a, 136 x 135
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\home_status_bottom_right_green[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 10x86, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\home_status_bottom_right_red[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 10x86, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\home_status_top_left_green[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 225x182, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\home_status_top_middle_green[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x182, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\home_status_top_right_green[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 10x182, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\home_status_top_right_red[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 10x182, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\inner_page_btn_bg[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x65, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\inner_tab_middle[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 10x84, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\ip[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\load[1]
GIF image data, version 89a, 128 x 128
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\logo[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 184x72, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\os_icon[1].png
PNG image data, 90 x 18, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\pause[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\pause_disable[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\poup_greentick[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 16x16, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\process_done[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 49x48, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\progress_green[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=12, height=18, bps=158, PhotometricIntepretation=RGB, orientation=upper-left, width=1], baseline, precision 8, 1x18, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\progressbar_left[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=12, height=20, bps=158, PhotometricIntepretation=RGB, orientation=upper-left, width=2], progressive, precision 8, 1x20, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\progressbar_middle[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x7, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\refresh_blue[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 16x16, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\share[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 20x20, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\smart_bg_bottom_left[1]
GIF image data, version 89a, 9 x 9
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\smart_bg_right_middle[1]
GIF image data, version 89a, 9 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\smart_bg_top_left[1]
GIF image data, version 89a, 9 x 17
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\smart_bg_top_middle[1]
GIF image data, version 89a, 1 x 17
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\smart_info_icon[1]
GIF image data, version 89a, 12 x 12
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\smart_info_icon[2]
GIF image data, version 89a, 12 x 12
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\sync[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 20x20, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\system_tray[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\system_tray_disable[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\thank_award[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 153x169, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\tick[1]
GIF image data, version 89a, 15 x 15
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\tooltip_left_top[1]
PNG image data, 8 x 8, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\tooltip_right_middle[1]
PNG image data, 8 x 1, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\tracking[1].js
ASCII text, with very long lines (444)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\trackpixel[1].json
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\typography[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\upgrade_bg_middle[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x187, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\used_space_bg_2[1]
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=12, height=56, bps=158, PhotometricIntepretation=RGB, orientation=upper-left, width=79], baseline, precision 8, 79x56, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\verisign[1]
GIF image data, version 89a, 132 x 82
dropped
C:\Users\user\AppData\Local\Temp\is-468CM.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-468CM.tmp\isxdl.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Right Backup.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Apr 18 22:33:17 2024, mtime=Thu Apr 18 22:33:40 2024, atime=Wed Jul 12 16:39:26 2023, length=6809984, window=hide
dropped
C:\Users\user\AppData\Roaming\Systweak\Right Backup\Update.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Systweak\Right Backup\ipdetail.json
JSON data
dropped
C:\Users\user\AppData\Roaming\Systweak\Right Backup\ipini.ini
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Systweak\Right Backup\notifier.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Systweak\Right Backup\ntfrUpdate.ini
ASCII text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 399 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5412.9308.3353.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5412.9308.3353.exe"
malicious
C:\Users\user\AppData\Local\Temp\is-FD3PS.tmp\SecuriteInfo.com.Program.Unwanted.5412.9308.3353.tmp
"C:\Users\user\AppData\Local\Temp\is-FD3PS.tmp\SecuriteInfo.com.Program.Unwanted.5412.9308.3353.tmp" /SL5="$10474,14009033,878592,C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5412.9308.3353.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\System32\taskkill.exe" /f /im "RBClientService.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\System32\taskkill.exe" /f /im "RightBackup.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\System32\taskkill.exe" /f /im "RightBackup.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\System32\taskkill.exe" /f /im "RBClientService.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\System32\taskkill.exe" /f /im "RightBackup.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\System32\taskkill.exe" /f /im "RBClientService.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\System32\taskkill.exe" /f /im "RBNotifier.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\System32\taskkill.exe" /f /im "RightBackup.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\System32\taskkill.exe" /f /im "RBClientService.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\System32\taskkill.exe" /f /im "RightBackup.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\System32\taskkill.exe" /f /im "RBClientService.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\System32\taskkill.exe" /f /im "RightBackup.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\System32\taskkill.exe" /f /im "RBClientService.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\System32\taskkill.exe" /f /im "RBNotifier.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\System32\taskkill.exe" /f /im "RightBackup.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\System32\taskkill.exe" /f /im "RBClientService.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\System32\taskkill.exe" /f /im "RBNotifier.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /delete /tn "NotifierRight Backup" /f
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /delete /tn "NotifierRight Backup_startup" /f
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /delete /tn "Right BackupNotifier" /f
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /delete /tn "Right BackupNotifier_startup" /f
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /delete /tn "Right BackupNotifier_trigger" /f
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /delete /tn "NotifierRight Backup_WD" /f
malicious
C:\Program Files (x86)\Right Backup\RightBackup.exe
"C:\Program Files (x86)\Right Backup\RightBackup.exe" loadvalues
malicious
C:\Program Files (x86)\Right Backup\RightBackup.exe
"C:\Program Files (x86)\Right Backup\RightBackup.exe" install
malicious
C:\Program Files (x86)\Right Backup\RBClientService.exe
"C:\Program Files (x86)\Right Backup\RBClientService.exe"
malicious
C:\Program Files (x86)\Right Backup\RightBackup.exe
"C:\Program Files (x86)\Right Backup\RightBackup.exe" firstinstall -autoscanafterinstall -fireurlsilently
malicious
C:\Program Files (x86)\Right Backup\RBNotifier.exe
"C:\Program Files (x86)\Right Backup\RBNotifier.exe" createschedule -fireurlsilently
malicious
C:\Program Files (x86)\Right Backup\RightBackup.exe
"C:\Program Files (x86)\Right Backup\RightBackup.exe" loadvalues
malicious
C:\Program Files (x86)\Right Backup\RightBackup.exe
"C:\Program Files (x86)\Right Backup\RightBackup.exe" autolaunch
malicious
C:\Program Files (x86)\Right Backup\RBNotifier.exe
"C:\Program Files (x86)\Right Backup\RBNotifier.exe" neweventtrigger
malicious
C:\Program Files (x86)\Right Backup\RBNotifier.exe
"C:\Program Files (x86)\Right Backup\RBNotifier.exe" startup
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
There are 48 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.rightbackup.com/getipaddress.asp/
157.245.131.96
malicious
https://www.rightbackup.com/css/modal.css
157.245.131.96
malicious
http://schemas.datacontract.org/2004/07/RightBackupServicek
unknown
http://www.rightbackup.com/getipaddress.asp8
unknown
https://is.systweak.com/
unknown
http://www.rightbackup.com/afterinstall.aspx?newrb=1&amp&utm_content=AfterInstall&amp&
unknown
http://schemas.datacontract.org/2004/07/RightBackupServiceo
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultL
unknown
http://tempuri.org/IBackupRequest/IsServiceRunningLR
unknown
http://schemas.datacontract.org
unknown
http://schemas.datacontract.org/2004/07/RightBackupServicec
unknown
http://www.rightbackup.com/?
unknown
http://schemas.datacontract.org/2004/07/RightBackupServiced
unknown
http://www.rightbackup.com/afterinstall.aspx?newrb=1&utm_content=AfterInstall&
unknown
http://schemas.datacontract.org/2004/07/RightBackupServiceb
unknown
http://schemas.datacontract.org/2004/07/RightBackupServiceg
unknown
http://schemas.datacontract.org/2004/07/RightBackupServiceh
unknown
https://wkrn9i3f01.execute-api.us-east-1.amazonaws.com/
unknown
http://schemas.datacontract.org/2004/07/RightBackupServicee
unknown
http://schemas.datacontract.org/2004/07/RightBackupServicef
unknown
http://tempuri.org/IRightBackupServer/BeginDeltaFileBackupT
unknown
http://tempuri.org/IRightBackupServer/GetUserDeltaFileSetListResponse
unknown
http://www.rightbackup.com/getipaddress.aspH
unknown
http://tempuri.org/
unknown
http://tempuri.org/IBackupRequest/IsServiceRunningResponseT
unknown
http://tempuri.org/IRightBackupServer/IsWebFileDeltaResponse
unknown
http://tempuri.org/IRightBackupServer/BeginWebFileBackupResponse
unknown
http://tempuri.org/IRightBackupServer/GetUserDeltaFilesListT
unknown
http://tempuri.org/IRightBackupServer/BeginFileBackupResponse
unknown
http://tempuri.org/IRightBackupServer/GetFileSearchByNameResponse
unknown
http://tempuri.org/IRightBackupServer/BeginFileSetBackupT
unknown
http://tempuri.org/IRightBackupServer/SendInvitationResponse
unknown
http://tempuri.org/IRightBackupServer/GetUserSmartDirFilesResponse
unknown
https://www.rightbackup.com/
unknown
http://www.opensource.org/licenses/mit-license.php
unknown
http://schemas.datacontract.org/2004/07/IPCCommunicationd
unknown
http://tempuri.org/IRightBackupServer/GetUserSmartDirDetailsResponse
unknown
http://www.rightbackup.com/Policy#TermsOfUse
unknown
https://www.remobjects.com/ps
unknown
https://www.innosetup.com/
unknown
http://blogs.msdn.com/b/chuckw/archive/2013/09/10/manifest-madness.aspx
unknown
http://tempuri.org/IRightBackupServer/BeginWebFileBackupT
unknown
http://schemas.datacontract.org/2004/07/RightBackupServiceY
unknown
http://tempuri.org/IRightBackupServer/CommitDeltaFileSetBackupT
unknown
http://schemas.datacontract.org/2004/07/RightBackupServiceZ
unknown
http://schemas.datacontract.org/2004/07/RightBackupService_
unknown
http://tempuri.org/IBackupRequest/SmartBackupRunRequestLR
unknown
http://tempuri.org/IRightBackupServer/GetEnumsResponse
unknown
http://schemas.datacontract.org/2004/07/RightBackupServiceT
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.rightbackup.com/Policy#DMCA
unknown
http://track.rightbackup.com/tempfile/
unknown
http://tempuri.org/IBackupRequest/SignOutRequestLR
unknown
http://tempuri.org/IBackupRequest/SmartRestoreRunRequestResponseT
unknown
http://tempuri.org/IRightBackupServer/GetUserMachinesResponse
unknown
https://ws1c.systweak.com/cRightBackupServer
unknown
http://tempuri.org/IBackupRequest/SignOutRequestResponseT
unknown
http://tempuri.org/IRightBackupServer/UpdateMachineInfoT
unknown
http://cdn.systweak.com/setups/df/NDP452.exe
unknown
http://aws.amazon.com/t-
unknown
http://tempuri.org/IRightBackupServer/RegisterUserT
unknown
http://tempuri.org/IRightBackupServer/GetUserSmartBackupDetailsResponse
unknown
http://tempuri.org/IRightBackupServer/SetRestoreLogsResponse
unknown
http://schemas.datacontract.org/2004/07/RightBackupService
unknown
https://trackingapi.systweak.com/trservice.js
23.108.29.119
http://tempuri.org/IRightBackupServer/GetUserConfig2T
unknown
http://tempuri.org/IRightBackupServer/GetDirTreeResponse
unknown
http://www.rightbackup.com/autologin/?
unknown
https://cdn.systweak.com/website/rightbackup/images/afterinstall_upload.png
69.164.42.2
http://schemas.datacontract.org/2004/07/RightBackupService(
unknown
http://schemas.datacontract.org/2004/07/RightBackupService&
unknown
http://crl.ver)
unknown
http://www.rightbackup.com/6http://www.rightbackup.com/
unknown
http://tempuri.org/IRightBackupServer/GetUserSmartFilesListT
unknown
http://ws1c.systweak.com/
unknown
https://www.rightbackup.com/R2
unknown
http://tempuri.org/IRightBackupServer/GetUserSmartDirFilesT
unknown
http://schemas.datacontract.org/2004/07/RightBackupService1
unknown
http://schemas.datacontract.org/2004/07/RightBackupService8
unknown
http://tempuri.org/IRightBackupServer/DeleteFilesFromWebT
unknown
http://tempuri.org/IBackupRequest/
unknown
http://tempuri.org/IRightBackupServer/GetUserSmartFilesListResponse
unknown
http://www.istool.org/isxdl.aspx
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://sqlite.phxsoftware.comn#
unknown
http://tempuri.org/IBackupRequest/CustomBackupStopRequestResponseT
unknown
http://www.rightbackup.com/Policy#PrivacyPolicy
unknown
http://www.google.com/sorry/index?continue=http://www.google.com/&q=EgRRtTk0GO_bhrEGIjBicapeUPPORed_k7SaohNnnaEUzA_nA6L1WELRTq_i0fpuMUuxRz1Zkh1zrha3hF0yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
64.233.177.99
http://schemas.xmlsoap.org/wsdl/
unknown
http://www.rightbackup.com/getipaddress.aspS
unknown
http://tempuri.org/IRightBackupServer/GetUserConfigT
unknown
http://ws1b.systweak.com/
unknown
https://wkrn9i3f01.execute-api.us-east-1.amazonaws.com/ip?ip=81.181.57.52
13.33.4.104
http://y31uv4ra1.vo.llnwd.net/
unknown
http://tempuri.org/IRightBackupServer/DeleteFilesByPathResponse
unknown
http://tempuri.org/IRightBackupServer/CommitDeltaFileSetBackupResponse
unknown
http://tempuri.org/IRightBackupServer/GetAmazonCredentialsResponse
unknown
http://tempuri.org/IRightBackupServer/GetDirTreeByLevelT
unknown
http://tempuri.org/IBackupRequest/CustomRestoreRunRequestLR
unknown
http://aws.amazon.com/s3
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.rightbackup.com
157.245.131.96
malicious
wkrn9i3f01.execute-api.us-east-1.amazonaws.com
13.33.4.104
systweak1.hs.llnwd.net
69.164.42.2
trackingapi.systweak.com
23.108.29.119
googleads.g.doubleclick.net
172.217.215.154
activate123.com
165.227.176.158
cdnjs.cloudflare.com
104.17.24.14
www.google.com
64.233.177.99
s1kegmsmob.execute-api.us-east-1.amazonaws.com
99.84.208.33
cdn.systweak.com
unknown

IPs

IP
Domain
Country
Malicious
157.245.131.96
www.rightbackup.com
United States
malicious
104.17.24.14
cdnjs.cloudflare.com
United States
172.217.215.154
googleads.g.doubleclick.net
United States
69.164.42.2
systweak1.hs.llnwd.net
United States
13.33.4.104
wkrn9i3f01.execute-api.us-east-1.amazonaws.com
United States
99.84.208.33
s1kegmsmob.execute-api.us-east-1.amazonaws.com
United States
64.233.177.99
www.google.com
United States
23.108.29.119
trackingapi.systweak.com
United States
165.227.176.158
activate123.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0
1206
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1
1206
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0
1407
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1
1407
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
1206
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
1407
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup
countrycode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
AFTINSTS
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup
AFTINSTS
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
pxl
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup
pxl
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
instdts
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup
instdts
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
bdts
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup
bdts
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
finalparams
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup
finalparams
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
TELNO
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
isphone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
issilent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
CplURL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Params
utm_source
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Params
utm_campaign
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Params
utm_medium
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Params
affiliateid
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Params
x-at
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Params
TELNO
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
utm_campaign
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
affiliateid
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
x-at
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
IsUpdateBuild
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
utm_installdate
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup
utm_source
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup
utm_medium
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup
TELNO
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup
utm_installdate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
BuyNowURL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
RenewNowURL
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup
InstalledPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
Inno Setup: Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
MajorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
MinorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
EstimatedSize
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\LANG
LangCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup\LANG
LangID
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\LANG
LangID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
afterInstallUrl
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
afterUpdateUrl
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Right Backup\RightBackup.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Right Backup\RightBackup.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
CplUrl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Taskband
FavoritesResolve
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Taskband
Favorites
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Taskband
FavoritesChanges
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
MachineUniqueId
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\-1
OSFriendlyName
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\-1
RAM
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\-1
ProcessorName
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\-1
Model
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\-1
Manufacturer
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\-1
ManufacturerName
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\-1
pcrts
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\-1
pcrt
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\-1
utm_days
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\-1
utm_nag_days
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
AutoBackupLogFiles
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\Service1
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DirectDraw\MostRecentApplication
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DirectDraw\MostRecentApplication
ID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
auslnt
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\-1
auslnt
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
snbs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\rightbackup.com
NumberOfSubdomains
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total
NULL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.rightbackup.com
NULL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\rightbackup.com
Total
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
issilent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total
NULL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.rightbackup.com
NULL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\rightbackup.com
Total
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total
NULL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.rightbackup.com
NULL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\rightbackup.com
Total
