Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Program.Unwanted.5412.9308.3353.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\Right Backup\is-1OA4D.tmp
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-6ESI6.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-7Q60P.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-K8A67.tmp
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-RSVNH.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-UGSPB.tmp
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-FD3PS.tmp\SecuriteInfo.com.Program.Unwanted.5412.9308.3353.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\AWSSDK.Core.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\AWSSDK.S3.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\AppResource.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\Chinese_rbkp_ZH-CN.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF, CR line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\Chinese_rbkp_ZH-TW.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\FSLibRsyncWrapper.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\Finnish_rbkp_FI.ini (copy)
|
Unicode text, UTF-16, little-endian text, with very long lines (429), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\HtmlRenderer.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\Interop.IWshRuntimeLibrary.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\Microsoft.SqlServer.Types.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\Microsoft.Win32.TaskScheduler.DLL (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\RBClientService.exe (copy)
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\RBClientService.exe.config (copy)
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\RBNotifier.exe (copy)
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\RBNotifier_log.txt
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\RightBackup.exe (copy)
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\RightBackup.exe.config (copy)
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\STBackupclient.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\SevenZipSharp.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\System.Core.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\System.Data.DataSetExtensions.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\System.Data.SQLite.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\System.Runtime.Serialization.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\System.Threading.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\danish_rbkp_DA.ini (copy)
|
Unicode text, UTF-16, little-endian text, with very long lines (393), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\dutch_rbkp_NL.ini (copy)
|
Unicode text, UTF-16, little-endian text, with very long lines (342), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\eng_rbkp_en.ini (copy)
|
Generic INItialization configuration [RBACKUP_STRINGS]
|
dropped
|
||
C:\Program Files (x86)\Right Backup\french_rbkp_FR.ini (copy)
|
Unicode text, UTF-16, little-endian text, with very long lines (425), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\german_rbkp_DE.ini (copy)
|
Unicode text, UTF-16, little-endian text, with very long lines (415), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\graph.avi (copy)
|
RIFF (little-endian) data, AVI, 136 x 136, 12.00 fps, video: uncompressed
|
dropped
|
||
C:\Program Files (x86)\Right Backup\graph_red.avi (copy)
|
RIFF (little-endian) data, AVI, 136 x 136, 12.00 fps, video: uncompressed, audio: uncompressed PCM (stereo, 48000 Hz)
|
dropped
|
||
C:\Program Files (x86)\Right Backup\greek_rbkp_EL.ini (copy)
|
Unicode text, UTF-16, little-endian text, with very long lines (431), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-10V6O.tmp
|
Unicode text, UTF-16, little-endian text, with very long lines (380), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-2DNNP.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-2T469.tmp
|
Unicode text, UTF-16, little-endian text, with very long lines (429), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-44SVA.tmp
|
Unicode text, UTF-16, little-endian text, with very long lines (372), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-5DNPD.tmp
|
Unicode text, UTF-16, little-endian text, with very long lines (425), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-65K01.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-6UOQU.tmp
|
Unicode text, UTF-16, little-endian text, with very long lines (441), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-772TG.tmp
|
Unicode text, UTF-16, little-endian text, with very long lines (393), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-83LLE.tmp
|
Generic INItialization configuration [RBACKUP_STRINGS]
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-86NQ8.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-9OJG3.tmp
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-A8JFA.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-AR7RJ.tmp
|
RIFF (little-endian) data, AVI, 136 x 136, 12.00 fps, video: uncompressed
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-BB995.tmp
|
Unicode text, UTF-16, little-endian text, with very long lines (415), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-BBM96.tmp
|
Unicode text, UTF-16, little-endian text, with very long lines (400), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-C7UUC.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-CUIAS.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-DSQK9.tmp
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-E6IFT.tmp
|
Unicode text, UTF-16, little-endian text, with very long lines (342), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-GEL0D.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-GQNVN.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-GR5UV.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-HS8VR.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-I6AVM.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-ILJ84.tmp
|
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-ILP9R.tmp
|
RIFF (little-endian) data, AVI, 136 x 136, 12.00 fps, video: uncompressed, audio: uncompressed PCM (stereo, 48000 Hz)
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-KH7G4.tmp
|
RIFF (little-endian) data, AVI, 25 x 36, 24.00 fps, video: uncompressed
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-LLLC0.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-M6CE2.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF, CR line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-O4A3A.tmp
|
Unicode text, UTF-16, little-endian text, with very long lines (460), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-QJJ9M.tmp
|
Unicode text, UTF-16, little-endian text, with very long lines (370), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-QUK8H.tmp
|