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total
NULL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.rightbackup.com
NULL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\rightbackup.com
Total
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
C:\Program Files (x86)\Right Backup\RBNotifier.exe
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\notifier
nst
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup
param
There are 133 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
60D2000
unkown
page readonly
malicious
D92000
unkown
page readonly
malicious
E2000
unkown
page readonly
malicious
7630000
direct allocation
page read and write
malicious
12000
unkown
page readonly
malicious
4AA2000
unkown
page readonly
malicious
13BD4000
trusted library allocation
page read and write
2944000
trusted library allocation
page read and write
593B000
trusted library allocation
page read and write
305D000
trusted library allocation
page read and write
74D0000
trusted library allocation
page execute and read and write
1BED000
trusted library allocation
page execute and read and write
913E000
heap
page read and write
2113DC13000
heap
page read and write
FF2C000
trusted library allocation
page read and write
14290000
trusted library allocation
page read and write
170E000
stack
page read and write
5747000
heap
page read and write
19C2000
trusted library allocation
page read and write
14E1D000
trusted library allocation
page read and write
3355000
trusted library allocation
page read and write
3A1D000
trusted library allocation
page read and write
3600000
heap
page read and write
6D6000
unkown
page read and write
39E9F7C000
stack
page read and write
5C9F000
stack
page read and write
3085000
trusted library allocation
page read and write
32FE000
stack
page read and write
39E7000
trusted library allocation
page read and write
B9DA000
heap
page read and write
B975000
heap
page read and write
81CE000
trusted library allocation
page read and write
14E22000
trusted library allocation
page read and write
6813000
heap
page read and write
3788000
trusted library allocation
page read and write
BA50000
heap
page read and write
6CDA000
trusted library allocation
page read and write
364C000
trusted library allocation
page read and write
851E000
stack
page read and write
5CD0000
heap
page read and write
45C1000
trusted library allocation
page read and write
3354000
trusted library allocation
page read and write
14556000
trusted library allocation
page read and write
2D2E000
trusted library allocation
page read and write
3540000
trusted library allocation
page read and write
3BA6000
trusted library allocation
page read and write
C230000
trusted library allocation
page read and write
3591000
trusted library allocation
page read and write
B680000
trusted library allocation
page read and write
12E5D000
stack
page read and write
2FB6000
trusted library allocation
page read and write
DCF6000
trusted library allocation
page read and write
7490000
direct allocation
page read and write
1C50000
trusted library allocation
page execute and read and write
63E0000
trusted library allocation
page execute and read and write
110F000
stack
page read and write
831E000
stack
page read and write
1BD0000
trusted library allocation
page read and write
1600000
trusted library allocation
page read and write
14B0000
trusted library allocation
page execute and read and write
ACA000
direct allocation
page read and write
76FE000
stack
page read and write
2CB4000
trusted library allocation
page read and write
1595000
heap
page read and write
6805000
trusted library allocation
page read and write
3797000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page execute and read and write
7B72000
unkown
page readonly
371E000
trusted library allocation
page read and write
357A000
trusted library allocation
page read and write
19A0000
trusted library allocation
page read and write
3E18000
trusted library allocation
page read and write
4F9C000
trusted library allocation
page read and write
21143100000
trusted library allocation
page read and write
F2000
unkown
page readonly
448B000
trusted library allocation
page read and write
6D00000
trusted library allocation
page read and write
977000
heap
page read and write
6D9B000
stack
page read and write
4A63000
trusted library allocation
page read and write
61FE000
stack
page read and write
5E3E000
trusted library allocation
page read and write
56A0000
heap
page execute and read and write
6B0000
heap
page read and write
A139000
heap
page read and write
A6CD000
trusted library allocation
page read and write
E047000
heap
page read and write
92F000
heap
page read and write
5A40000
trusted library allocation
page execute
5D2E000
trusted library allocation
page read and write
5B1E000
stack
page read and write
AEA3000
heap
page read and write
112D000
trusted library allocation
page execute and read and write
5900000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page execute and read and write
595C000
stack
page read and write
4A75000
heap
page read and write
35F2000
trusted library allocation
page read and write
8B0000
heap
page read and write
644000
trusted library allocation
page read and write
B982000
heap
page read and write
445F000
trusted library allocation
page read and write
6390000
trusted library allocation
page read and write
64D6000
heap
page read and write
2CAC000
trusted library allocation
page read and write
14135000
trusted library allocation
page read and write
289E000
trusted library allocation
page read and write
926000
heap
page read and write
2113E340000
trusted library allocation
page read and write
4FAF000
stack
page read and write
8174000
trusted library allocation
page read and write
898E000
stack
page read and write
2931000
trusted library allocation
page read and write
3040000
trusted library allocation
page read and write
39FC000
trusted library allocation
page read and write
3BD3000
trusted library allocation
page read and write
E0B8000
heap
page read and write
2113E400000
heap
page read and write
33AB000
trusted library allocation
page read and write
35E7000
trusted library allocation
page read and write
3569000
trusted library allocation
page read and write
5DEE000
trusted library allocation
page read and write
6B80000
trusted library allocation
page execute and read and write
573F000
heap
page read and write
2D3F000
trusted library allocation
page read and write
13A20000
trusted library allocation
page read and write
6472000
heap
page read and write
3620000
trusted library allocation
page read and write
259F000
trusted library allocation
page read and write
506F000
trusted library allocation
page read and write
5D1E000
stack
page read and write
80FD000
stack
page read and write
4D63000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
8467000
trusted library allocation
page read and write
370D000
trusted library allocation
page read and write
466C000
stack
page read and write
520C000
stack
page read and write
130D6000
heap
page read and write
BCCC000
trusted library section
page read and write
8410000
trusted library allocation
page read and write
98E000
heap
page read and write
4D26000
trusted library allocation
page read and write
56D5000
heap
page read and write
D0B000
stack
page read and write
91F0000
heap
page read and write
5105000
trusted library allocation
page read and write
2114351B000
heap
page read and write
5160000
trusted library allocation
page read and write
B390000
trusted library allocation
page read and write
F257000
trusted library allocation
page read and write
14E30000
trusted library allocation
page read and write
2113DC8E000
heap
page read and write
5BC0000
trusted library allocation
page read and write
2F0B000
trusted library allocation
page read and write
728000
heap
page read and write
5B2E000
stack
page read and write
2FA3000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
3570000
trusted library allocation
page read and write
4F79000
trusted library allocation
page read and write
1404C000
trusted library allocation
page read and write
7D5000
heap
page read and write
6928000
trusted library allocation
page read and write
8198000
trusted library allocation
page read and write
3981000
trusted library allocation
page read and write
21143270000
trusted library allocation
page read and write
2F55000
trusted library allocation
page read and write
76BE000
stack
page read and write
A99D000
trusted library allocation
page read and write
57AE000
stack
page read and write
2F79000
heap
page read and write
ADC5000
heap
page read and write
AE8F000
heap
page read and write
268E000
trusted library allocation
page read and write
2E6F000
trusted library allocation
page read and write
6310000
trusted library allocation
page read and write
34B7000
heap
page read and write
119D000
trusted library allocation
page execute and read and write
92F0000
trusted library allocation
page read and write
91DD000
heap
page read and write
1368B000
trusted library allocation
page read and write
A610000
trusted library allocation
page read and write
1476000
trusted library allocation
page execute and read and write
B8FE000
trusted library allocation
page read and write
32F2000
trusted library allocation
page read and write
1B32000
trusted library allocation
page read and write
62BB000
trusted library allocation
page read and write
2609000
trusted library allocation
page read and write
211432F0000
trusted library allocation
page read and write
4F6F000
trusted library allocation
page read and write
59F0000
heap
page read and write
753F000
direct allocation
page read and write
BBF0000
trusted library section
page read and write
65B6000
trusted library allocation
page read and write
532F000
stack
page read and write
C10E000
heap
page read and write
19BD000
trusted library allocation
page execute and read and write
14280000
heap
page read and write
257E000
trusted library allocation
page read and write
56FD000
heap
page read and write
7340000
trusted library allocation
page execute and read and write
138D2000
trusted library allocation
page read and write
3960000
trusted library allocation
page read and write
787000
heap
page read and write
2D5E000
trusted library allocation
page read and write
62EE000
stack
page read and write
397F000
trusted library allocation
page read and write
561E000
stack
page read and write
56E3000
heap
page read and write
AEC5000
heap
page read and write
4F3C000
trusted library allocation
page read and write
5E15000
trusted library allocation
page read and write
8220000
trusted library allocation
page read and write
B2C0000
trusted library allocation
page read and write
6372000
trusted library allocation
page read and write
14444000
trusted library allocation
page read and write
3615000
trusted library allocation
page read and write
5BD2000
trusted library allocation
page read and write
4D50000
trusted library allocation
page execute and read and write
E0CF000
heap
page read and write
56D7000
heap
page read and write
909E000
stack
page read and write
28E9000
trusted library allocation
page read and write
BB19000
heap
page read and write
17E0000
heap
page read and write
7720000
heap
page read and write
534E000
stack
page read and write
517E000
trusted library allocation
page read and write
626B000
stack
page read and write
15000
unkown
page readonly
F35000
heap
page read and write
44DD000
trusted library allocation
page read and write
4916000
trusted library allocation
page read and write
2DF1000
trusted library allocation
page read and write
80B4000
trusted library allocation
page read and write
2734000
trusted library allocation
page read and write
149E8000
trusted library allocation
page read and write
3480000
heap
page read and write
3487000
heap
page read and write
39EA57E000
unkown
page readonly
4AB4000
trusted library allocation
page read and write
C016000
heap
page read and write
7FAA0000
trusted library allocation
page execute and read and write
3709000
direct allocation
page read and write
149CE000
trusted library allocation
page read and write
39EA37E000
unkown
page readonly
269F000
trusted library allocation
page read and write
6380000
heap
page read and write
62D1000
trusted library allocation
page read and write
3051000
trusted library allocation
page read and write
4920000
heap
page read and write
5114000
trusted library allocation
page read and write
4D97000
trusted library allocation
page read and write
5C90000
heap
page read and write
3FDD000
heap
page read and write
2151000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
5092000
trusted library allocation
page read and write
3740000
direct allocation
page read and write
39EA87E000
unkown
page readonly
14B3E000
trusted library allocation
page read and write
2BFD000
trusted library allocation
page read and write
39A2000
trusted library allocation
page read and write
621E000
heap
page read and write
3034000
trusted library allocation
page read and write
572D000
heap
page read and write
6607000
trusted library allocation
page read and write
35B2000
trusted library allocation
page read and write
25EA000
trusted library allocation
page read and write
2691000
trusted library allocation
page read and write
97D000
heap
page read and write
4F39000
trusted library allocation
page read and write
AED9000
heap
page read and write
A6C4000
trusted library allocation
page read and write
5DDE000
trusted library allocation
page read and write
25F9000
trusted library allocation
page read and write
2113DD29000
heap
page read and write
4998000
trusted library allocation
page read and write
C019000
heap
page read and write
5727000
heap
page read and write
779B000
stack
page read and write
B0ED000
stack
page read and write
8127000
trusted library allocation
page read and write
1430D000
trusted library allocation
page read and write
ADB6000
heap
page read and write
3BD2000
trusted library allocation
page read and write
4A22000
trusted library allocation
page read and write
A2DE000
heap
page read and write
53F0000
trusted library allocation
page execute and read and write
9170000
heap
page read and write
3722000
direct allocation
page read and write
3524000
trusted library allocation
page read and write
56DF000
stack
page read and write
277F000
trusted library allocation
page read and write
5DCC000
stack
page read and write
4AAF000
trusted library allocation
page read and write
7F510000
trusted library allocation
page execute and read and write
917D000
heap
page read and write
4D7000
unkown
page readonly
B9F2000
heap
page read and write
6280000
trusted library allocation
page execute and read and write
50C0000
trusted library allocation
page read and write
D80000
heap
page read and write
50DE000
trusted library allocation
page read and write
2665000
direct allocation
page read and write
13C30000
trusted library allocation
page read and write
56D2000
heap
page read and write
38E7000
trusted library allocation
page read and write
7CFE000
stack
page read and write
814A000
trusted library allocation
page read and write
66FC000
stack
page read and write
7EF0000
trusted library allocation
page read and write
627000
heap
page read and write
AD0000
trusted library allocation
page read and write
BE10000
trusted library allocation
page execute and read and write
78C0000
trusted library section
page readonly
8120000
trusted library allocation
page read and write
644C000
stack
page read and write
62BE000
trusted library allocation
page read and write
273C000
trusted library allocation
page read and write
6FC000
unkown
page readonly
50C9000
trusted library allocation
page read and write
1630000
heap
page read and write
1CD7000
heap
page read and write
8F7000
heap
page read and write
1326000
trusted library allocation
page execute and read and write
B9D4000
heap
page read and write
4CD0000
trusted library allocation
page execute and read and write
3525000
trusted library allocation
page read and write
2620000
trusted library allocation
page read and write
3441000
trusted library allocation
page read and write
211434BB000
heap
page read and write
2EB4000
trusted library allocation
page read and write
6330000
trusted library allocation
page read and write
5A30000
heap
page read and write
8173000
trusted library allocation
page read and write
14AA0000
trusted library allocation
page read and write
3602000
trusted library allocation
page read and write
A78E000
stack
page read and write
94D000
heap
page read and write
1432000
trusted library allocation
page read and write
3C25000
trusted library allocation
page read and write
6ABA000
trusted library allocation
page read and write
4775000
trusted library allocation
page read and write
2E7A000
trusted library allocation
page read and write
3760000
trusted library allocation
page read and write
4B44000
unkown
page readonly
B68D000
trusted library allocation
page read and write
5B70000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
A00000
direct allocation
page read and write
1C2B000
trusted library allocation
page execute and read and write
2F72000
trusted library allocation
page read and write
1CD0000
heap
page read and write
32F0000
trusted library allocation
page read and write
56C0000
trusted library allocation
page read and write
A2F3000
heap
page read and write
21143513000
heap
page read and write
3FD0000
heap
page read and write
3EBA000
trusted library allocation
page read and write
56D3000
heap
page read and write
77E0000
heap
page read and write
39EB57B000
stack
page read and write
5C4C000
stack
page read and write
25F7000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
8193000
trusted library allocation
page read and write
338B000
trusted library allocation
page read and write
3E39000
trusted library allocation
page read and write
8367000
trusted library allocation
page read and write
1BA0000
heap
page read and write
662000
trusted library allocation
page read and write
3666000
trusted library allocation
page read and write
7360000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page read and write
E15B000
heap
page read and write
642C000
stack
page read and write
A246000
heap
page read and write
330F000
trusted library allocation
page read and write
4A4F000
trusted library allocation
page read and write
17F9000
heap
page read and write
7F450000
trusted library allocation
page execute and read and write
3C48000
trusted library allocation
page read and write
B940000
heap
page read and write
819C000
trusted library allocation
page read and write
AD8000
direct allocation
page read and write
1394C000
trusted library allocation
page read and write
A44E000
stack
page read and write
516B000
trusted library allocation
page read and write
2C80000
trusted library allocation
page read and write
130B8000
heap
page read and write
1487000
trusted library allocation
page execute and read and write
25B2000
trusted library allocation
page read and write
B400000
trusted library allocation
page read and write
BF10000
heap
page read and write
91D5000
heap
page read and write
3795000
trusted library allocation
page read and write
39EAD7E000
stack
page read and write
2560000
heap
page execute and read and write
595D000
trusted library allocation
page read and write
4A65000
trusted library allocation
page read and write
B420000
trusted library allocation
page read and write
5690000
trusted library allocation
page read and write
3413000
heap
page read and write
33C5000
trusted library allocation
page read and write
4CA000
unkown
page readonly
185000
heap
page read and write
827E000
trusted library allocation
page read and write
8670000
heap
page read and write
2FC0000
trusted library allocation
page read and write
2113E415000
heap
page read and write
1465D000
trusted library allocation
page read and write
8474000
trusted library allocation
page read and write
6ACC000
trusted library allocation
page read and write
2C7E000
trusted library allocation
page read and write
15F0000
heap
page read and write
2FBA000
trusted library allocation
page read and write
1358A000
heap
page read and write
B646000
trusted library allocation
page read and write
6AAD000
trusted library allocation
page read and write
305B000
trusted library allocation
page read and write
6900000
trusted library allocation
page read and write
732000
trusted library allocation
page read and write
73A000
trusted library allocation
page execute and read and write
39EAF7E000
stack
page read and write
39EBBFE000
stack
page read and write
AEC3000
heap
page read and write
9A9000
heap
page read and write
3CB7000
trusted library allocation
page read and write
4F85000
trusted library allocation
page read and write
6327000
trusted library allocation
page read and write
25E0000
heap
page read and write
2C45000
trusted library allocation
page read and write
2992000
direct allocation
page read and write
A2A0000
trusted library section
page read and write
6298000
trusted library allocation
page read and write
F230000
heap
page read and write
A159000
heap
page read and write
356E000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page execute and read and write
2B70000
trusted library allocation
page read and write
5BA0000
trusted library allocation
page read and write
BF20000
heap
page read and write
AD24000
heap
page read and write
149C0000
trusted library allocation
page read and write
5085000
trusted library allocation
page read and write
56FE000
heap
page read and write
2114345D000
heap
page read and write
132BD000
heap
page read and write
1387E000
stack
page read and write
6AB2000
trusted library allocation
page read and write
3F02000
trusted library allocation
page read and write
28A1000
trusted library allocation
page read and write
E054000
heap
page read and write
3701000
direct allocation
page read and write
178A000
heap
page read and write
2C48000
trusted library allocation
page read and write
2B6A000
trusted library allocation
page read and write
55A0000
heap
page read and write
62B1000
heap
page read and write
25EC000
trusted library allocation
page read and write
3378000
trusted library allocation
page read and write
2113DC43000
heap
page read and write
62C8000
trusted library allocation
page read and write
5E30000
trusted library allocation
page read and write
16E7000
heap
page read and write
6925000
trusted library allocation
page read and write
574F000
heap
page read and write
33A7000
trusted library allocation
page read and write
26A5000
trusted library allocation
page read and write
26BA000
trusted library allocation
page read and write
2113DC95000
heap
page read and write
142F9000
trusted library allocation
page read and write
397D000
trusted library allocation
page read and write
572E000
stack
page read and write
87CE000
stack
page read and write
32D9000
trusted library allocation
page read and write
1985000
heap
page read and write
131EF000
heap
page read and write
13FA3000
trusted library allocation
page read and write
4BCC000
stack
page read and write
4D80000
trusted library allocation
page read and write
816D000
trusted library allocation
page read and write
920A000
heap
page read and write
1180000
trusted library allocation
page read and write
7705000
trusted library allocation
page read and write
987000
heap
page read and write
113E000
stack
page read and write
2BA2000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
2697000
direct allocation
page read and write
6F6E000
heap
page read and write
13C48000
trusted library allocation
page read and write
2BDC000
trusted library allocation
page read and write
65A4000
trusted library allocation
page read and write
4C35000
trusted library allocation
page read and write
6590000
trusted library allocation
page read and write
184E000
stack
page read and write
62B2000
trusted library allocation
page read and write
100D3000
unkown
page read and write
E036000
heap
page read and write
6430000
heap
page read and write
3950000
heap
page read and write
118D000
trusted library allocation
page execute and read and write
7C7000
heap
page read and write
934000
heap
page read and write
AAF000
stack
page read and write
14551000
trusted library allocation
page read and write
62EF000
heap
page read and write
196E000
stack
page read and write
6D09000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
5E32000
trusted library allocation
page read and write
4F49000
trusted library allocation
page read and write
50BE000
stack
page read and write
62B4000
trusted library allocation
page read and write
2FA7000
trusted library allocation
page read and write
17D9000
heap
page read and write
62F0000
trusted library allocation
page read and write
65D0000
trusted library allocation
page read and write
2171000
trusted library allocation
page read and write
3B61000
trusted library allocation
page read and write
1BE4000
trusted library allocation
page read and write
620000
heap
page read and write
5B9E000
stack
page read and write
7960000
heap
page read and write
5620000
heap
page execute and read and write
2E11000
trusted library allocation
page read and write
1B36000
trusted library allocation
page execute and read and write
405F000
stack
page read and write
21143459000
heap
page read and write
3309000
heap
page read and write
67B000
trusted library allocation
page execute and read and write
1800000
heap
page read and write
14E38000
trusted library allocation
page read and write
65B1000
trusted library allocation
page read and write
4A8B000
trusted library allocation
page read and write
597F000
trusted library allocation
page read and write
1317F000
heap
page read and write
605E000
stack
page read and write
14AB5000
trusted library allocation
page read and write
4F73000
trusted library allocation
page read and write
32DB000
trusted library allocation
page read and write
9A7000
heap
page read and write
5C8E000
stack
page read and write
3601000
trusted library allocation
page read and write
9EF000
stack
page read and write
90E0000
trusted library allocation
page read and write
192C000
heap
page read and write
850000
heap
page read and write
66AD000
stack
page read and write
5CC0000
trusted library section
page readonly
A6B0000
trusted library allocation
page read and write
3780000
trusted library allocation
page read and write
5F30000
heap
page read and write
65E0000
trusted library allocation
page read and write
967000
heap
page read and write
E150000
heap
page read and write
57BD000
stack
page read and write
35C1000
trusted library allocation
page read and write
13FAA000
trusted library allocation
page read and write
81A1000
trusted library allocation
page read and write
39D7000
trusted library allocation
page read and write
2C91000
trusted library allocation
page read and write
3707000
trusted library allocation
page read and write
62BD000
heap
page read and write
14039000
trusted library allocation
page read and write
2D50000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
100D3000
unkown
page read and write
8256000
trusted library allocation
page read and write
2114344D000
heap
page read and write
6AAA000
trusted library allocation
page read and write
1610000
heap
page read and write
7FA1000
trusted library allocation
page read and write
2F7D000
heap
page read and write
3571000
trusted library allocation
page read and write
91EC000
heap
page read and write
BCEF000
heap
page read and write
8BD000
heap
page read and write
3A17000
trusted library allocation
page read and write
91E1000
heap
page read and write
7270000
trusted library allocation
page read and write
7EB1000
trusted library allocation
page read and write
DE70000
trusted library allocation
page execute and read and write
65C0000
trusted library allocation
page read and write
194E000
stack
page read and write
F2DB000
trusted library allocation
page read and write
36A2000
trusted library allocation
page read and write
3380000
trusted library allocation
page read and write
9250000
trusted library section
page readonly
5400000
heap
page read and write
28C1000
trusted library allocation
page read and write
2C8D000
trusted library allocation
page read and write
34B5000
heap
page read and write
35E5000
trusted library allocation
page read and write
13953000
trusted library allocation
page read and write
39EB179000
stack
page read and write
5731000
heap
page read and write
142C0000
trusted library allocation
page read and write
3DAD000
stack
page read and write
39D1000
trusted library allocation
page read and write
11A0000
heap
page read and write
2C10000
trusted library allocation
page read and write
14430000
trusted library allocation
page read and write
138C6000
trusted library allocation
page read and write
28B6000
trusted library allocation
page read and write
3781000
trusted library allocation
page read and write
2BDA000
trusted library allocation
page read and write
14A04000
trusted library allocation
page read and write
62C4000
trusted library allocation
page read and write
211431B0000
trusted library allocation
page read and write
7393000
trusted library allocation
page read and write
384D000
stack
page read and write
F30000
heap
page read and write
A55C000
stack
page read and write
53E0000
heap
page read and write
1484000
trusted library allocation
page read and write
9410000
heap
page read and write
3578000
trusted library allocation
page read and write
2D67000
trusted library allocation
page read and write
BCEE000
trusted library section
page read and write
9167000
heap
page read and write
F290000
trusted library allocation
page read and write
16B0000
heap
page read and write
6397000
trusted library allocation
page read and write
2C99000
trusted library allocation
page read and write
11F3000
trusted library allocation
page execute and read and write
1710000
heap
page read and write
1332C000
heap
page read and write
2E95000
trusted library allocation
page read and write
6A20000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
F303000
trusted library allocation
page read and write
13393000
heap
page read and write
5E20000
trusted library allocation
page read and write
13724000
trusted library allocation
page read and write
ADEE000
heap
page read and write
54CB000
heap
page read and write
2F81000
trusted library allocation
page read and write
1200000
heap
page read and write
5720000
heap
page read and write
114A000
trusted library allocation
page execute and read and write
5DC0000
trusted library allocation
page read and write
3523000
trusted library allocation
page read and write
4A16000
trusted library allocation
page read and write
E0C7000
heap
page read and write
915F000
heap
page read and write
28DA000
trusted library allocation
page read and write
287E000
trusted library allocation
page read and write
2560000
direct allocation
page read and write
395A000
trusted library allocation
page read and write
E2C0000
trusted library allocation
page execute and read and write
967000
heap
page read and write
585D000
stack
page read and write
26B6000
trusted library allocation
page read and write
3983000
trusted library allocation
page read and write
329B000
trusted library allocation
page execute and read and write
498B000
trusted library allocation
page read and write
3A06000
trusted library allocation
page read and write
37C5000
trusted library allocation
page read and write
21143110000
trusted library allocation
page read and write
2578000
trusted library allocation
page read and write
AFB0000
trusted library allocation
page read and write
3BF2000
trusted library allocation
page read and write
A2B5000
heap
page read and write
400000
unkown
page readonly
138A0000
trusted library allocation
page execute
14A20000
trusted library allocation
page read and write
918A000
heap
page read and write
91B8000
heap
page read and write
5100000
trusted library allocation
page read and write
710000
trusted library allocation
page read and write
2BE7000
trusted library allocation
page read and write
149F5000
trusted library allocation
page read and write
90C8000
trusted library allocation
page read and write
4150000
trusted library allocation
page read and write
F22A000
stack
page read and write
2658000
trusted library allocation
page read and write
AF50000
trusted library allocation
page read and write
333B000
stack
page read and write
80F7000
trusted library allocation
page read and write
192F000
stack
page read and write
2113E502000
heap
page read and write
4019000
heap
page read and write
643000
trusted library allocation
page execute and read and write
FF6C000
trusted library allocation
page read and write
A30C000
heap
page read and write
358E000
stack
page read and write
5FE0000
trusted library allocation
page execute and read and write
306A000
trusted library allocation
page read and write
DF0000
heap
page read and write
C858000
heap
page read and write
540000
heap
page read and write
2B50000
heap
page execute and read and write
149B000
stack
page read and write
C013000
heap
page read and write
8148000
trusted library allocation
page read and write
56FD000
heap
page read and write
1990000
heap
page read and write
1250000
heap
page read and write
3297000
trusted library allocation
page execute and read and write
DA0000
heap
page read and write
5561000
trusted library allocation
page read and write
606A000
trusted library allocation
page read and write
39E5000
trusted library allocation
page read and write
3BF5000
trusted library allocation
page read and write
6A30000
trusted library allocation
page execute and read and write
34B0000
direct allocation
page read and write
1590000
heap
page read and write
5070000
trusted library allocation
page read and write
690000
heap
page read and write
1184000
trusted library allocation
page read and write
1365C000
heap
page read and write
14091000
trusted library allocation
page read and write
13C55000
trusted library allocation
page read and write
35D3000
trusted library allocation
page read and write
145B0000
trusted library allocation
page read and write
5A60000
trusted library allocation
page read and write
822C000
trusted library allocation
page read and write
275B000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page execute and read and write
67AC000
heap
page read and write
BD0B000
heap
page read and write
14E20000
trusted library allocation
page read and write
7E91000
trusted library allocation
page read and write
775E000
stack
page read and write
832B000
trusted library allocation
page read and write
6D05000
trusted library allocation
page read and write
15FA000
trusted library allocation
page read and write
3968000
heap
page read and write
3DB6000
trusted library allocation
page read and write
91F6000
heap
page read and write
14660000
trusted library allocation
page read and write
826E000
trusted library allocation
page read and write
3BE4000
trusted library allocation
page read and write
6440000
heap
page read and write
357E000
stack
page read and write
9100000
trusted library allocation
page read and write
5E26000
trusted library allocation
page read and write
8419000
trusted library allocation
page read and write
BF52000
heap
page read and write
E90E000
stack
page read and write
1AD0000
heap
page read and write
6D20000
trusted library allocation
page read and write
3604000
trusted library allocation
page read and write
669C000
stack
page read and write
13A40000
trusted library allocation
page read and write
1456D000
trusted library allocation
page read and write
5E30000
trusted library allocation
page read and write
1ADF000
stack
page read and write
7B40000
trusted library allocation
page execute and read and write
A136000
heap
page read and write
A6D0000
trusted library allocation
page read and write
B380000
trusted library allocation
page execute and read and write
A0D4000
heap
page read and write
890E000
stack
page read and write
355B000
trusted library allocation
page read and write
7FB30000
direct allocation
page read and write
14030000
trusted library allocation
page read and write
62D4000
trusted library allocation
page read and write
58BE000
stack
page read and write
962000
heap
page read and write
2114342C000
heap
page read and write
1802000
heap
page read and write
2BF9000
trusted library allocation
page read and write
F253000
trusted library allocation
page read and write
356C000
trusted library allocation
page read and write
1009F000
unkown
page readonly
3489000
heap
page read and write
14DFA000
trusted library allocation
page read and write
3490000
direct allocation
page read and write
6B35000
trusted library allocation
page read and write
6A80000
heap
page read and write
5195000
trusted library allocation
page read and write
14D60000
trusted library allocation
page read and write
2D41000
trusted library allocation
page read and write
767E000
stack
page read and write
5BDA000
trusted library allocation
page read and write
11A8000
heap
page read and write
135C5000
heap
page read and write
39EAC7E000
unkown
page readonly
366A000
trusted library allocation
page read and write
622E000
heap
page read and write
6240000
trusted library allocation
page read and write
6374000
trusted library allocation
page read and write
6580000
trusted library allocation
page execute and read and write
303C000
trusted library allocation
page read and write
90B0000
trusted library allocation
page execute and read and write
93000
stack
page read and write
8340000
trusted library allocation
page read and write
549E000
stack
page read and write
35B7000
trusted library allocation
page read and write
3538000
trusted library allocation
page read and write
7FE1E000
direct allocation
page read and write
21143260000
trusted library allocation
page read and write
875E000
stack
page read and write
5CDE000
stack
page read and write
6AE7000
trusted library allocation
page read and write
7EAA000
trusted library allocation
page read and write
2641000
direct allocation
page read and write
6AF5000
heap
page read and write
1B2D000
trusted library allocation
page execute and read and write
7E7D000
stack
page read and write
3F30000
heap
page read and write
28FA000
trusted library allocation
page read and write
3390000
heap
page execute and read and write
19A4000
trusted library allocation
page read and write
4CFD000
stack
page read and write
14E4B000
trusted library allocation
page read and write
509C000
trusted library allocation
page read and write
1257000
heap
page read and write
35B0000
trusted library allocation
page read and write
691C000
stack
page read and write
625000
heap
page read and write
14327000
heap
page read and write
2673000
direct allocation
page read and write
616E000
stack
page read and write
354D000
trusted library allocation
page read and write
A510000
trusted library allocation
page read and write
704000
trusted library allocation
page read and write
1B10000
trusted library allocation
page read and write
2113DBB0000
heap
page read and write
17E5000
heap
page read and write
25B6000
trusted library allocation
page read and write
643F000
stack
page read and write
5550000
trusted library allocation
page execute and read and write
3564000
trusted library allocation
page read and write
145AE000
trusted library allocation
page read and write
39E938B000
stack
page read and write
56D9000
heap
page read and write
A5B0000
trusted library allocation
page execute and read and write
2D2C000
trusted library allocation
page read and write
4DAD000
trusted library allocation
page read and write
4E2F000
stack
page read and write
134C4000
heap
page read and write
32CF000
trusted library allocation
page read and write
3DAC000
trusted library allocation
page read and write
304F000
trusted library allocation
page read and write
6EB0000
heap
page read and write
58BE000
trusted library allocation
page read and write
BB1D000
heap
page read and write
AEA6000
heap
page read and write
2113DC67000
heap
page read and write
1C12000
trusted library allocation
page read and write
3C35000
trusted library allocation
page read and write
679C000
stack
page read and write
2F24000
trusted library allocation
page read and write
A161000
heap
page read and write
C19C000
stack
page read and write
12000
unkown
page readonly
1CB0000
trusted library allocation
page read and write
1120000
trusted library allocation
page read and write
3121000
trusted library allocation
page read and write
5B40000
heap
page execute and read and write
62B6000
trusted library allocation
page read and write
125D000
heap
page read and write
36EC000
trusted library allocation
page read and write
26BC000
trusted library allocation
page read and write
2B79000
trusted library allocation
page read and write
54F9000
trusted library allocation
page read and write
303A000
trusted library allocation
page read and write
7350000
heap
page read and write
B9D7000
heap
page read and write
BF22000
heap
page read and write
3CAC000
stack
page read and write
11F4000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page execute and read and write
6F0000
trusted library allocation
page read and write
4200000
remote allocation
page read and write
AE87000
heap
page read and write
33CA000
trusted library allocation
page read and write
575C000
stack
page read and write
32F5000
trusted library allocation
page execute and read and write
3460000
trusted library allocation
page read and write
65E5000
trusted library allocation
page read and write
14A11000
trusted library allocation
page read and write
61AD000
stack
page read and write
5D4C000
stack
page read and write
2F8E000
trusted library allocation
page read and write
8181000
trusted library allocation
page read and write
353E000
trusted library allocation
page read and write
39EB67E000
unkown
page readonly
32EA000
trusted library allocation
page read and write
1170000
trusted library allocation
page read and write
5174000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
E1F0000
trusted library allocation
page read and write
990000
heap
page read and write
6350000
trusted library allocation
page read and write
3BC7000
trusted library allocation
page read and write
A7B0000
heap
page read and write
32B0000
trusted library allocation
page read and write
3950000
trusted library allocation
page read and write
AE0000
trusted library allocation
page read and write
4A50000
trusted library allocation
page execute and read and write
32D3000
trusted library allocation
page read and write
3555000
trusted library allocation
page read and write
A610000
trusted library allocation
page read and write
4B7000
unkown
page write copy
A220000
heap
page read and write
3552000
trusted library allocation
page read and write
10F0000
trusted library allocation
page read and write
821E000
stack
page read and write
3C6F000
stack
page read and write
21143190000
trusted library allocation
page read and write
6C7000
unkown
page read and write
1890000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
14540000
trusted library allocation
page read and write
5480000
trusted library allocation
page read and write
39EBC7E000
unkown
page readonly
AEF000
direct allocation
page read and write
35CE000
trusted library allocation
page read and write
39EAB7E000
unkown
page readonly
F2C8000
trusted library allocation
page read and write
CA50000
trusted library allocation
page read and write
71D000
trusted library allocation
page execute and read and write
76E0000
trusted library allocation
page execute and read and write
44CB000
trusted library allocation
page read and write
B686000
trusted library allocation
page read and write
DB5000
heap
page read and write
3295000
trusted library allocation
page execute and read and write
992000
heap
page read and write
12BB000
stack
page read and write
3CF9000
trusted library allocation
page read and write
46A1000
trusted library allocation
page read and write
D70000
heap
page read and write
9A0000
heap
page read and write
1C03000
trusted library allocation
page read and write
39EAE7E000
unkown
page readonly
2802000
trusted library allocation
page read and write
11D6000
heap
page read and write
39EA7FE000
stack
page read and write
6080000
trusted library allocation
page read and write
13F90000
trusted library allocation
page read and write
A8BE000
stack
page read and write
7470000
trusted library allocation
page read and write
5110000
heap
page read and write
834000
heap
page read and write
32EE000
trusted library allocation
page read and write
56A0000
heap
page read and write
8175000
trusted library allocation
page read and write
21143490000
heap
page read and write
BD11000
heap
page read and write
4DD3000
trusted library allocation
page read and write
F2DD000
trusted library allocation
page read and write
AE10000
heap
page read and write
816F000
trusted library allocation
page read and write
644E000
stack
page read and write
2EF7000
trusted library allocation
page read and write
AF80000
trusted library allocation
page execute and read and write
C850000
heap
page read and write
2D24000
trusted library allocation
page read and write
1760000
heap
page read and write
541C000
heap
page read and write
9165000
heap
page read and write
7E9B000
trusted library allocation