Unicode text, UTF-16, little-endian text, with very long lines (399), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-R278I.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-RHSP2.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-S4F4B.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-SGCSF.tmp
|
Unicode text, UTF-16, little-endian text, with very long lines (374), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-U9DNA.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-UO3MV.tmp
|
Unicode text, UTF-16, little-endian text, with very long lines (400), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-VKH9R.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\is-VU0HR.tmp
|
Unicode text, UTF-16, little-endian text, with very long lines (431), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\italian_rbkp_IT.ini (copy)
|
Unicode text, UTF-16, little-endian text, with very long lines (400), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\japanese_rbkp_JA.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\korean_rbkp_KO.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\loadingbg.avi (copy)
|
RIFF (little-endian) data, AVI, 25 x 36, 24.00 fps, video: uncompressed
|
dropped
|
||
C:\Program Files (x86)\Right Backup\norwegian_rbkp_NO.ini (copy)
|
Unicode text, UTF-16, little-endian text, with very long lines (372), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\notifier.ini (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\notifierlib.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\polish_rbkp_PL.ini (copy)
|
Unicode text, UTF-16, little-endian text, with very long lines (400), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\portuguese_rbkp_PT-BR.ini (copy)
|
Unicode text, UTF-16, little-endian text, with very long lines (370), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\portuguese_rbkp_PT_PT.ini (copy)
|
Unicode text, UTF-16, little-endian text, with very long lines (374), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\russian_rbkp_ru.ini (copy)
|
Unicode text, UTF-16, little-endian text, with very long lines (441), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\spanish_rbkp_ES.ini (copy)
|
Unicode text, UTF-16, little-endian text, with very long lines (460), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\swedish_rbkp_SV.ini (copy)
|
Unicode text, UTF-16, little-endian text, with very long lines (399), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\turkish_rbkp_TR.ini (copy)
|
Unicode text, UTF-16, little-endian text, with very long lines (380), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Right Backup\unins000.dat
|
InnoSetup Log Right Backup, version 0x418, 153583 bytes, 701188\37\user\37, C:\Program Files (x86)\Right Backup\376\37
|
dropped
|
||
C:\Program Files (x86)\Right Backup\unins000.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Right Backup\unins000.msg
|
InnoSetup messages, version 6.0.0, 261 messages (UTF-16), Cancel installation
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0xbe3d1c7e, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Right Backup\Right Backup.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Thu Apr 18 22:33:17 2024, mtime=Thu Apr 18 22:33:17 2024, atime=Wed Jul 12 16:39:26 2023, length=6809984, window=hide
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Right Backup\Uninstall Right Backup.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Thu Apr 18 22:33:17 2024, mtime=Thu Apr 18 22:33:17 2024, atime=Thu Apr 18 22:32:56 2024, length=3238784, window=hide
|
dropped
|
||
C:\ProgramData\Systweak\Right Backup\-1\DB\SettingDB.db
|
data
|
dropped
|
||
C:\ProgramData\Systweak\Right Backup\-1\DB\SettingDB.db-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\ProgramData\Systweak\Right Backup\Logs\RBClientService.txt
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
modified
|
||
C:\ProgramData\Systweak\Right Backup\Logs\RightBackup.txt
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Systweak\Right Backup\rules\ignorerules.xml (copy)
|
XML 1.0 document, ASCII text, with very long lines (6128), with no line terminators
|
dropped
|
||
C:\ProgramData\Systweak\Right Backup\rules\is-FLJIB.tmp
|
XML 1.0 document, ASCII text, with very long lines (6128), with no line terminators
|
dropped
|
||
C:\ProgramData\Systweak\Right Backup\rules\is-GBDPB.tmp
|
XML 1.0 document, ASCII text, with very long lines (2125), with no line terminators
|
dropped
|
||
C:\ProgramData\Systweak\Right Backup\rules\is-UKI8B.tmp
|
SQLite 3.x database, last written using SQLite version 0, page size 1024, file counter 2, database pages 0, cookie 0x1, schema
4, UTF-8, version-valid-for 0
|
dropped
|
||
C:\ProgramData\Systweak\Right Backup\rules\sfe.db (copy)
|
SQLite 3.x database, last written using SQLite version 0, page size 1024, file counter 2, database pages 0, cookie 0x1, schema
4, UTF-8, version-valid-for 0
|
dropped
|
||
C:\ProgramData\Systweak\Right Backup\rules\smartbackuprules.xml (copy)
|
XML 1.0 document, ASCII text, with very long lines (2125), with no line terminators
|
dropped
|
||
C:\Users\Public\Desktop\Right Backup.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Thu Apr 18 22:33:17 2024, mtime=Thu Apr 18 22:33:19 2024, atime=Wed Jul 12 16:39:26 2023, length=6809984, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RBNotifier.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RightBackup.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\DOMStore\E32A7KZM\www.rightbackup[1].xml
|
ASCII text, with very long lines (415), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\Alert_icon[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 49x51, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\FullScreenNormal[1]
|
GIF image data, version 89a, 19 x 15
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\Red_strip[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 734x51, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\Small_fixerror_dis_left[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 12x36, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\Small_fixerror_dis_left[2]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 12x36, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\Small_fixerror_dis_right[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 33x36, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\Small_fixerror_n_right[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 33x36, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\afterinstall[1].htm
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\amazon[1]
|
GIF image data, version 89a, 132 x 82
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\awards_blank[1]
|
GIF image data, version 89a, 166 x 53
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\backup_status_bg_bottom[1]
|
GIF image data, version 89a, 210 x 10
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\btn_Upgrade_full_version_down[1]
|
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 246x43, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\btn_blue_left_d[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 15x53, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\btn_blue_middle_d[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x53, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\btn_blue_middle_h[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x53, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\btn_blue_right_h[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 15x53, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\calculate[1]
|
GIF image data, version 89a, 19 x 19
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\close_btn[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 30x10, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\cloudBackup_restore[1]
|
GIF image data, version 89a, 155 x 163
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\cloud_effect[1]
|
GIF image data, version 89a, 733 x 326
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\emailconfirm[1]
|
GIF image data, version 89a, 15 x 15
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\error_bg[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x65, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\flags_strip[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 280x11, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\free_space_bg_2[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 79x56, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\getipaddress[1].htm
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\graph_bg_left[1]
|
PNG image data, 8 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\graph_bg_middle[1]
|
PNG image data, 1 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\graph_bg_right[1]
|
PNG image data, 8 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\graph_bg_right[2]
|
PNG image data, 8 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\home_status_bottom_left_green[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 225x86, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\home_status_bottom_left_red[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 225x86, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\home_status_bottom_middle_green[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x86, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\home_status_bottom_middle_red[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x86, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\home_status_top_left_green[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 225x182, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\home_status_top_left_red[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 225x182, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\home_status_top_left_red[2]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 225x182, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\home_status_top_middle_green[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x182, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\home_status_top_middle_red[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x182, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\home_status_top_middle_red[2]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x182, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\infoBackupPriority[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=3, software=Adobe Photoshop CC 2018 (Macintosh),
datetime=2018-06-07T07:02:37+05:30], baseline, precision 8, 12x12, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\inner_page_btn_bg[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x65, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\inner_page_btn_bg[2]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x65, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\js[1].js
|
ASCII text, with very long lines (4179)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\js[2].js
|
ASCII text, with very long lines (5955)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\left_black_bg[1]
|
GIF image data, version 89a, 32 x 32
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\left_mgcp[1]
|
GIF image data, version 89a, 170 x 59
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\left_tel[1]
|
GIF image data, version 89a, 165 x 41
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\left_tel[2]
|
GIF image data, version 89a, 165 x 41
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\link[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 20x20, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\minimize_btn[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 30x10, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\my-account-btn[1].png
|
PNG image data, 149 x 43, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\new_schedule[1]
|
GIF image data, version 89a, 19 x 19
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\on[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 48x22, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\play[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\play_disable[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\popper.min[1].js
|
ASCII text, with very long lines (19015)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\progress_green[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=12, height=18, bps=158, PhotometricIntepretation=RGB,
orientation=upper-left, width=1], baseline, precision 8, 1x18, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\progress_yellow[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x18, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\refersh[1]
|
GIF image data, version 89a, 13 x 16
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\smartBackup_icon[1]
|
GIF image data, version 89a, 270 x 30
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\smart_bg_bottom_middle[1]
|
GIF image data, version 89a, 1 x 9
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\smart_bg_bottom_right[1]
|
GIF image data, version 89a, 9 x 9
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\smart_bg_left_middle[1]
|
GIF image data, version 89a, 9 x 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\smart_bg_top_right[1]
|
GIF image data, version 89a, 9 x 17
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\start-bck-btn[1].png
|
PNG image data, 139 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\stop[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\stop_disable[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\storgae_bg_frame_right[1]
|
GIF image data, version 89a, 6 x 97
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\titlebar_bg[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x19, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\titlebar_bg[2]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x19, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\tooltip_bottom_middle[1]
|
PNG image data, 1 x 8, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\tooltip_right_top[1]