page read and write
AF0000
heap
page read and write
2920000
trusted library allocation
page read and write
14D9000
trusted library allocation
page read and write
2D64000
trusted library allocation
page read and write
50EF000
trusted library allocation
page read and write
5A9E000
stack
page read and write
BB0F000
heap
page read and write
6231000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
845C000
trusted library allocation
page read and write
3371000
trusted library allocation
page read and write
77E000
heap
page read and write
1C98000
heap
page read and write
39EA4FE000
stack
page read and write
757E000
stack
page read and write
1200000
trusted library allocation
page execute and read and write
FF83000
trusted library allocation
page read and write
FF88000
trusted library allocation
page read and write
6AD7000
trusted library allocation
page read and write
6B47000
trusted library allocation
page read and write
5E2D000
trusted library allocation
page read and write
6910000
heap
page read and write
9192000
heap
page read and write
27E1000
trusted library allocation
page read and write
14148000
trusted library allocation
page read and write
8170000
trusted library allocation
page read and write
3FAA000
heap
page read and write
3309000
trusted library allocation
page read and write
5181000
trusted library allocation
page read and write
17D7000
heap
page read and write
1796000
heap
page read and write
13613000
heap
page read and write
14CB000
trusted library allocation
page read and write
5709000
heap
page read and write
6A7B000
trusted library allocation
page read and write
510E000
trusted library allocation
page read and write
198E000
stack
page read and write
6F60000
heap
page read and write
45C8000
trusted library allocation
page read and write
8206000
trusted library allocation
page read and write
BB88000
heap
page read and write
603E000
stack
page read and write
13396000
heap
page read and write
C072000
heap
page read and write
C025000
heap
page read and write
4C2000
unkown
page write copy
6D50000
heap
page read and write
51AB000
trusted library allocation
page read and write
5A70000
heap
page read and write
64EA000
heap
page read and write
3681000
trusted library allocation
page read and write
21143260000
trusted library allocation
page read and write
39FA000
trusted library allocation
page read and write
6AA6000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
83DE000
stack
page read and write
B0A0000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
2669000
trusted library allocation
page read and write
58B6000
trusted library allocation
page read and write
2113F100000
trusted library allocation
page read and write
3D6E000
trusted library allocation
page read and write
50D0000
heap
page execute and read and write
2B87000
trusted library allocation
page read and write
2F9B000
trusted library allocation
page read and write
91CD000
heap
page read and write
A26E000
heap
page read and write
14D54000
trusted library allocation
page read and write
1B9E000
stack
page read and write
4CF0000
trusted library allocation
page read and write
5D3E000
trusted library allocation
page read and write
54DE000
stack
page read and write
37BA000
trusted library allocation
page read and write
2E89000
trusted library allocation
page read and write
2B76000
trusted library allocation
page read and write
260F000
trusted library allocation
page read and write
5189000
trusted library allocation
page read and write
14F30000
trusted library allocation
page read and write
4A40000
trusted library allocation
page read and write
394F000
stack
page read and write
6242000
heap
page read and write
6F0000
heap
page read and write
139B000
trusted library allocation
page read and write
2113DBD0000
heap
page read and write
2770000
trusted library allocation
page read and write
145AB000
trusted library allocation
page read and write
81A7000
trusted library allocation
page read and write
2684000
trusted library allocation
page read and write
35CC000
trusted library allocation
page read and write
E27E000
stack
page read and write
3645000
trusted library allocation
page read and write
A2D2000
heap
page read and write
81A0000
trusted library allocation
page read and write
980000
heap
page read and write
B04000
direct allocation
page read and write
1C10000
trusted library allocation
page read and write
7260000
trusted library allocation
page read and write
8163000
trusted library allocation
page read and write
135A7000
heap
page read and write
629E000
trusted library allocation
page read and write
2689000
direct allocation
page read and write
63F0000
heap
page read and write
62D1000
trusted library allocation
page read and write
76C0000
trusted library allocation
page read and write
4120000
trusted library allocation
page execute and read and write
26E0000
heap
page read and write
A148000
heap
page read and write
29A0000
direct allocation
page read and write
2C0A000
trusted library allocation
page read and write
5E50000
heap
page execute and read and write
DF8000
stack
page read and write
76D0000
trusted library allocation
page execute and read and write
5914000
trusted library allocation
page read and write
11FC000
stack
page read and write
123A000
heap
page read and write
32FE000
stack
page read and write
9180000
heap
page read and write
5E3E000
trusted library allocation
page read and write
3A41000
trusted library allocation
page read and write
5BB0000
heap
page read and write
69A0000
trusted library allocation
page execute and read and write
6950000
trusted library allocation
page read and write
6BBC000
heap
page read and write
4FE0000
trusted library allocation
page read and write
135D9000
heap
page read and write
35F1000
trusted library allocation
page read and write
91F4000
heap
page read and write
947000
heap
page read and write
5D4E000
stack
page read and write
81B2000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
1C16000
trusted library allocation
page execute and read and write
630000
trusted library allocation
page read and write
2D75000
trusted library allocation
page read and write
3658000
trusted library allocation
page read and write
1338F000
heap
page read and write
356E000
trusted library allocation
page read and write
6400000
trusted library allocation
page execute and read and write
1730000
heap
page read and write
738D000
stack
page read and write
9EF000
stack
page read and write
1371F000
stack
page read and write
14042000
trusted library allocation
page read and write
266D000
trusted library allocation
page read and write
5178000
trusted library allocation
page read and write
E034000
heap
page read and write
DE0000
unkown
page readonly
38CD000
trusted library allocation
page read and write
13175000
heap
page read and write
3674000
trusted library allocation
page read and write
336E000
trusted library allocation
page read and write
1767000
heap
page read and write
1355A000
heap
page read and write
13146000
heap
page read and write
2B89000
trusted library allocation
page read and write
33CE000
trusted library allocation
page read and write
4A70000
heap
page read and write
35EB000
trusted library allocation
page read and write
BF34000
heap
page read and write
6D1000
unkown
page read and write
BD70000
trusted library section
page read and write
4C81000
trusted library allocation
page read and write
15DF000
stack
page read and write
3392000
trusted library allocation
page read and write
2F28000
trusted library allocation
page read and write
74D7000
direct allocation
page read and write
317F000
trusted library allocation
page read and write
3F5A000
heap
page read and write
335E000
stack
page read and write
4A93000
heap
page read and write
211432E0000
trusted library allocation
page read and write
5E50000
trusted library allocation
page read and write
5B86000
heap
page execute and read and write
5709000
heap
page read and write
9A5000
heap
page read and write
75C0000
trusted library allocation
page execute and read and write
AF6000
direct allocation
page read and write
30F0000
trusted library allocation
page read and write
6770000
trusted library allocation
page execute and read and write
13D9000
heap
page read and write
B396000
trusted library allocation
page read and write
5700000
heap
page read and write
8245000
trusted library allocation
page read and write
1336F000
heap
page read and write
3BF0000
trusted library allocation
page read and write
275D000
trusted library allocation
page read and write
2F3C000
stack
page read and write
317C000
trusted library allocation
page read and write
7370000
trusted library allocation
page read and write
1110000
heap
page execute and read and write
3606000
trusted library allocation
page read and write
3C9B000
trusted library allocation
page read and write
14DE000
stack
page read and write
5DDD000
stack
page read and write
6305000
trusted library allocation
page read and write
6BB0000
heap
page read and write
6E9D000
stack
page read and write
3BF9000
trusted library allocation
page read and write
6960000
trusted library allocation
page execute and read and write
8014000
trusted library allocation
page read and write
180C000
heap
page read and write
635E000
trusted library allocation
page read and write
5E0E000
trusted library allocation
page read and write
2113E350000
trusted library section
page read and write
838C000
trusted library allocation
page read and write
39EA3FE000
stack
page read and write
2626000
trusted library allocation
page read and write
333F000
trusted library allocation
page read and write
4A11000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
4A39000
trusted library allocation
page read and write
4F45000
trusted library allocation
page read and write
5962000
trusted library allocation
page read and write
1B40000
heap
page read and write
6D1F000
stack
page read and write
49F4000
trusted library allocation
page read and write
4C8D000
trusted library allocation
page read and write
55DE000
stack
page read and write
647A000
trusted library allocation
page read and write
6210000
trusted library allocation
page read and write
4A61000
trusted library allocation
page read and write
110000
unkown
page readonly
265D000
direct allocation
page read and write
45FB000
trusted library allocation
page read and write
65A8000
trusted library allocation
page read and write
4200000
remote allocation
page read and write
7E9F000
trusted library allocation
page read and write
E200000
trusted library allocation
page read and write
371E000
stack
page read and write
7900000
trusted library allocation
page execute and read and write
9179000
heap
page read and write
5A5C000
stack
page read and write
2605000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
675000
trusted library allocation
page execute and read and write
3CF9000
trusted library allocation
page read and write
2F4D000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
C3B000
stack
page read and write
1B14000
trusted library allocation
page read and write
5956000
trusted library allocation
page read and write
369E000
stack
page read and write
846E000
trusted library allocation
page read and write
730000
trusted library allocation
page read and write
41AD000
stack
page read and write
50E9000
trusted library allocation
page read and write
1320000
trusted library allocation
page read and write
18A8000
heap
page read and write
14F56000
trusted library allocation
page read and write
56A0000
heap
page read and write
90B1000
trusted library allocation
page read and write
6EA0000
heap
page read and write
5990000
trusted library allocation
page read and write
550000
heap
page read and write
13437000
heap
page read and write
3718000
trusted library allocation
page read and write
5A3E000
stack
page read and write
5740000
heap
page read and write
211434D4000
heap
page read and write
3307000
trusted library allocation
page read and write
39DF000
trusted library allocation
page read and write
6D07000
trusted library allocation
page read and write
6240000
heap
page read and write
5DD0000
trusted library allocation
page execute and read and write
3CFD000
trusted library allocation
page read and write
B9B4000
heap
page read and write
371B000
trusted library allocation
page read and write
7B70000
unkown
page readonly
7FDE0000
trusted library allocation
page execute and read and write
2C3B000
trusted library allocation
page read and write
39E96FF000
stack
page read and write
BC9B000
heap
page read and write
4B0D000
trusted library allocation
page read and write
3BB2000
trusted library allocation
page read and write
25F2000
trusted library allocation
page read and write
6BB6000
heap
page read and write
3720000
direct allocation
page read and write
14F2B000
stack
page read and write
7230000
heap
page read and write
6AEB000
trusted library allocation
page read and write
1DDE000
stack
page read and write
2688000
trusted library allocation
page read and write
14AE0000
trusted library allocation
page read and write
7F0D000
trusted library allocation
page read and write
2BE0000
trusted library allocation
page read and write
2C74000
trusted library allocation
page read and write
BB6B000
heap
page read and write
81B8000
trusted library allocation
page read and write
4A40000
trusted library allocation
page read and write
ADD7000
heap
page read and write
B69E000
trusted library allocation
page read and write
1402000
unkown
page readonly
1367C000
trusted library allocation
page read and write
5E04000
trusted library allocation
page read and write
26C4000
trusted library allocation
page read and write
3969000
trusted library allocation
page read and write
26F0000
direct allocation
page execute and read and write
4F71000
trusted library allocation
page read and write
4F7000
stack
page read and write
5E2E000
stack
page read and write
100D3000
unkown
page read and write
3598000
trusted library allocation
page read and write
136CD000
stack
page read and write
1398D000
trusted library allocation
page read and write
6CD6000
trusted library allocation
page read and write
66DC000
stack
page read and write
6A28000
trusted library allocation
page read and write
1C60000
heap
page execute and read and write
5166000
trusted library allocation
page read and write
13BD0000
trusted library allocation
page read and write
5F30000
trusted library allocation
page execute and read and write
BAE000
stack
page read and write
572C000
stack
page read and write
13F83000
trusted library allocation
page read and write
74B000
trusted library allocation
page execute and read and write
6290000
trusted library allocation
page read and write
11CA000
heap
page read and write
4C0E000
stack
page read and write
2F0D000
trusted library allocation
page read and write
2621000
direct allocation
page read and write
260D000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
17FE000
heap
page read and write
3F9A000
heap
page read and write
703000
trusted library allocation
page execute and read and write
59E0000
trusted library allocation
page read and write
3BE6000
trusted library allocation
page read and write
4A1D000
trusted library allocation
page read and write
5E21000
trusted library allocation
page read and write
A319000
heap
page read and write
6377000
trusted library allocation
page read and write
E1C000
heap
page read and write
3970000
trusted library allocation
page execute and read and write
14E4E000
trusted library allocation
page read and write
1480000
trusted library allocation
page read and write
770000
heap
page read and write
5E18000
trusted library allocation
page read and write
2113E51A000
heap
page read and write
395C000
trusted library allocation
page read and write
A17C000
heap
page read and write
2E80000
trusted library allocation
page read and write
AD1000
direct allocation
page read and write
B20E000
trusted library allocation
page read and write
5948000
trusted library allocation
page read and write
3954000
trusted library allocation
page read and write
131EA000
heap
page read and write
58AE000
stack
page read and write
2FA9000
trusted library allocation
page read and write
E0C9000
heap
page read and write
14140000
trusted library allocation
page read and write
3038000
trusted library allocation
page read and write
140F1000
trusted library allocation
page read and write
5E0B000
trusted library allocation
page read and write
13EF000
heap
page read and write
6400000
trusted library allocation
page execute and read and write
34B9000
heap
page read and write
14138000
trusted library allocation
page read and write
3440000
heap
page read and write
5E02000
trusted library allocation
page read and write
760000
trusted library allocation
page read and write
13BAE000
stack
page read and write
1485000
trusted library allocation
page execute and read and write
5BDE000
stack
page read and write
14572000
trusted library allocation
page read and write
25EE000
trusted library allocation
page read and write
147A000
trusted library allocation
page execute and read and write
821B000
trusted library allocation
page read and write
569D000
trusted library allocation
page read and write
7910000
heap
page read and write
19A3000
trusted library allocation
page execute and read and write
3714000
direct allocation
page read and write
6290000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
211432D0000
trusted library allocation
page read and write
DB0000
heap
page read and write
916A000
heap
page read and write
64EE000
heap
page read and write
5E3C000
trusted library allocation
page read and write
BD92000
trusted library section
page read and write
14670000
trusted library allocation
page read and write
89CE000
stack
page read and write
AF30000
trusted library allocation
page read and write
B3C0000
trusted library allocation
page read and write
268A000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page execute and read and write
2595000
trusted library allocation
page read and write
81B3000
trusted library allocation
page read and write
3BAC000
trusted library allocation
page read and write
10FE000
trusted library allocation
page read and write
999000
heap
page read and write
1205000
heap
page read and write
813A000
trusted library allocation
page read and write
3BFB000
trusted library allocation
page read and write
7480000
heap
page read and write
26B4000
trusted library allocation
page read and write
E1D0000
trusted library allocation
page execute and read and write
815C000
trusted library allocation
page read and write
5CDE000
stack
page read and write
83FF000
trusted library allocation
page read and write
8570000
heap
page read and write
2E38000
trusted library allocation
page read and write
AA63000
trusted library allocation
page read and write
6B00000
trusted library allocation
page read and write
13D3000
trusted library allocation
page read and write
798000
heap
page read and write
2D6F000
trusted library allocation
page read and write
518D000
trusted library allocation
page read and write
6260000
trusted library allocation
page read and write
A2E1000
heap
page read and write
4F1C000
trusted library allocation
page read and write
5820000
heap
page read and write
2113DD02000
heap
page read and write
149A6000
trusted library allocation
page read and write
3940000
trusted library allocation
page read and write
174F000
heap
page read and write
1C77000
trusted library allocation
page execute and read and write
11B6000
heap
page read and write
261A000
trusted library allocation
page read and write
54CD000
stack
page read and write
8A5000
heap
page read and write
6596000
trusted library allocation
page read and write
D38000
stack
page read and write
39EA2FE000
stack
page read and write
36DE000
trusted library allocation
page read and write
2D60000
trusted library allocation
page read and write
97F000
heap
page read and write
336A000
trusted library allocation
page read and write
94A000
heap
page read and write
2EF2000
trusted library allocation
page read and write
4A66000
trusted library allocation
page read and write
B1A000
direct allocation
page read and write
7FCA0000
trusted library allocation
page execute and read and write
7700000
trusted library allocation
page read and write
E2000
unkown
page readonly
91B3000
heap
page read and write
26A1000
trusted library allocation
page read and write
4A90000
heap
page read and write
62E5000
trusted library allocation
page read and write
C8F0000
heap
page read and write
3350000
trusted library allocation
page read and write
524E000
stack
page read and write
5770000
trusted library allocation
page read and write
25A3000
trusted library allocation
page read and write
842B000
trusted library allocation
page read and write
BC40000
heap
page read and write
FF38000
trusted library allocation
page read and write
6B08000
unkown
page readonly
21143500000
heap
page read and write
2F8A000
trusted library allocation
page read and write
ADFA000
heap
page read and write
5CA0000
heap
page read and write
48F4000
trusted library allocation
page read and write
2E97000
trusted library allocation
page read and write
515E000
stack
page read and write
6B00000
trusted library allocation
page read and write
14D09000
trusted library allocation
page read and write
53D0000
trusted library section
page readonly
648D000
stack
page read and write
50C7000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page execute and read and write
510C000
stack
page read and write
13037000
heap
page read and write
4DB5000
trusted library allocation
page read and write
594E000
trusted library allocation
page read and write
5E77000
trusted library allocation
page read and write
3340000
trusted library allocation
page execute and read and write
1460000
trusted library allocation
page read and write
506E000
stack
page read and write
B250000
trusted library allocation
page read and write
BC8000
heap
page read and write
132BB000
heap
page read and write
BCAA000
trusted library section
page read and write
582F000
stack
page read and write
A5C0000
heap
page read and write
747000
trusted library allocation
page execute and read and write
A7C0000
trusted library allocation
page read and write
93F000
heap
page read and write
81DB000
trusted library allocation
page read and write
5186000
trusted library allocation
page read and write
3608000
trusted library allocation
page read and write
14E2E000
trusted library allocation
page read and write
5A40000
trusted library allocation
page execute and read and write
17FC000
heap
page read and write
850E000
stack
page read and write
15E0000