|
PNG image data, 8 x 8, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\upgrade_bg_left[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 3x187, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\user[1]
|
GIF image data, version 89a, 15 x 15
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\username_bg_left[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 13x23, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\1x1[1].png
|
PNG image data, 1 x 1, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\Alert_icon2[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 49x49, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\Expand[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 13x13, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\FullScreenNormal[1]
|
GIF image data, version 89a, 19 x 15
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\Restore_icon[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 56x38, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\Small_fixerror_dis_middle[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x36, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\Small_fixerror_dis_middle[2]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x36, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\Small_fixerror_n_left[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 12x36, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\Small_fixerror_n_middle[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x36, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\Small_fixerror_n_middle[2]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x36, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\Small_fixerror_n_right[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 33x36, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\afterinstall_ss_windows_notms[1].png
|
PNG image data, 367 x 290, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\alert_popup[1]
|
GIF image data, version 89a, 34 x 34
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\awards[1]
|
GIF image data, version 89a, 166 x 53
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\backup_icon[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 56x38, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\backup_status_bg_bottom[1]
|
GIF image data, version 89a, 210 x 10
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\backup_status_bg_middle[1]
|
GIF image data, version 89a, 210 x 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\btn_Upgrade_full_version_down[1]
|
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 246x43, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\btn_Upgrade_full_version_down[2]
|
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 246x43, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\btn_Upgrade_full_version_hover[1]
|
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 246x43, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\btn_blue_left_d[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 15x53, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\btn_blue_left_h[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 15x53, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\btn_blue_middle_h[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x53, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\btn_blue_right_n[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 15x53, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\circle[1]
|
GIF image data, version 89a, 79 x 79
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\common[1].js
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\company_logo[1]
|
GIF image data, version 89a, 158 x 24
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\email[1]
|
GIF image data, version 89a, 15 x 15
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\error_bg[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x65, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\error_info[1]
|
GIF image data, version 89a, 15 x 15
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\getipaddress[1].asp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\graph_bg[1]
|
GIF image data, version 89a, 136 x 135
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\graph_bg_left[1]
|
PNG image data, 8 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\gray_dummy[1]
|
PNG image data, 132 x 34, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\home_refersh[1]
|
GIF image data, version 89a, 16 x 16
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\home_status_bottom_left_green[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 225x86, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\home_status_bottom_left_red[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 225x86, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\home_status_bottom_middle_red[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x86, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\home_status_top_right_green[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 10x182, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\inner_page_btn_bg[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x65, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\inner_tab_right[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 30x28, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\jquery.min[1].js
|
ASCII text, with very long lines (32038)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\left_black_bg[1]
|
GIF image data, version 89a, 32 x 32
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\left_mgcp[1]
|
GIF image data, version 89a, 170 x 59
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\logo[1].png
|
PNG image data, 259 x 51, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\new_schedule[1]
|
GIF image data, version 89a, 19 x 19
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\pause_disable[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\play[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\progressBar[1]
|
GIF image data, version 89a, 729 x 16
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\progress_green[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=12, height=18, bps=158, PhotometricIntepretation=RGB,
orientation=upper-left, width=1], baseline, precision 8, 1x18, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\progress_orange[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=12, height=18, bps=158, PhotometricIntepretation=RGB,
orientation=upper-left, width=1], baseline, precision 8, 1x18, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\progress_orange[2]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=12, height=18, bps=158, PhotometricIntepretation=RGB,
orientation=upper-left, width=1], baseline, precision 8, 1x18, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\progressbar_middle[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x7, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\progressbar_right[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=12, height=20, bps=158, PhotometricIntepretation=RGB,
orientation=upper-left, width=2], progressive, precision 8, 1x20, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\smart_bg_bottom_left[1]
|
GIF image data, version 89a, 9 x 9
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\smart_bg_bottom_middle[1]
|
GIF image data, version 89a, 1 x 9
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\smart_bg_top_middle[1]
|
GIF image data, version 89a, 1 x 17
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\smart_bg_top_right[1]
|
GIF image data, version 89a, 9 x 17
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\storgae_bg_frame_mid[1]
|
GIF image data, version 89a, 1 x 97
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\sync_pc_enable[1]
|
GIF image data, version 89a, 16 x 16
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\sync_tick[1]
|
GIF image data, version 89a, 14 x 14
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\system_tray_disable[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\tooltip_left_bottom[1]
|
PNG image data, 8 x 8, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\tooltip_top_middle[1]
|
PNG image data, 1 x 8, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\used_space_bg_2[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=12, height=56, bps=158, PhotometricIntepretation=RGB,
orientation=upper-left, width=79], baseline, precision 8, 79x56, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\used_space_bg_2[2]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=12, height=56, bps=158, PhotometricIntepretation=RGB,
orientation=upper-left, width=79], baseline, precision 8, 79x56, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\username_bg_middle[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x23, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\username_bg_right[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 13x23, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\Collapse[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 13x13, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\Expand[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 13x13, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\Fix_errors_n_left[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 12x36, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\Fix_errors_n_middle[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x36, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\RB_folder_sync[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 31x35, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\Small_fixerror_dis_right[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 33x36, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\Tick_gray[1]
|
GIF image data, version 89a, 14 x 14
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\admin[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 15x23, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\after-install[1].htm
|
HTML document, Unicode text, UTF-8 text, with very long lines (955), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\afterinstall[1].aspx
|
ASCII text, with very long lines (704), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\afterinstall_upload[1].png
|
PNG image data, 110 x 102, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\alert_popup[1]
|
GIF image data, version 89a, 34 x 34
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\analytics[1].js
|
ASCII text, with very long lines (2343)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\backup_status_bg_top[1]
|
GIF image data, version 89a, 210 x 84
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\bat[1].js
|
Unicode text, UTF-8 text, with very long lines (46429), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\btn_Upgrade_full_version_normal[1]
|
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 246x43, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\btn_Upgrade_full_version_normal[2]
|
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 246x43, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\btn_blue_left_n[1]
|
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 15x53, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\btn_blue_left_n[2]
|
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 15x53, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\btn_blue_middle_d[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x53, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\btn_blue_middle_n[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x53, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\btn_blue_right_d[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 15x53, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\btn_blue_right_h[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 15x53, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\calculate[1]
|
GIF image data, version 89a, 19 x 19
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\close_btn[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 30x10, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\cloudBackup[1]
|
GIF image data, version 89a, 155 x 163
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\cloudstorage_icon[1]
|
GIF image data, version 89a, 32 x 32
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\cloudstorage_icon[2]
|
GIF image data, version 89a, 32 x 32
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\free_space_bg_2[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 79x56, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\getipaddress[1].txt
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\graph_bg[1]
|
GIF image data, version 89a, 136 x 135
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\graph_bg_middle[1]
|
PNG image data, 1 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\home_refersh[1]
|
GIF image data, version 89a, 16 x 16
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\home_status_bottom_left_red[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 225x86, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\home_status_bottom_middle_green[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x86, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\home_status_bottom_middle_red[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x86, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\home_status_bottom_right_green[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 10x86, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\home_status_top_left_red[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 225x182, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\home_status_top_middle_red[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x182, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\inner_page_btn_bg[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x65, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\inner_page_btn_bg[2]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x65, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\inner_tab_left[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 30x28, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\js[1].js