trusted library allocation
page read and write
B200000
trusted library allocation
page read and write
2113EA40000
trusted library allocation
page read and write
919E000
heap
page read and write
F6C000
stack
page read and write
132A000
trusted library allocation
page execute and read and write
1718000
heap
page read and write
26C0000
trusted library allocation
page read and write
13F7C000
trusted library allocation
page read and write
28F6000
trusted library allocation
page read and write
5706000
heap
page read and write
6BC0000
heap
page read and write
1615000
heap
page read and write
6371000
trusted library allocation
page read and write
6ABE000
trusted library allocation
page read and write
2C7A000
trusted library allocation
page read and write
F43C000
stack
page read and write
2622000
trusted library allocation
page read and write
5ABE000
stack
page read and write
7273000
trusted library allocation
page read and write
2E84000
trusted library allocation
page read and write
C093000
heap
page read and write
E0FB000
heap
page read and write
50CB000
trusted library allocation
page read and write
6420000
trusted library allocation
page read and write
4ACE000
trusted library allocation
page read and write
7B50000
trusted library allocation
page read and write
4F0000
heap
page read and write
BE20000
heap
page read and write
1910000
heap
page read and write
19C0000
trusted library allocation
page read and write
13604000
heap
page read and write
DCF0000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
24AC000
stack
page read and write
B300000
trusted library allocation
page execute and read and write
3630000
trusted library allocation
page execute and read and write
37AD000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
5076000
trusted library allocation
page read and write
5E06000
trusted library allocation
page read and write
50D3000
trusted library allocation
page read and write
5DEC000
trusted library allocation
page read and write
15D0000
heap
page read and write
6ADA000
trusted library allocation
page read and write
C21F000
trusted library allocation
page read and write
266C000
direct allocation
page read and write
9196000
heap
page read and write
4CB0000
trusted library allocation
page read and write
15E5000
trusted library allocation
page read and write
1587000
trusted library allocation
page read and write
677000
trusted library allocation
page execute and read and write
9185000
heap
page read and write
1210000
trusted library allocation
page read and write
7691000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
5089000
trusted library allocation
page read and write
770000
trusted library allocation
page execute and read and write
3692000
trusted library allocation
page read and write
5BD0000
heap
page execute and read and write
BA5A000
heap
page read and write
12EB2000
heap
page read and write
6A30000
heap
page read and write
864000
heap
page read and write
13040000
heap
page read and write
5DEE000
stack
page read and write
983000
heap
page read and write
6AB0000
trusted library section
page readonly
FF25000
trusted library allocation
page read and write
6B28000
trusted library allocation
page read and write
3580000
trusted library allocation
page read and write
58CC000
trusted library allocation
page read and write
3CED000
trusted library allocation
page read and write
78FE000
stack
page read and write
3DA8000
trusted library allocation
page read and write
1738000
heap
page read and write
13C67000
trusted library allocation
page read and write
B70000
heap
page read and write
5E27000
trusted library allocation
page read and write
593E000
trusted library allocation
page read and write
7250000
trusted library allocation
page read and write
6CFC000
trusted library allocation
page read and write
1C1A000
trusted library allocation
page execute and read and write
81AD000
trusted library allocation
page read and write
DD10000
trusted library allocation
page read and write
21143170000
trusted library allocation
page read and write
7480000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
3F2E000
stack
page read and write
3CB3000
trusted library allocation
page read and write
35F4000
trusted library allocation
page read and write
371D000
direct allocation
page read and write
2F82000
trusted library allocation
page read and write
2C5F000
trusted library allocation
page read and write
340E000
stack
page read and write
B640000
trusted library allocation
page read and write
C0B0000
heap
page read and write
725000
heap
page read and write
3BCB000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
3776000
trusted library allocation
page read and write
F31E000
trusted library allocation
page read and write
2113EC80000
trusted library allocation
page read and write
835C000
stack
page read and write
56D5000
heap
page read and write
6B2A000
trusted library allocation
page read and write
B430000
trusted library allocation
page execute and read and write
91E5000
heap
page read and write
2F4B000
trusted library allocation
page read and write
1465F000
trusted library allocation
page read and write
787E000
stack
page read and write
35E2000
trusted library allocation
page read and write
267A000
direct allocation
page read and write
813D000
trusted library allocation
page read and write
83A1000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
372C000
trusted library allocation
page read and write
3C6D000
trusted library allocation
page read and write
62D6000
trusted library allocation
page read and write
35DC000
trusted library allocation
page read and write
2681000
direct allocation
page read and write
2380000
direct allocation
page read and write
53DF000
trusted library section
page readonly
180000
heap
page read and write
6AC4000
trusted library allocation
page read and write
6CF4000
trusted library allocation
page read and write
8F90000
heap
page read and write
1290000
heap
page read and write
6CC4000
trusted library allocation
page read and write
135D1000
heap
page read and write
FFCC000
trusted library allocation
page read and write
26BE000
trusted library allocation
page read and write
77B0000
heap
page read and write
27D0000
trusted library allocation
page read and write
2EE8000
trusted library allocation
page read and write
2D2A000
trusted library allocation
page read and write
422A000
trusted library allocation
page read and write
9AA000
heap
page read and write
2F6D000
trusted library allocation
page read and write
F80000
heap
page read and write
63E8000
trusted library allocation
page read and write
3148000
trusted library allocation
page read and write
A290000
trusted library allocation
page read and write
74B7000
direct allocation
page read and write
2113E701000
trusted library allocation
page read and write
DFE000
stack
page read and write
366D000
trusted library allocation
page read and write
4681000
trusted library allocation
page read and write
7FC00000
trusted library allocation
page execute and read and write
39EA77E000
unkown
page readonly
13C6A000
trusted library allocation
page read and write
6340000
trusted library allocation
page execute and read and write
EA9000
heap
page read and write
7380000
trusted library allocation
page read and write
264F000
direct allocation
page read and write
62C5000
heap
page read and write
91A8000
heap
page read and write
3590000
trusted library allocation
page read and write
9120000
heap
page read and write
13F01000
trusted library allocation
page read and write
3286000
trusted library allocation
page execute and read and write
3D5E000
trusted library allocation
page read and write
32EC000
trusted library allocation
page read and write
1878000
heap
page read and write
2BA6000
trusted library allocation
page read and write
2838000
trusted library allocation
page read and write
134AD000
heap
page read and write
2F84000
trusted library allocation
page read and write
5081000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page read and write
A15B000
heap
page read and write
276A000
trusted library allocation
page read and write
3D2F000
stack
page read and write
1421000
heap
page read and write
25F4000
trusted library allocation
page read and write
13218000
heap
page read and write
35F0000
trusted library allocation
page read and write
F313000
trusted library allocation
page read and write
5E30000
trusted library allocation
page read and write
14EC0000
trusted library allocation
page read and write
988000
heap
page read and write
2DAF000
trusted library allocation
page read and write
1260000
heap
page read and write
8132000
trusted library allocation
page read and write
14D6C000
trusted library allocation
page read and write
A2F6000
heap
page read and write
5A6C000
heap
page read and write
65BD000
trusted library allocation
page read and write
7BFE000
stack
page read and write
3740000
heap
page execute and read and write
2113E3D1000
trusted library allocation
page read and write
130F000
stack
page read and write
E0D7000
heap
page read and write
B958000
heap
page read and write
56DB000
heap
page read and write
5AC0000
trusted library allocation
page read and write
D9B000
unkown
page readonly
AFD000
direct allocation
page read and write
F271000
trusted library allocation
page read and write
659B000
trusted library allocation
page read and write
4C5D000
trusted library allocation
page read and write
33E0000
heap
page execute and read and write
2F9F000
trusted library allocation
page read and write
25F0000
trusted library allocation
page read and write
B210000
trusted library allocation
page read and write
BAF9000
heap
page read and write
14C60000
trusted library allocation
page read and write
157C000
trusted library allocation
page read and write
4921000
trusted library allocation
page read and write
6B05000
trusted library allocation
page read and write
F19B000
stack
page read and write
2597000
trusted library allocation
page read and write
5DE0000
heap
page read and write
BB1F000
heap
page read and write
1234000
heap
page read and write
276E000
trusted library allocation
page read and write
37A3000
trusted library allocation
page read and write
8239000
trusted library allocation
page read and write
1BF0000
heap
page read and write
5BCF000
stack
page read and write
2D9E000
stack
page read and write
4B7000
unkown
page read and write
BD09000
heap
page read and write
5E00000
trusted library allocation
page read and write
14320000
heap
page read and write
130B6000
heap
page read and write
7330000
trusted library allocation
page read and write
659E000
trusted library allocation
page read and write
E0DA000
heap
page read and write
A320000
heap
page read and write
39EB37E000
stack
page read and write
3702000
trusted library allocation
page read and write
7D0000
trusted library allocation
page read and write
6AD0000
heap
page read and write
549E000
stack
page read and write
A660000
trusted library allocation
page read and write
AFA0000
trusted library allocation
page execute and read and write
1C22000
trusted library allocation
page read and write
2CAA000
trusted library allocation
page read and write
E950000
trusted library allocation
page execute and read and write
336F000
trusted library allocation
page read and write
6920000
trusted library allocation
page read and write
1BE3000
trusted library allocation
page execute and read and write
35D0000
trusted library allocation
page read and write
35E4000
trusted library allocation
page read and write
A2CF000
heap
page read and write
2113E402000
heap
page read and write
3770000
trusted library allocation
page read and write
1308B000
heap
page read and write
145FF000
trusted library allocation
page read and write
2EF4000
trusted library allocation
page read and write
6AD4000
trusted library allocation
page read and write
623F000
stack
page read and write
926000
heap
page read and write
A84E000
stack
page read and write
4591000
trusted library allocation
page read and write
6592000
trusted library allocation
page read and write
A275000
heap
page read and write
1AB0000
trusted library allocation
page read and write
528E000
trusted library allocation
page read and write
1110000
trusted library allocation
page read and write
81F3000
trusted library allocation
page read and write
8510000
heap
page read and write
B3C9000
trusted library allocation
page read and write
2E9D000
trusted library allocation
page read and write
39EB07E000
unkown
page readonly
91D2000
heap
page read and write
14F0000
heap
page read and write
3485000
heap
page read and write
475A000
trusted library allocation
page read and write
13F4000
unkown
page readonly
327D000
trusted library allocation
page execute and read and write
14D10000
trusted library allocation
page read and write
5DE0000
trusted library allocation
page read and write
A2A1000
heap
page read and write
5509000
trusted library allocation
page read and write
A090000
heap
page read and write
670000
trusted library allocation
page read and write
FEF0000
trusted library allocation
page read and write
19B3000
trusted library allocation
page read and write
3B56000
trusted library allocation
page read and write
2C70000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
520000
heap
page read and write
1394E000
trusted library allocation
page read and write
5B9D000
stack
page read and write
14C40000
trusted library allocation
page read and write
175A000
heap
page read and write
4441000
trusted library allocation
page read and write
13F9F000
trusted library allocation
page read and write
2690000
direct allocation
page read and write
1536000
trusted library allocation
page read and write
2113DC62000
heap
page read and write
B1EE000
stack
page read and write
330B000
trusted library allocation
page read and write
2E7E000
trusted library allocation
page read and write
6A94000
trusted library allocation
page read and write
3BB4000
trusted library allocation
page read and write
3373000
trusted library allocation
page read and write
91A3000
heap
page read and write
7FE000
heap
page read and write
342E000
stack
page read and write
144C000
stack
page read and write
3310000
trusted library allocation
page read and write
11F0000
trusted library allocation
page read and write
742000
trusted library allocation
page read and write
613F000
stack
page read and write
6320000
trusted library allocation
page read and write
F8EC000
stack
page read and write
40AC000
stack
page read and write
3B6E000
stack
page read and write
F2C1000
trusted library allocation
page read and write
98E000
heap
page read and write
E0CB000
heap
page read and write
2113ED60000
trusted library section
page readonly
330D000
trusted library allocation
page read and write
828F000
trusted library allocation
page read and write
6CE000
unkown
page read and write
509E000
trusted library allocation
page read and write
650000
trusted library allocation
page read and write
25B4000
trusted library allocation
page read and write
A670000
trusted library allocation
page read and write
DE40000
trusted library allocation
page read and write
3356000
trusted library allocation
page read and write
6AAC000
stack
page read and write
C064000
heap
page read and write
2CAE000
trusted library allocation
page read and write
12D5B000
stack
page read and write
2F22000
trusted library allocation
page read and write
FC1E000
stack
page read and write
65C2000
trusted library allocation
page read and write
8127000
trusted library allocation
page read and write
3074000
trusted library allocation
page read and write
4DD6000
trusted library allocation
page read and write
AB1000
direct allocation
page read and write
8437000
trusted library allocation
page read and write
189B000
heap
page read and write
6970000
heap
page read and write
2FA1000
trusted library allocation
page read and write
14B08000
trusted library allocation
page read and write
A292000
heap
page read and write
6B20000
trusted library allocation
page read and write
625C000
heap
page read and write
1252000
heap
page read and write
274F000
trusted library allocation
page read and write
14A71000
trusted library allocation
page read and write
2FBE000
trusted library allocation
page read and write
1990000
trusted library allocation
page read and write
5510000
heap
page read and write
A233000
heap
page read and write
8139000
trusted library allocation
page read and write
8461000
trusted library allocation
page read and write
2E78000
trusted library allocation
page read and write
2FBC000
trusted library allocation
page read and write
190000
heap
page read and write
978000
heap
page read and write
6F4000
unkown
page readonly
780000
heap
page read and write
2740000
trusted library allocation
page read and write
A48D000
stack
page read and write
70D000
trusted library allocation
page execute and read and write
30E0000
trusted library allocation
page read and write
9A9000
heap
page read and write
2F07000
trusted library allocation
page read and write
3BC9000
trusted library allocation
page read and write
2E86000
trusted library allocation
page read and write
4C10000
trusted library allocation
page read and write
BF6E000
heap
page read and write
39EA07E000
unkown
page readonly
AEE0000
heap
page read and write
39EAA7E000
unkown
page readonly
76F0000
trusted library allocation
page read and write
6540000
trusted library allocation
page read and write
3F5E000
stack
page read and write
6EE000
stack
page read and write
2580000
trusted library allocation
page read and write
A80E000
stack
page read and write
6B3C000
trusted library allocation
page read and write
1980000
heap
page read and write
64E2000
heap
page read and write
4DC0000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
4F2E000
stack
page read and write
2CB2000
trusted library allocation
page read and write
960000
heap
page read and write
FF63000
trusted library allocation
page read and write
73B0000
trusted library allocation
page execute and read and write
2114341F000
heap
page read and write
660000
trusted library allocation
page read and write
3620000
trusted library allocation
page read and write
2E6C000
trusted library allocation
page read and write
3BEB000
trusted library allocation
page read and write
B6D0000
trusted library allocation
page read and write
4565000
trusted library allocation
page read and write
13671000
trusted library allocation
page read and write
64DA000
heap
page read and write
1597000
stack
page read and write
5DAE000
stack
page read and write
2B6C000
trusted library allocation
page read and write
260B000
trusted library allocation
page read and write
5D1E000
stack
page read and write
2121000
trusted library allocation
page read and write
48F0000
trusted library allocation
page read and write
BD97000
trusted library section
page read and write
3C61000
trusted library allocation
page read and write
6AE0000
trusted library allocation
page read and write
840D000
stack
page read and write
8136000
trusted library allocation
page read and write
506C000
trusted library allocation
page read and write
2E9F000
trusted library allocation
page read and write
994000
heap
page read and write
A97B000
trusted library allocation
page read and write
1DE000
stack
page read and write
7390000
trusted library allocation
page read and write
A23D000
heap
page read and write
463B000
trusted library allocation
page read and write
62DD000
trusted library allocation
page read and write
13AD000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
3BAA000
trusted library allocation
page read and write
8A0000
heap
page read and write
14F50000
trusted library allocation
page read and write
13A35000
trusted library allocation
page read and write
11B000
stack
page read and write
3531000
trusted library allocation
page read and write
BE30000
heap
page read and write
7F7E000
stack
page read and write
315B000
trusted library allocation
page read and write
19D000
stack
page read and write
14145000
trusted library allocation
page read and write
3CC5000
trusted library allocation
page read and write
1595000
trusted library allocation
page read and write
14434000
trusted library allocation
page read and write
6AE000
stack
page read and write
988000
heap
page read and write
50E0000
trusted library allocation
page read and write
D80000
heap
page read and write
501D000
stack
page read and write
1B00000
trusted library allocation
page read and write
15FE000
trusted library allocation
page read and write
B690000
trusted library allocation
page read and write
4CE0000
trusted library allocation
page read and write
2582000
trusted library allocation
page read and write
B260000
trusted library allocation
page execute and read and write
5944000
trusted library allocation
page read and write
335C000
trusted library allocation
page read and write
B6A0000
trusted library allocation
page read and write
90D9000
trusted library allocation
page read and write
1780000
heap
page read and write
486A000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
2113EDA0000
trusted library section
page readonly
92C000
heap
page read and write
81AD000
trusted library allocation
page read and write
6CC0000
trusted library allocation
page read and write
3480000
direct allocation
page read and write
3A1B000
trusted library allocation
page read and write
568D000
stack
page read and write
149B6000
trusted library allocation
page read and write
5104000
trusted library allocation
page read and write
E910000
trusted library allocation
page read and write
50F9000
trusted library allocation
page read and write
5C40000
trusted library allocation
page execute and read and write
81C4000
trusted library allocation
page read and write
6A31000
unkown
page execute read
E0DD000
heap
page read and write
6450000
trusted library allocation
page read and write
6D30000
heap
page read and write
2113DC2B000
heap
page read and write
1C20000
trusted library allocation
page read and write
551C000
stack
page read and write
3FA2000
heap
page read and write
77D0000
trusted library allocation
page read and write
62B5000
heap
page read and write
6385000
trusted library allocation
page read and write
5E35000
trusted library allocation
page read and write
BC27000
heap
page read and write
131D000
trusted library allocation
page execute and read and write
16E0000
heap
page read and write
2FB8000
trusted library allocation
page read and write
E1EA000
trusted library allocation
page read and write
6A86000
heap
page read and write
F274000
trusted library allocation
page read and write
AF60000
trusted library allocation
page execute and read and write
58C0000