|
ASCII text, with very long lines (5955)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\js[2].js
|
ASCII text, with very long lines (7432)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\login_icon[1].png
|
PNG image data, 15 x 15, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\logo[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 184x72, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\modal[1].css
|
ASCII text, with very long lines (598)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\new_schedule[1]
|
GIF image data, version 89a, 19 x 19
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\password[1]
|
GIF image data, version 89a, 15 x 15
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\pause[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\play_disable[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\process_done[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 49x48, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\progress_yellow[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x18, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\progressbar_middle[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x7, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\smartBackup_icon[1]
|
GIF image data, version 89a, 270 x 30
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\smart_bg_bottom_right[1]
|
GIF image data, version 89a, 9 x 9
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\smart_bg_left_middle[1]
|
GIF image data, version 89a, 9 x 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\smart_bg_right_middle[1]
|
GIF image data, version 89a, 9 x 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\smart_bg_top_left[1]
|
GIF image data, version 89a, 9 x 17
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\stop[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\stop_disable[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\storgae_bg_frame_left[1]
|
GIF image data, version 89a, 6 x 97
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\storgae_bg_frame_left[2]
|
GIF image data, version 89a, 6 x 97
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\storgae_bg_frame_mid[1]
|
GIF image data, version 89a, 1 x 97
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\storgae_bg_frame_right[1]
|
GIF image data, version 89a, 6 x 97
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\sync_cloud_enable[1]
|
GIF image data, version 89a, 16 x 16
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\system_tray[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\tick[1]
|
GIF image data, version 89a, 15 x 15
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\tooltip_left_middle[1]
|
PNG image data, 8 x 1, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\tooltip_right_bottom[1]
|
PNG image data, 8 x 8, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\trservice[1].js
|
ASCII text, with very long lines (1676)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\upgrade_bg_right[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 3x187, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\used_space_bg_1[1]
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 79x56, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\wizard_saperator[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 50x221, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Collapse[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 13x13, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Fix_errors_n_right[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 31x36, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Green_strip[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=12, height=49, bps=158, PhotometricIntepretation=RGB,
orientation=upper-left, width=1], progressive, precision 8, 1x49, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Small_fixerror_n_left[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 12x36, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\about_mgcp[1]
|
GIF image data, version 89a, 204 x 43
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\afterinstall[1].htm
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\afterpages[1].css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\arrow[1]
|
GIF image data, version 89a, 10 x 10
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\awards[1]
|
GIF image data, version 89a, 166 x 53
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\back_arrow[1]
|
GIF image data, version 89a, 14 x 14
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\backup_status_bg_middle[1]
|
GIF image data, version 89a, 210 x 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\backup_status_bg_top[1]
|
GIF image data, version 89a, 210 x 84
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\btn_Upgrade_full_version_hover[1]
|
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 246x43, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\btn_Upgrade_full_version_hover[2]
|
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 246x43, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\btn_Upgrade_full_version_normal[1]
|
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 246x43, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\btn_blue_left_h[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 15x53, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\btn_blue_middle_n[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x53, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\btn_blue_right_d[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 15x53, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\btn_blue_right_n[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 15x53, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\calander_icon[1]
|
GIF image data, version 89a, 20 x 20
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\calculate[1]
|
GIF image data, version 89a, 19 x 19
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\circle[1]
|
GIF image data, version 89a, 79 x 79
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\down_arrow[1]
|
GIF image data, version 89a, 7 x 4
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\free_space_cloud_poup[1].png
|
PNG image data, 271 x 164, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\getipaddress[1].htm
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\graph_bg[1]
|
GIF image data, version 89a, 136 x 135