trusted library allocation
page read and write
1178000
trusted library allocation
page read and write
6320000
trusted library allocation
page execute and read and write
1730000
heap
page read and write
E152000
heap
page read and write
5930000
heap
page read and write
3542000
trusted library allocation
page read and write
6B03000
unkown
page write copy
9AD000
heap
page read and write
476B000
trusted library allocation
page read and write
39E9E7E000
unkown
page readonly
3675000
trusted library allocation
page read and write
130BF000
heap
page read and write
3606000
trusted library allocation
page read and write
637C000
trusted library allocation
page read and write
9206000
heap
page read and write
6250000
trusted library allocation
page execute and read and write
2C43000
trusted library allocation
page read and write
4AC8000
trusted library allocation
page read and write
B9B8000
heap
page read and write
1338B000
heap
page read and write
3DB2000
trusted library allocation
page read and write
70A000
unkown
page readonly
3036000
trusted library allocation
page read and write
A297000
trusted library allocation
page read and write
33A5000
trusted library allocation
page read and write
6B49000
trusted library allocation
page read and write
14301000
trusted library allocation
page read and write
BB2A000
heap
page read and write
39EAAFE000
stack
page read and write
5911000
trusted library allocation
page read and write
2BE2000
trusted library allocation
page read and write
39EA6FE000
stack
page read and write
3A02000
trusted library allocation
page read and write
3527000
trusted library allocation
page read and write
B9C2000
heap
page read and write
26000
unkown
page readonly
2113E500000
heap
page read and write
58DA000
trusted library allocation
page read and write
59E000
stack
page read and write
6470000
trusted library allocation
page read and write
5F2A000
trusted library allocation
page read and write
B987000
heap
page read and write
2F69000
trusted library allocation
page read and write
12E7C000
heap
page read and write
13A3B000
trusted library allocation
page read and write
7F0000
heap
page read and write
489A000
trusted library allocation
page read and write
39EB47E000
unkown
page readonly
14672000
trusted library allocation
page read and write
A7AE000
stack
page read and write
130C6000
heap
page read and write
A50E000
stack
page read and write
3290000
trusted library allocation
page read and write
1193000
trusted library allocation
page read and write
81DE000
trusted library allocation
page read and write
76A0000
trusted library allocation
page read and write
138DB000
trusted library allocation
page read and write
95F000
heap
page read and write
820A000
trusted library allocation
page read and write
B3FD000
trusted library allocation
page read and write
ADDE000
heap
page read and write
3626000
trusted library allocation
page read and write
2C62000
trusted library allocation
page read and write
2571000
trusted library allocation
page read and write
39E9977000
stack
page read and write
2E71000
trusted library allocation
page read and write
80E5000
trusted library allocation
page read and write
34F8000
trusted library allocation
page read and write
6F8000
heap
page read and write
10000
unkown
page readonly
3930000
trusted library allocation
page execute and read and write
366A000
direct allocation
page read and write
39E9C7E000
unkown
page readonly
272E000
trusted library allocation
page read and write
633E000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
266F000
trusted library allocation
page read and write
9AB000
heap
page read and write
847A000
trusted library allocation
page read and write
1546000
stack
page read and write
359C000
trusted library allocation
page read and write
218E000
trusted library allocation
page read and write
BD07000
heap
page read and write
321D000
stack
page read and write
1330F000
heap
page read and write
2E82000
trusted library allocation
page read and write
8387000
trusted library allocation
page read and write
276C000
trusted library allocation
page read and write
6600000
trusted library allocation
page read and write
526C000
trusted library allocation
page read and write
5A10000
trusted library allocation
page read and write
32F7000
trusted library allocation
page read and write
73A0000
trusted library allocation
page execute and read and write
3370000
heap
page read and write
AF0A000
heap
page read and write
39EB27E000
unkown
page readonly
3977000
trusted library allocation
page read and write
4F26000
trusted library allocation
page read and write
5959000
trusted library allocation
page read and write
35C8000
trusted library allocation
page read and write
65C5000
trusted library allocation
page read and write
8F8D000
stack
page read and write
628C000
stack
page read and write
727000
heap
page read and write
2905000
trusted library allocation
page read and write
5370000
heap
page read and write
2686000
trusted library allocation
page read and write
4FD0000
heap
page read and write
D70000
heap
page read and write
14E43000
trusted library allocation
page read and write
149E0000
trusted library allocation
page read and write
77C0000
heap
page read and write
1B23000
trusted library allocation
page read and write
1274000
heap
page read and write
5C8E000
stack
page read and write
355D000
trusted library allocation
page read and write
4AA0000
unkown
page readonly
3553000
trusted library allocation
page read and write
38DF000
trusted library allocation
page read and write
2753000
trusted library allocation
page read and write
E28000
heap
page read and write
2760000
trusted library allocation
page read and write
15C5000
heap
page read and write
7162000
trusted library allocation
page read and write
5970000
trusted library allocation
page read and write
2113DC6C000
heap
page read and write
1490000
heap
page read and write
298A000
direct allocation
page read and write
13A62000
unkown
page read and write
184E000
stack
page read and write
269D000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
600000
heap
page read and write
63CA000
trusted library allocation
page read and write
2851000
trusted library allocation
page read and write
211432C0000
trusted library allocation
page read and write
353A000
trusted library allocation
page read and write
5095000
trusted library allocation
page read and write
6A1C000
stack
page read and write
39F8000
trusted library allocation
page read and write
F53C000
stack
page read and write
BF15000
heap
page read and write
3070000
trusted library allocation
page read and write
3BB6000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
2113DCB2000
heap
page read and write
5E70000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
367B000
trusted library allocation
page read and write
F87000
heap
page read and write
12ED1000
heap
page read and write
6560000
trusted library allocation
page execute and read and write
5450000
heap
page read and write
2E9B000
trusted library allocation
page read and write
5E4A000
trusted library allocation
page read and write
4B10000
trusted library allocation
page execute and read and write
A190000
heap
page read and write
1A9E000
stack
page read and write
2584000
trusted library allocation
page read and write
3B6C000
trusted library allocation
page read and write
1356D000
heap
page read and write
115B000
trusted library allocation
page execute and read and write
2B74000
trusted library allocation
page read and write
2E99000
trusted library allocation
page read and write
395A000
trusted library allocation
page read and write
1183000
trusted library allocation
page execute and read and write
2BF0000
heap
page read and write
5DD0000
trusted library allocation
page read and write
303E000
trusted library allocation
page read and write
2EFF000
stack
page read and write
2D5A000
trusted library allocation
page read and write
3D2C000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
21143502000
heap
page read and write
9174000
heap
page read and write
571F000
heap
page read and write
3615000
trusted library allocation
page read and write
5C9C000
stack
page read and write
560E000
stack
page read and write
3BAA000
trusted library allocation
page read and write
2FC4000
trusted library allocation
page read and write
273E000
trusted library allocation
page read and write
B650000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
3557000
trusted library allocation
page read and write
81AA000
trusted library allocation
page read and write
257C000
trusted library allocation
page read and write
640000
trusted library allocation
page read and write
9A6000
heap
page read and write
35ED000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
63BE000
stack
page read and write
173A000
heap
page read and write
B3A0000
trusted library allocation
page read and write
1364D000
heap
page read and write
AEF4000
heap
page read and write
B8ED000
trusted library allocation
page read and write
2B72000
trusted library allocation
page read and write
2BFB000
trusted library allocation
page read and write
91AB000
heap
page read and write
4516000
trusted library allocation
page read and write
B670000
trusted library allocation
page execute and read and write
83A5000
trusted library allocation
page read and write
141D7000
trusted library allocation
page read and write
81EE000
trusted library allocation
page read and write
B8C1000
trusted library allocation
page read and write
FF28000
trusted library allocation
page read and write
2755000
trusted library allocation
page read and write
F293000
trusted library allocation
page read and write
64DE000
heap
page read and write
108E000
stack
page read and write
63A0000
trusted library allocation
page read and write
80F1000
trusted library allocation
page read and write
3358000
trusted library allocation
page read and write
5B40000
trusted library allocation
page read and write
5B6E000
stack
page read and write
36E7000
trusted library allocation
page read and write
62A0000
trusted library allocation
page execute and read and write
2BE4000
trusted library allocation
page read and write
BAFE000
heap
page read and write
3A13000
trusted library allocation
page read and write
E1C0000
trusted library allocation
page execute and read and write
246E000
stack
page read and write
32D7000
trusted library allocation
page read and write
3430000
heap
page execute and read and write
BCF3000
trusted library section
page read and write
B697000
trusted library allocation
page read and write
2113DD13000
heap
page read and write
AF1B000
heap
page read and write
4A60000
trusted library allocation
page read and write
33C2000
trusted library allocation
page read and write
5A6C000
heap
page read and write
1C25000
trusted library allocation
page execute and read and write
2FC2000
trusted library allocation
page read and write
13AAC000
stack
page read and write
A4CE000
stack
page read and write
14A40000
trusted library allocation
page read and write
66A000
trusted library allocation
page execute and read and write
13940000
trusted library allocation
page read and write
2822000
trusted library allocation
page read and write
7FE6000
trusted library allocation
page read and write
A16D000
heap
page read and write
CA80000
trusted library allocation
page execute and read and write
21143330000
remote allocation
page read and write
100D3000
unkown
page read and write
62E0000
trusted library allocation
page read and write
35D0000
trusted library allocation
page read and write
5490000
heap
page read and write
940D000
stack
page read and write
5D90000
trusted library allocation
page read and write
2B3F000
stack
page read and write
7356000
heap
page read and write
994000
heap
page read and write
330D000
heap
page read and write
98E000
heap
page read and write
A600000
trusted library allocation
page read and write
307F000
trusted library allocation
page read and write
35E3000
trusted library allocation
page read and write
2628000
trusted library allocation
page read and write
14F35000
trusted library allocation
page read and write
50E4000
trusted library allocation
page read and write
3F00000
trusted library allocation
page read and write
50E2000
trusted library allocation
page read and write
339B000
stack
page read and write
6B1D000
trusted library allocation
page read and write
565E000
stack
page read and write
9B000
stack
page read and write
30BF000
trusted library allocation
page read and write
610000
heap
page read and write
302E000
trusted library allocation
page read and write
56BA000
stack
page read and write
E1BD000
stack
page read and write
7573000
trusted library allocation
page read and write
CA60000
heap
page execute and read and write
7CE000
stack
page read and write
2B61000
trusted library allocation
page read and write
E099000
heap
page read and write
3574000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
4B80000
trusted library allocation
page execute and read and write
13687000
trusted library allocation
page read and write
12E60000
heap
page read and write
B694000
trusted library allocation
page read and write
1BA000
stack
page read and write
4130000
trusted library allocation
page read and write
3560000
trusted library allocation
page read and write
6060000
trusted library allocation
page read and write
1157000
trusted library allocation
page execute and read and write
6AE0000
trusted library allocation
page read and write
3613000
trusted library allocation
page read and write
142AA000
trusted library allocation
page read and write
14A00000
trusted library allocation
page read and write
423E000
stack
page read and write
92A000
heap
page read and write
338E000
trusted library allocation
page read and write
78F0000
heap
page read and write
47B4000
trusted library allocation
page read and write
AEE3000
heap
page read and write
11A0000
heap
page read and write
75E0000
trusted library allocation
page execute and read and write
4F56000
trusted library allocation
page read and write
33A3000
trusted library allocation
page read and write
1140000
trusted library allocation
page read and write
C20E000
stack
page read and write
1150000
trusted library allocation
page read and write
80F4000
trusted library allocation
page read and write
77E5000
heap
page read and write
2113DC6A000
heap
page read and write
B398000
trusted library allocation
page read and write
14295000
trusted library allocation
page read and write
14680000
trusted library allocation
page read and write
13C61000
trusted library allocation
page read and write
54F8000
heap
page read and write
82FE000
trusted library allocation
page read and write
A2D8000
heap
page read and write
35E9000
trusted library allocation
page read and write
5DEE000
trusted library allocation
page read and write
19D0000
heap
page read and write
AE26000
heap
page read and write
37B0000
trusted library allocation
page read and write
ADB1000
heap
page read and write
8FB3000
heap
page read and write
A510000
heap
page read and write
1152000
trusted library allocation
page read and write
1497000
heap
page read and write
135F7000
heap
page read and write
1090000
heap
page read and write
1442000
trusted library allocation
page read and write
2941000
trusted library allocation
page read and write
6D9000
unkown
page write copy
27BF000
trusted library allocation
page read and write
A258000
heap
page read and write
C855000
heap
page read and write
3968000
trusted library allocation
page read and write
3350000
trusted library allocation
page read and write
2682000
trusted library allocation
page read and write
6A0000
trusted library allocation
page read and write
1AC0000
heap
page read and write
AA68000
trusted library allocation
page read and write
6D4B000
trusted library allocation
page read and write
3CCA000
trusted library allocation
page read and write
6376000
trusted library allocation
page read and write
E1E0000
trusted library allocation
page read and write
14130000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
2881000
trusted library allocation
page read and write
32FB000
trusted library allocation
page execute and read and write
135AD000
heap
page read and write
2113E513000
heap
page read and write
B13000
direct allocation
page read and write
62C0000
trusted library allocation
page read and write
83B9000
trusted library allocation
page read and write
395E000
trusted library allocation
page read and write
4AC3000
trusted library allocation
page read and write
28D6000
trusted library allocation
page read and write
4D4C000
stack
page read and write
1349A000
heap
page read and write
100D3000
unkown
page read and write
51EF000
trusted library allocation
page read and write
8155000
trusted library allocation
page read and write
522E000
stack
page read and write
14230000
trusted library allocation
page read and write
35BE000
stack
page read and write
2F8C000
trusted library allocation
page read and write
14E63000
trusted library allocation
page read and write
9F9000
direct allocation
page read and write
2C78000
trusted library allocation
page read and write
13FAF000
trusted library allocation
page read and write
142F0000
trusted library allocation
page read and write
6C9000
unkown
page read and write
3566000
trusted library allocation
page read and write
B21000
direct allocation
page read and write
1482000
trusted library allocation
page read and write
73A0000
trusted library allocation
page read and write
39EA47E000
unkown
page readonly
3CF4000
trusted library allocation
page read and write
5109000
trusted library allocation
page read and write
C883000
heap
page read and write
6490000
trusted library allocation
page read and write
3D27000
trusted library allocation
page read and write
5BC5000
trusted library allocation
page read and write
13DCC000
trusted library allocation
page read and write
13157000
heap
page read and write
7EFE000
trusted library allocation
page read and write
A9BF000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
6529000
heap
page read and write
1480000
trusted library allocation
page read and write
919A000
heap
page read and write
353C000
stack
page read and write
AF20000
trusted library allocation
page read and write
142E0000
trusted library allocation
page execute and read and write
5580000
heap
page read and write
5934000
trusted library allocation
page read and write
2113E51B000
heap
page read and write
80A8000
trusted library allocation
page read and write
2113E55B000
heap
page read and write
39C0000
trusted library allocation
page read and write
7EE5000
trusted library allocation
page read and write
137B000
heap
page read and write
35CE000
trusted library allocation
page read and write
13EF0000
trusted library allocation
page read and write
11E0000
trusted library allocation
page read and write
E414000
trusted library allocation
page read and write
360B000
trusted library allocation
page read and write
14132000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
3681000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
5E2E000
trusted library allocation
page read and write
1C70000
trusted library allocation
page read and write
2F86000
trusted library allocation
page read and write
7970000
trusted library allocation
page read and write
19CA000
trusted library allocation
page execute and read and write
A45C000
stack
page read and write
2ED2000
trusted library allocation
page read and write
C1DB000
stack
page read and write
464D000
trusted library allocation
page read and write
ADF6000
heap
page read and write
5853000
trusted library allocation
page read and write
3365000
trusted library allocation
page read and write
13C50000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
144B000
trusted library allocation
page execute and read and write
1AB3000
trusted library allocation
page execute and read and write
56B0000
trusted library allocation
page execute and read and write
7696000
trusted library allocation
page read and write
2F20000
trusted library allocation
page read and write
13B7000
stack
page read and write
5D4A000
trusted library allocation
page read and write
19C6000
trusted library allocation
page execute and read and write
3305000
heap
page read and write
638E000
trusted library allocation
page read and write
F2CE000
trusted library allocation
page read and write
3077000
trusted library allocation
page read and write
5E1E000
trusted library allocation
page read and write
25B8000
trusted library allocation
page read and write
12F5A000
heap
page read and write
570D000
stack
page read and write
6590000
trusted library section
page readonly
211432E0000
trusted library allocation
page read and write
3E1E000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
39E3000
trusted library allocation
page read and write
9217000
heap
page read and write
3F92000
heap
page read and write
6620000
trusted library allocation
page execute and read and write
4DAA000
trusted library allocation
page read and write
158D000
trusted library allocation
page read and write
6920000
trusted library allocation
page read and write
51A6000
trusted library allocation
page read and write
64D000
trusted library allocation
page execute and read and write
7EAE000
trusted library allocation
page read and write
BB8D000
heap
page read and write
BC76000
heap
page read and write
5192000
trusted library allocation
page read and write
8FA0000
heap
page read and write
21143200000
trusted library allocation
page read and write
14240000
trusted library allocation
page execute and read and write
B720000
trusted library allocation
page execute and read and write
720000
heap
page read and write
36AC000
trusted library allocation
page read and write
1577000
stack
page read and write
2D4D000
trusted library allocation
page read and write
5DF0000
heap
page read and write
127D000
heap
page read and write
7FE2C000
direct allocation
page read and write
2759000
trusted library allocation
page read and write
51DC000
trusted library allocation
page read and write
5E55000
trusted library allocation
page read and write
2D28000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
511D000
stack
page read and write
367B000
trusted library allocation
page read and write
21143180000
trusted library allocation
page read and write
254E000
stack
page read and write
90F0000
trusted library allocation
page execute and read and write
AD87000
heap
page read and write
3BC5000
trusted library allocation
page read and write
135A2000
heap
page read and write
7740000
heap
page read and write
1220000
trusted library allocation
page read and write
3962000
trusted library allocation
page read and write
1340000
heap
page read and write
78BC000
stack
page read and write
5936000
trusted library allocation
page read and write
39AE000
trusted library allocation
page read and write
2BDE000
trusted library allocation
page read and write
89E000
stack
page read and write
AE34000
heap
page read and write
545E000
heap
page read and write
62B0000
trusted library allocation
page read and write
1B48000
heap
page read and write
7ED4000
trusted library allocation
page read and write
E90000
trusted library allocation
page read and write
6AB8000
trusted library allocation
page read and write
14330000
heap
page read and write
1331D000
heap
page read and write
30D0000
trusted library allocation
page read and write
9115000
heap
page read and write
377D000
trusted library allocation
page read and write
149A0000
trusted library allocation
page read and write
5460000
trusted library allocation
page execute and read and write
2F53000
trusted library allocation
page read and write
C04F000
heap
page read and write
3C2E000
trusted library allocation
page read and write
366B000
trusted library allocation
page read and write
9305000
heap
page read and write
306E000
trusted library allocation
page read and write
2848000
trusted library allocation
page read and write
1610000
heap
page read and write
33A1000
trusted library allocation
page read and write
5430000
heap
page read and write
2F05000
trusted library allocation
page read and write
80BE000
stack
page read and write
9300000
heap
page read and write
BC3C000
heap
page read and write
1746000
heap
page read and write
1AA0000
heap
page read and write
2F75000
heap
page read and write
50BF000
trusted library allocation
page read and write
56D8000
heap
page read and write
BF17000
heap
page read and write
3E71000
trusted library allocation
page read and write
9153000
heap
page read and write
35D4000
trusted library allocation
page read and write
34BB000
trusted library allocation
page read and write
6550000
trusted library allocation
page read and write
2C18000
trusted library allocation
page read and write
3375000
trusted library allocation
page read and write
7493000
trusted library allocation
page read and write
BF69000
heap
page read and write
B3B1000
trusted library allocation
page read and write
2CA6000
trusted library allocation
page read and write
3F81000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
2B85000
trusted library allocation
page read and write
4971000
trusted library allocation
page read and write
13171000
heap
page read and write
5975000
trusted library allocation
page read and write
C11B000
heap
page read and write
1470000
trusted library allocation
page read and write
C870000
heap
page read and write
5164000
trusted library allocation
page read and write
71A000
heap
page read and write
992000
heap
page read and write
58CE000
trusted library allocation
page read and write
987000
heap
page read and write
AA41000
trusted library allocation
page read and write
3679000
trusted library allocation
page read and write
FC35000
trusted library allocation
page read and write
4EAE000
stack
page read and write
559E000
stack
page read and write
BBD0000
heap
page read and write
32D1000
trusted library allocation
page read and write
138C0000
trusted library allocation
page read and write
91C1000
heap
page read and write
1060000
heap
page read and write
14DBA000
trusted library allocation
page read and write
367E000
stack
page read and write
3E2E000
stack
page read and write
50BB000
trusted library allocation
page read and write
4AB9000
trusted library allocation
page read and write
1B3A000
trusted library allocation
page execute and read and write
9A0000
heap
page read and write
992000
heap
page read and write
6300000
trusted library allocation
page read and write
91A0000
heap
page read and write
21143466000
heap
page read and write
824B000
trusted library allocation
page read and write
3138000
trusted library allocation
page read and write
9F2000
direct allocation
page read and write
E940000
trusted library allocation
page read and write
36DE000
stack
page read and write
32F7000
trusted library allocation
page execute and read and write
131E7000
heap
page read and write
883000
heap
page read and write
54F0000
trusted library allocation
page read and write
2F26000
trusted library allocation
page read and write
5EDC000
stack
page read and write
14659000
trusted library allocation
page read and write
3E24000
trusted library allocation
page read and write
14E82000
trusted library allocation
page read and write
4FEB000
stack
page read and write
13980000
trusted library allocation
page read and write
250E000
stack
page read and write
BB0B000
heap
page read and write
2BA4000
trusted library allocation
page read and write
3BE2000
trusted library allocation
page read and write
3292000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
3DBA000
trusted library allocation
page read and write
61B0000
trusted library allocation
page read and write
2FA5000
trusted library allocation
page read and write
6E0000
unkown
page readonly
1768000
heap
page read and write
A30D000
stack
page read and write
49FB000
trusted library allocation
page read and write
1B5E000
stack
page read and write
BBEA000
heap
page read and write
6CE8000
trusted library allocation
page read and write
74E3000
direct allocation
page read and write
5729000
heap
page read and write
77A0000
trusted library section
page readonly
67FC000
stack
page read and write
12E70000
heap
page read and write
6A30000
unkown
page readonly
66B0000
trusted library allocation
page read and write
2F91000
trusted library allocation
page read and write
5D20000
trusted library allocation
page read and write
CFB000
stack
page read and write
13A6A000
unkown
page read and write
1170000
trusted library allocation
page read and write
4A0E000
trusted library allocation
page read and write
14D9F000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
273A000
trusted library allocation
page read and write
50C5000
trusted library allocation
page read and write
BCDB000
heap
page read and write
4170000
trusted library allocation
page read and write
14C43000
trusted library allocation
page read and write
2BC2000
trusted library allocation
page read and write
507E000
stack
page read and write
2648000
direct allocation
page read and write
21143191000
trusted library allocation
page read and write
3534000
trusted library allocation
page read and write
1C40000
trusted library allocation
page read and write
3C8C000
trusted library allocation
page read and write
145B8000
trusted library allocation
page read and write
3542000
trusted library allocation
page read and write
369D000
trusted library allocation
page read and write
B330000
trusted library allocation
page execute and read and write
1377E000
stack
page read and write
672000
trusted library allocation
page read and write
7F850000
trusted library allocation
page execute and read and write
5F1E000
stack
page read and write
2C14000
trusted library allocation
page read and write
62F0000
trusted library allocation
page execute and read and write
2C16000
trusted library allocation
page read and write
894E000
stack
page read and write
14250000
trusted library allocation
page read and write
211434CA000
heap
page read and write
5380000
trusted library allocation
page read and write
B290000
trusted library allocation
page read and write
6391000
trusted library allocation
page read and write
5D84000
trusted library allocation
page read and write
129000
unkown
page readonly
822E000
trusted library allocation
page read and write
3BCF000
trusted library allocation
page read and write
4110000
trusted library allocation
page read and write
148B000
trusted library allocation
page execute and read and write
39EA97E000
stack
page read and write
14CF8000
trusted library allocation
page read and write
3545000
trusted library allocation
page read and write
825C000
stack
page read and write
2C5D000
trusted library allocation
page read and write
39E9B7E000
stack
page read and write
39E1000
trusted library allocation
page read and write
6AD0000
trusted library allocation
page read and write
7547000
direct allocation
page read and write
50F1000
trusted library allocation
page read and write
FB1E000
stack
page read and write
2F40000
heap
page execute and read and write
2BF5000
trusted library allocation
page read and write
91E8000
heap
page read and write
60D0000
unkown
page readonly
3A2C000
trusted library allocation
page read and write
33B5000
trusted library allocation
page read and write
8AE000
heap
page read and write
2C8F000
trusted library allocation
page read and write
6CEA000
trusted library allocation
page read and write
84FD000
trusted library allocation
page read and write
BC0000
heap
page read and write
56FE000
heap
page read and write
1B13000
trusted library allocation
page execute and read and write
5D3E000
stack
page read and write
5D81000
trusted library allocation
page read and write
E09B000
heap
page read and write
3BA8000
trusted library allocation
page read and write
4C0000
unkown
page read and write
5AC0000
heap
page read and write
135AB000
heap
page read and write
12FC3000
heap
page read and write
2EF0000
trusted library allocation
page read and write
69EE000
stack
page read and write
E98000
trusted library allocation
page read and write
92E0000
heap
page read and write
372E000
direct allocation
page read and write
B0C000
direct allocation
page read and write
1870000
heap
page read and write
1C7B000
trusted library allocation
page execute and read and write
65AE000
trusted library allocation
page read and write
7A4E000
stack
page read and write
63E5000
trusted library allocation
page read and write
365D000
trusted library allocation
page read and write
A2AC000
heap
page read and write
2F0F000
trusted library allocation
page read and write
6A80000
trusted library allocation
page execute and read and write
35C0000
trusted library allocation
page read and write
3CC1000
trusted library allocation
page read and write
6220000
trusted library allocation
page read and write
149AF000
trusted library allocation
page read and write
1413E000
trusted library allocation
page read and write
7FB3000
trusted library allocation
page read and write
1443A000
trusted library allocation
page read and write
12F4A000
heap
page read and write
8A9000
heap
page read and write
81FE000
stack
page read and write
826000
heap
page read and write
2599000
trusted library allocation
page read and write
14D5A000
trusted library allocation
page read and write
2113EDB0000
trusted library section
page readonly
720000
heap
page read and write
21143330000
remote allocation
page read and write
59D0000
trusted library allocation
page execute and read and write
2C72000
trusted library allocation
page read and write
14047000
trusted library allocation
page read and write
561D000
stack
page read and write
35AA000
trusted library allocation
page read and write
1E0000
heap
page read and write
5747000
heap
page read and write
2BFF000
trusted library allocation
page read and write
269B000
trusted library allocation
page read and write
1AA0000
trusted library allocation
page read and write
5701000
heap
page read and write
2F9D000
trusted library allocation
page read and write
335D000
trusted library allocation
page read and write
5727000
heap
page read and write
7498000
direct allocation
page read and write
33C0000
trusted library allocation
page execute and read and write
2113DCFF000
heap
page read and write
3DEA000
trusted library allocation
page read and write
2738000
trusted library allocation
page read and write
11BE000
stack
page read and write
7E0000
trusted library allocation
page read and write
2D45000
trusted library allocation
page read and write
7B3C000
stack
page read and write
3307000
heap
page read and write
49F0000
trusted library allocation
page read and write
13A42000
trusted library allocation
page read and write
5195000
trusted library allocation
page read and write
12990000
heap
page read and write
21143190000
trusted library allocation
page read and write
5B43000
trusted library allocation
page read and write
19AD000
trusted library allocation
page execute and read and write
81A0000
trusted library allocation
page read and write
923000
heap
page read and write
2B68000
trusted library allocation
page read and write
6570000
trusted library allocation
page read and write
9161000
heap
page read and write
7576000
trusted library allocation
page read and write
1618000
heap
page read and write
32D5000
trusted library allocation
page read and write
6A9E000
trusted library allocation
page read and write
813D000
trusted library allocation
page read and write
A8C1000
trusted library allocation
page read and write
142B0000
trusted library allocation
page execute and read and write
1C90000
heap
page read and write
3742000
trusted library allocation
page read and write
5D3C000
trusted library allocation
page read and write
C085000
heap
page read and write
211434ED000
heap
page read and write
3053000
trusted library allocation
page read and write
A5E0000
trusted library allocation
page read and write
25AA000
trusted library allocation
page read and write
14EBC000
trusted library allocation
page read and write
13667000
heap
page read and write
8125000
trusted library allocation
page read and write
7F360000
trusted library allocation
page execute and read and write
7280000
trusted library allocation
page read and write
2BD8000
trusted library allocation
page read and write
181A000
heap
page read and write
4F8000
stack
page read and write
B270000
trusted library allocation
page read and write
5951000
trusted library allocation
page read and write
80000
unkown
page readonly
2EC7000
trusted library allocation
page read and write
5980000
trusted library allocation
page read and write
35E0000
trusted library allocation
page read and write
A27D000
heap
page read and write
14143000
trusted library allocation
page read and write
1124000
trusted library allocation
page read and write
13F2000
unkown
page readonly
25E8000
trusted library allocation
page read and write
5E8D000
stack
page read and write
3A1F000
trusted library allocation
page read and write
13734000
trusted library allocation
page read and write
2F6F000
trusted library allocation
page read and write
A24F000
heap
page read and write
48AB000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page execute and read and write
7530000
unkown
page readonly
6370000
trusted library allocation
page read and write
6590000
trusted library allocation
page execute and read and write
91B0000
heap
page read and write
1418000
heap
page read and write
32F2000
trusted library allocation
page read and write
AB8E000
stack
page read and write
8213000
trusted library allocation
page read and write
2C7C000
trusted library allocation
page read and write
3B8B000
trusted library allocation
page read and write
7460000
heap
page read and write
649A000
trusted library allocation
page read and write
401000
unkown
page execute read
3990000
trusted library allocation
page read and write
63A5000
trusted library allocation
page read and write
13073000
heap
page read and write
9420000
heap
page read and write
5090000
trusted library allocation
page execute and read and write
3967000
trusted library allocation
page read and write
1C27000
trusted library allocation
page execute and read and write
636C000
stack
page read and write
5540000
heap
page read and write
576E000
stack
page read and write
BB35000
heap
page read and write
5610000
trusted library allocation
page read and write
130C3000
heap
page read and write
5590000
trusted library allocation
page execute and read and write
A2E8000
heap
page read and write
3362000
trusted library allocation
page read and write
2776000
trusted library allocation
page read and write
2EB2000
trusted library allocation
page read and write
3648000
trusted library allocation
page read and write
14663000
trusted library allocation
page read and write
1804000
heap
page read and write
6CDD000
trusted library allocation
page read and write
2B8B000
trusted library allocation
page read and write
1AB4000
trusted library allocation
page read and write
D90000
unkown
page readonly
4B0B000
trusted library allocation
page read and write
5972000
trusted library allocation
page read and write
6BAB000
trusted library allocation
page read and write
B280000
trusted library allocation
page execute and read and write
2DE0000
trusted library allocation
page read and write
26B8000
trusted library allocation
page read and write
6232000
heap
page read and write
1CAE000
stack
page read and write
2E60000
heap
page execute and read and write
9130000
heap
page read and write
5850000
trusted library allocation
page read and write
400000
unkown
page readonly
3653000
trusted library allocation
page read and write
2113DC00000
heap
page read and write
2656000
direct allocation
page read and write
14A17000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
2EEE000
trusted library allocation
page read and write
2672000
trusted library allocation
page read and write
21144000000
heap
page read and write
1B1D000
trusted library allocation
page execute and read and write
3C6D000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
5708000
heap
page read and write
77FE000
stack
page read and write
1146000
trusted library allocation
page execute and read and write
B3DA000
trusted library allocation
page read and write
39EA27E000
unkown
page readonly
5A1E000
stack
page read and write
3300000
heap
page read and write
14E88000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
BF67000
heap
page read and write
3E0E000
stack
page read and write
844E000
trusted library allocation
page read and write
3BE0000
trusted library allocation
page read and write
941000
heap
page read and write
13F2000
trusted library allocation
page read and write
5F5E000
stack
page read and write
2EEC000
trusted library allocation
page read and write
5020000
heap
page read and write
34E2000
trusted library allocation
page read and write
63A2000
trusted library allocation
page read and write
9198000
heap
page read and write
9A5000
heap
page read and write
81EC000
trusted library allocation
page read and write
962000
heap
page read and write
622A000
heap
page read and write
AEF000
stack
page read and write
136C000
heap
page read and write
36F9000
direct allocation
page read and write
BD8F000
trusted library section
page read and write
E8BF000
stack
page read and write
B410000
trusted library allocation
page read and write
3055000
trusted library allocation
page read and write
2774000
trusted library allocation
page read and write
3490000
direct allocation
page read and write
6A2F000
stack
page read and write
1470000
trusted library allocation
page execute and read and write
35D6000
trusted library allocation
page read and write
2D30000
trusted library allocation
page read and write
34B0000
heap
page read and write
B2F0000
trusted library allocation
page execute and read and write
4A50000
trusted library allocation
page read and write
13944000
trusted library allocation
page read and write
3579000
trusted library allocation
page read and write
3101000
trusted library allocation
page read and write
15F2000
trusted library allocation
page read and write
F27D000
trusted library allocation
page read and write
8226000
trusted library allocation
page read and write
745000
trusted library allocation
page execute and read and write
33F8000
trusted library allocation
page read and write
5AEC000
stack
page read and write
B28000
direct allocation
page read and write
5BDE000
trusted library allocation
page read and write
5840000
trusted library allocation
page execute and read and write
26A9000
trusted library allocation
page read and write
13657000
heap
page read and write
7571000
trusted library allocation
page read and write
211434FB000
heap
page read and write
81E8000
trusted library allocation
page read and write
268C000
trusted library allocation
page read and write
39DD000
trusted library allocation
page read and write
6A25000
trusted library allocation
page read and write
4D70000
trusted library allocation
page execute and read and write
3BB0000
trusted library allocation
page read and write
2D26000
trusted library allocation
page read and write
2F58000
trusted library allocation
page read and write
37C0000
trusted library allocation
page execute and read and write
56E0000
trusted library allocation
page execute and read and write
14E0000
trusted library allocation
page read and write
6AC0000
heap
page read and write
2113ED90000
trusted library section
page readonly
50F4000
trusted library allocation
page read and write
2114350A000
heap
page read and write
2DC0000
trusted library allocation
page read and write
C15E000
stack
page read and write
6ACF000
unkown
page readonly
E03F000
heap
page read and write
26A3000
trusted library allocation
page read and write
618C000
stack
page read and write
2F88000
trusted library allocation
page read and write
1C75000
trusted library allocation
page execute and read and write
3480000
direct allocation
page read and write
B6D8000
trusted library allocation
page read and write
130C1000
heap
page read and write
620000
heap
page read and write
BBF2000
heap
page read and write
7590000
trusted library allocation
page read and write
1240000
heap
page read and write
B2E0000
trusted library allocation
page read and write
9211000
heap
page read and write
553B000
stack
page read and write
6234000
trusted library allocation
page read and write
211431D4000
trusted library allocation
page read and write
ABDE000
stack
page read and write
2F70000
heap
page read and write
F295000
trusted library allocation
page read and write
5585000
heap
page read and write
3410000
heap
page read and write
14E12000
trusted library allocation
page read and write
2624000
trusted library allocation
page read and write
3964000
trusted library allocation
page read and write
9F0000
direct allocation
page read and write
2BF7000
trusted library allocation
page read and write
B370000
trusted library allocation
page execute and read and write
6D55000
heap
page read and write
2E7C000
trusted library allocation
page read and write
4C20000
heap
page execute and read and write
38D1000
trusted library allocation
page read and write
2113DBE0000
heap
page read and write
B1F0000
trusted library allocation
page execute and read and write
6AD9000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
5081000
trusted library allocation
page read and write
6350000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
8160000
trusted library allocation
page read and write
1ABD000
trusted library allocation
page execute and read and write
6B40000
trusted library allocation
page read and write
1140000
heap
page read and write
13486000
heap
page read and write
5B7A000
trusted library allocation
page read and write
3A15000
trusted library allocation
page read and write
2785000
trusted library allocation
page read and write
935000
heap
page read and write
4C6000
unkown
page readonly
2B93000
trusted library allocation
page read and write
3E20000
trusted library allocation
page read and write
35D2000
trusted library allocation
page read and write
8020000
heap
page read and write
835E000
stack
page read and write
E0D2000
heap
page read and write
782000
heap
page read and write
50EC000
trusted library allocation
page read and write
7FE00000
direct allocation
page read and write
4C4000
unkown
page readonly
6270000
trusted library allocation
page read and write
25E3000
heap
page read and write
3CD3000
trusted library allocation
page read and write
193F000
heap
page read and write
666000
trusted library allocation
page execute and read and write
AE8000
direct allocation
page read and write
13726000
trusted library allocation
page read and write
BCED000
heap
page read and write
32F4000
trusted library allocation
page read and write
1B30000
trusted library allocation
page read and write
9110000
heap
page read and write
14DC0000
trusted library allocation
page read and write
3273000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
D92000
unkown
page readonly
3F96000
heap
page read and write
2C3D000
trusted library allocation
page read and write
15C0000
heap
page read and write
75D0000
trusted library allocation
page read and write
2DFE000
stack
page read and write
14E9C000
trusted library allocation
page read and write
BD01000
heap
page read and write
1298E000
stack
page read and write
6470000
heap
page read and write
50D8000
trusted library allocation
page read and write
3CF5000
trusted library allocation
page read and write
66E000
stack
page read and write
1121000
trusted library allocation
page read and write
6BB9000
heap
page read and write
356A000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
2113ED70000
trusted library section
page readonly
3751000
trusted library allocation
page read and write
DFB000
heap
page read and write
A9C4000
trusted library allocation
page read and write
866000
heap
page read and write
2D5C000
trusted library allocation
page read and write
2EB6000
trusted library allocation
page read and write
1944000
heap
page read and write
F248000
trusted library allocation
page read and write
BCE5000
heap
page read and write
BA65000
heap
page read and write
14A69000
trusted library allocation
page read and write
93E000
heap
page read and write
3770000
trusted library allocation
page execute and read and write
62D6000
trusted library allocation
page read and write
14640000
trusted library allocation
page read and write
976000
heap
page read and write
2B8F000
trusted library allocation
page read and write
336D000
trusted library allocation
page read and write
4D60000
trusted library allocation
page read and write
6B90000
trusted library allocation
page read and write
1800000
heap
page read and write
211434F5000
heap
page read and write
E160000
trusted library allocation
page read and write
1810000
heap
page read and write
6332000
unkown
page readonly
2BB7000
trusted library allocation
page read and write
3758000
trusted library allocation
page read and write
28BE000
trusted library allocation
page read and write
1180000
heap
page read and write
5D8E000
stack
page read and write
1330000
heap
page read and write
90A0000
trusted library allocation
page read and write
918F000
heap
page read and write
4598000
trusted library allocation
page read and write
4200000
remote allocation
page read and write
54AA000
heap
page read and write
33DB000
trusted library allocation
page read and write
36FA000
trusted library allocation
page read and write
8C6000
heap
page read and write
1352F000
heap
page read and write
839E000
stack
page read and write
39E9D7C000
stack
page read and write
5A31000
heap
page read and write
211431D0000
trusted library allocation
page read and write
3E1A000
trusted library allocation
page read and write
14E98000
trusted library allocation
page read and write
8ACE000
stack
page read and write
36E8000
trusted library allocation
page read and write
1935000
heap
page read and write
353C000
trusted library allocation
page read and write
6A20000
trusted library allocation
page read and write
18C000
stack
page read and write
921B000
heap
page read and write
76B0000
trusted library allocation
page execute and read and write
2C81000
trusted library allocation
page read and write
5A4E000
stack
page read and write
13994000
trusted library allocation
page read and write
C1F1000
trusted library allocation
page read and write
138CC000
trusted library allocation
page read and write
14E92000
trusted library allocation
page read and write
70E000
heap
page read and write
AE99000
heap
page read and write
1C0D000
trusted library allocation
page execute and read and write
117E000
stack
page read and write
306C000
trusted library allocation
page read and write
DC3000
unkown
page readonly
569E000
stack
page read and write
5A70000
heap
page read and write
38E5000
trusted library allocation
page read and write
8B8000
heap
page read and write
21143330000
remote allocation
page read and write
398E000
trusted library allocation
page read and write
3BAE000
trusted library allocation
page read and write
259B000
trusted library allocation
page read and write
885F000
stack
page read and write
59FD000
stack
page read and write
6C7000
unkown
page write copy
50ED000
stack
page read and write
574E000
heap
page read and write
F33D000
trusted library allocation
page read and write
3420000
trusted library allocation
page execute and read and write
13C36000
trusted library allocation
page read and write
1581000
trusted library allocation
page read and write
2EEA000
trusted library allocation
page read and write
14D80000
trusted library allocation
page read and write
AEDD000
heap
page read and write
8BB000
heap
page read and write
1CC9000
heap
page read and write
2F09000
trusted library allocation
page read and write
AA60000
trusted library allocation
page read and write
5ECE000
stack
page read and write
A6CA000
trusted library allocation
page read and write
2B8D000
trusted library allocation
page read and write
91BD000
heap
page read and write
96F000
heap
page read and write
81A3000
trusted library allocation
page read and write
82F3000
trusted library allocation
page read and write
14D0000
heap
page read and write
6440000
trusted library allocation
page execute and read and write
4A30000
trusted library allocation
page read and write
2CB0000
trusted library allocation
page read and write
B9C9000
heap
page read and write
4F5D000
stack
page read and write
3516000
trusted library allocation
page read and write
211431C0000
trusted library allocation
page read and write
842F000
trusted library allocation
page read and write
A2A3000
heap
page read and write
6B07000
trusted library allocation
page read and write
6550000
trusted library allocation
page execute and read and write
2C97000
trusted library allocation
page read and write
3600000
trusted library allocation
page read and write
597A000
trusted library allocation
page read and write
2B9A000
trusted library allocation
page read and write
6D20000
heap
page read and write
2C93000
trusted library allocation
page read and write
4B9000
unkown
page read and write
2BE9000
trusted library allocation
page read and write
13F98000
trusted library allocation
page read and write
26A0000
direct allocation
page read and write
5BD5000
trusted library allocation
page read and write
146F000
stack
page read and write
7470000
heap
page read and write
4ADB000
trusted library allocation
page read and write
A890000
heap
page read and write
49EE000
stack
page read and write
32B0000
trusted library allocation
page read and write
2D4B000
trusted library allocation
page read and write
5D40000
trusted library allocation
page read and write
3CBD000
trusted library allocation
page read and write
76E000
stack
page read and write
4F94000
trusted library allocation
page read and write
6B1A000
trusted library allocation
page read and write
74A8000
direct allocation
page read and write
2EB8000
trusted library allocation
page read and write
6B70000
trusted library allocation
page execute and read and write
142D0000
trusted library allocation
page read and write
11FD000
trusted library allocation
page execute and read and write
14260000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
1CC0000
heap
page read and write
3A02000
trusted library allocation
page read and write
5979000
trusted library allocation
page read and write
3490000
heap
page read and write
2C59000
trusted library allocation
page read and write
86E000
heap
page read and write
2D49000
trusted library allocation
page read and write
3386000
trusted library allocation
page read and write
39E9A7E000
unkown
page readonly
5E1F000
stack
page read and write
7730000
trusted library allocation
page read and write
6530000
trusted library allocation
page execute and read and write
E05E000
heap
page read and write
6AD0000
trusted library allocation
page read and write
700000
trusted library allocation
page read and write
21143203000
trusted library allocation
page read and write
2B6E000
trusted library allocation
page read and write
DDC000
unkown
page readonly
AE00000
heap
page read and write
3D25000
trusted library allocation
page read and write
3388000
trusted library allocation
page read and write
35BD000
trusted library allocation
page read and write
33B0000
trusted library allocation
page read and write
AE1D000
heap
page read and write
BB14000
heap
page read and write
736000
trusted library allocation
page execute and read and write
4D2F000
stack
page read and write
77BF000
stack
page read and write
EF0000
heap
page read and write
4993000
trusted library allocation
page read and write
3FEC000
heap
page read and write
50F0000
trusted library allocation
page read and write
3960000
trusted library allocation
page read and write
134B000
heap
page read and write
80B1000
trusted library allocation
page read and write
36BE000
trusted library allocation
page read and write
E432000
trusted library allocation
page read and write
26C2000
trusted library allocation
page read and write
824F000
trusted library allocation
page read and write
13987000
trusted library allocation
page read and write
5B30000
trusted library allocation
page execute and read and write
A68E000
stack
page read and write
3650000
trusted library allocation
page read and write
26A7000
trusted library allocation
page read and write
338C000
trusted library allocation
page read and write
13BEC000
trusted library allocation
page read and write
5D70000
trusted library allocation
page read and write
BCE1000
heap
page read and write
5990000
trusted library allocation
page read and write
7950000
heap
page read and write
3CEB000
trusted library allocation
page read and write
E0000
unkown
page readonly
592F000
stack
page read and write
22000
unkown
page readonly
2113DCA0000
heap
page read and write
6513000
heap
page read and write
E030000
heap
page read and write
AF90000
trusted library allocation
page execute and read and write
33B0000
heap
page read and write
7EE2000
trusted library allocation
page read and write
2607000
trusted library allocation
page read and write
6295000
trusted library allocation
page read and write
6340000
trusted library allocation
page execute and read and write
61C0000
heap
page read and write
1C72000
trusted library allocation
page read and write
1710000
heap
page read and write
33A0000
trusted library allocation
page execute and read and write
74C0000
trusted library allocation
page execute and read and write
5570000
trusted library allocation
page read and write
401000
unkown
page execute read
776E000
stack
page read and write
39E9000
trusted library allocation
page read and write
3F88000
trusted library allocation
page read and write
15F5000
trusted library allocation
page read and write
8243000
trusted library allocation
page read and write
2CA8000
trusted library allocation
page read and write
7A8B000
stack
page read and write
2113DC90000
heap
page read and write
C09F000
heap
page read and write
3765000
trusted library allocation
page read and write
74C7000
direct allocation
page read and write
21143400000
heap
page read and write
6594000
trusted library allocation
page read and write
63C5000
trusted library allocation
page read and write
7437000
trusted library allocation
page read and write
BA63000
heap
page read and write
1AA6000
trusted library allocation
page read and write
5D60000
trusted library allocation
page read and write
60C0000
trusted library allocation
page execute and read and write
A69A000
trusted library allocation
page read and write
1BE0000
trusted library allocation
page read and write
5CCB000
stack
page read and write
6B16000
trusted library allocation
page read and write
6400000
trusted library allocation
page read and write
2C95000
trusted library allocation
page read and write
637C000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
1123000
trusted library allocation
page execute and read and write
3F0F000
stack
page read and write
7FE16000
direct allocation
page read and write
C0F5000
heap
page read and write
62CE000
trusted library allocation
page read and write
36B9000
trusted library allocation
page read and write
9A0000
heap
page read and write
7FBD000
stack
page read and write
2113ED80000
trusted library section
page readonly
8135000
trusted library allocation
page read and write
2114350D000
heap
page read and write
3576000
trusted library allocation
page read and write
B3AA000
trusted library allocation
page read and write
AFC0000
trusted library allocation
page read and write
3570000
trusted library allocation
page read and write
818D000
trusted library allocation
page read and write
1472000
trusted library allocation
page read and write
7EA6000
trusted library allocation
page read and write
81DE000
trusted library allocation
page read and write
3632000
trusted library allocation
page read and write
2EA3000
trusted library allocation
page read and write
60E000
stack
page read and write
335A000
trusted library allocation
page read and write
6AF0000
heap
page read and write
2680000
trusted library allocation
page read and write
598B000
trusted library allocation
page read and write
65D000
trusted library allocation
page execute and read and write
2E28000
trusted library allocation
page read and write
AD20000
heap
page read and write
39EA17B000
stack
page read and write
5965000
trusted library allocation
page read and write
9A5000
heap
page read and write
62A0000
trusted library allocation
page execute and read and write
2C12000
trusted library allocation
page read and write
FF4B000
trusted library allocation
page read and write
976000
heap
page read and write
A5F0000
trusted library allocation
page execute and read and write
83EF000
trusted library allocation
page read and write
BF20000
heap
page read and write
C01F000
heap
page read and write
A83000
direct allocation
page read and write
2BA8000
trusted library allocation
page read and write
8294000
trusted library allocation
page read and write
3B34000
trusted library allocation
page read and write
2586000
trusted library allocation
page read and write
27C0000
heap
page read and write
5293000
trusted library allocation
page read and write
51C8000
trusted library allocation
page read and write
7693000
trusted library allocation
page read and write
14095000
trusted library allocation
page read and write
851A000
heap
page read and write
6B30000
heap
page read and write
478D000
trusted library allocation
page read and write
5D86000
trusted library allocation
page read and write
4F6B000
trusted library allocation
page read and write
632E000
stack
page read and write
3675000
trusted library allocation
page read and write
5916000
trusted library allocation
page read and write
5E16000
heap
page read and write
1850000
heap
page read and write
5C3E000
stack
page read and write
2D43000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
1214000
trusted library allocation
page read and write
AE07000
heap
page read and write
4AD4000
trusted library allocation
page read and write
1399F000
trusted library allocation
page read and write
4140000
trusted library allocation
page read and write
63A5000
trusted library allocation
page read and write
6AE0000
trusted library allocation
page read and write
3059000
trusted library allocation
page read and write
5099000
trusted library allocation
page read and write
5B80000
heap
page execute and read and write
3FA6000
heap
page read and write
DEE000
stack
page read and write
776000
heap
page read and write
4F83000
trusted library allocation
page read and write
54DE000
stack
page read and write
DD30000
trusted library allocation
page read and write
1368F000
trusted library allocation
page read and write
E15E000
heap
page read and write
9A0000
heap
page read and write
62C9000
heap
page read and write
211431C0000
trusted library allocation
page read and write
983000
heap
page read and write
259D000
trusted library allocation
page read and write
63E7000
trusted library allocation
page read and write
37CB000
trusted library allocation
page read and write
3B47000
trusted library allocation
page read and write
637E000
trusted library allocation
page read and write
67C0000
heap
page read and write
63E0000
trusted library allocation
page read and write
9A6000
heap
page read and write
666C000
stack
page read and write
3640000
trusted library allocation
page read and write
21143440000
heap
page read and write
211434F9000
heap
page read and write
5E90000
trusted library allocation
page execute and read and write
786E000
stack
page read and write
62D9000
trusted library allocation
page read and write
6AE9000
trusted library allocation
page read and write
9A6000
heap
page read and write
B090000
trusted library allocation
page execute and read and write
7538000
direct allocation
page read and write
81D9000
trusted library allocation
page read and write
27F1000
trusted library allocation
page read and write
1447000
trusted library allocation
page execute and read and write
2589000
trusted library allocation
page read and write
6460000
trusted library allocation
page execute and read and write
64E6000
heap
page read and write
433F000
stack
page read and write
13F77000
trusted library allocation
page read and write
13F8D000
trusted library allocation
page read and write
3723000
trusted library allocation
page read and write
5F20000
trusted library allocation
page read and write
2639000
direct allocation
page read and write
516E000
trusted library allocation
page read and write
A261000
heap
page read and write
6DE000
unkown
page readonly
17CE000
heap
page read and write
A2A5000
heap
page read and write
13A5A000
trusted library allocation
page read and write
A29A000
heap
page read and write
6360000
trusted library allocation
page execute and read and write
2113DCAE000
heap
page read and write
BF30000
heap
page read and write
AD22000
heap
page read and write
147B000
stack
page read and write
62C1000
heap
page read and write
10F7000
stack
page read and write
3980000
trusted library allocation
page read and write
3529000
trusted library allocation
page read and write
13C5C000
trusted library allocation
page read and write
1806000
heap
page read and write
113D000
trusted library allocation
page execute and read and write
2C76000
trusted library allocation
page read and write
3B2D000
trusted library allocation
page read and write
62E2000
trusted library allocation
page read and write
60AB000
stack
page read and write
987000
heap
page read and write
13673000
trusted library allocation
page read and write
48CD000
trusted library allocation
page read and write
34BD000
heap
page read and write
4F88000
trusted library allocation
page read and write
6808000
trusted library allocation
page read and write
5390000
trusted library allocation
page execute and read and write
846A000
trusted library allocation
page read and write
A7CE000
stack
page read and write
28C4000
trusted library allocation
page read and write
5DB0000
trusted library allocation
page read and write
51EB000
trusted library allocation
page read and write
257A000
trusted library allocation
page read and write
2751000
trusted library allocation
page read and write
1CC5000
heap
page read and write
4160000
heap
page read and write
5960000
trusted library allocation
page read and write
2EF9000
trusted library allocation
page read and write
6236000
trusted library allocation
page read and write
100D3000
unkown
page read and write
81A8000
trusted library allocation
page read and write
2736000
trusted library allocation
page read and write
AC0000
trusted library allocation
page execute and read and write
A142000
heap
page read and write
56FD000
heap
page read and write
2C8B000
trusted library allocation
page read and write
3F50000
heap
page read and write
2950000
trusted library allocation
page read and write
35CA000
trusted library allocation
page read and write
E84E000
stack
page read and write
4D85000
trusted library allocation
page read and write
90E000
heap
page read and write
60FE000
stack
page read and write
1AC8000
heap
page read and write
149F0000
trusted library allocation
page read and write
13EF3000
trusted library allocation
page read and write
13720000
trusted library allocation
page read and write
3785000
trusted library allocation
page read and write
13F70000
trusted library allocation
page read and write
39EABFE000
stack
page read and write
5DB0000
trusted library allocation
page read and write
A690000
trusted library allocation
page read and write
3572000
trusted library allocation
page read and write
7F28000
trusted library allocation
page read and write
2F77000
heap
page read and write
75A0000
heap
page read and write
E30E000
stack
page read and write
6300000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
There are 3364 hidden memdumps, click here to show them.