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\home_status_bottom_right_green[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 10x86, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\home_status_bottom_right_red[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 10x86, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\home_status_top_left_green[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 225x182, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\home_status_top_middle_green[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x182, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\home_status_top_right_green[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 10x182, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\home_status_top_right_red[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 10x182, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\inner_page_btn_bg[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x65, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\inner_tab_middle[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 10x84, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\ip[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\load[1]
|
GIF image data, version 89a, 128 x 128
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\logo[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 184x72, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\os_icon[1].png
|
PNG image data, 90 x 18, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\pause[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\pause_disable[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\poup_greentick[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 16x16, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\process_done[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 49x48, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\progress_green[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=12, height=18, bps=158, PhotometricIntepretation=RGB,
orientation=upper-left, width=1], baseline, precision 8, 1x18, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\progressbar_left[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=12, height=20, bps=158, PhotometricIntepretation=RGB,
orientation=upper-left, width=2], progressive, precision 8, 1x20, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\progressbar_middle[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x7, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\refresh_blue[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 16x16, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\share[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 20x20, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\smart_bg_bottom_left[1]
|
GIF image data, version 89a, 9 x 9
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\smart_bg_right_middle[1]
|
GIF image data, version 89a, 9 x 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\smart_bg_top_left[1]
|
GIF image data, version 89a, 9 x 17
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\smart_bg_top_middle[1]
|
GIF image data, version 89a, 1 x 17
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\smart_info_icon[1]
|
GIF image data, version 89a, 12 x 12
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\smart_info_icon[2]
|
GIF image data, version 89a, 12 x 12
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\sync[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 20x20, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\system_tray[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\system_tray_disable[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 35x35, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\thank_award[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 153x169, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\tick[1]
|
GIF image data, version 89a, 15 x 15
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\tooltip_left_top[1]
|
PNG image data, 8 x 8, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\tooltip_right_middle[1]
|
PNG image data, 8 x 1, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\tracking[1].js
|
ASCII text, with very long lines (444)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\trackpixel[1].json
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\typography[1].css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\upgrade_bg_middle[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x187, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\used_space_bg_2[1]
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=12, height=56, bps=158, PhotometricIntepretation=RGB,
orientation=upper-left, width=79], baseline, precision 8, 79x56, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\verisign[1]
|
GIF image data, version 89a, 132 x 82
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-468CM.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-468CM.tmp\isxdl.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Right Backup.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Thu Apr 18 22:33:17 2024, mtime=Thu Apr 18 22:33:40 2024, atime=Wed Jul 12 16:39:26 2023, length=6809984, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Systweak\Right Backup\Update.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Systweak\Right Backup\ipdetail.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Systweak\Right Backup\ipini.ini
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Systweak\Right Backup\notifier.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Systweak\Right Backup\ntfrUpdate.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
There are 399 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5412.9308.3353.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5412.9308.3353.exe"
|
||
C:\Users\user\AppData\Local\Temp\is-FD3PS.tmp\SecuriteInfo.com.Program.Unwanted.5412.9308.3353.tmp
|
"C:\Users\user\AppData\Local\Temp\is-FD3PS.tmp\SecuriteInfo.com.Program.Unwanted.5412.9308.3353.tmp" /SL5="$10474,14009033,878592,C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5412.9308.3353.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"C:\Windows\System32\taskkill.exe" /f /im "RBClientService.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"C:\Windows\System32\taskkill.exe" /f /im "RightBackup.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"C:\Windows\System32\taskkill.exe" /f /im "RightBackup.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"C:\Windows\System32\taskkill.exe" /f /im "RBClientService.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"C:\Windows\System32\taskkill.exe" /f /im "RightBackup.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"C:\Windows\System32\taskkill.exe" /f /im "RBClientService.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"C:\Windows\System32\taskkill.exe" /f /im "RBNotifier.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"C:\Windows\System32\taskkill.exe" /f /im "RightBackup.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"C:\Windows\System32\taskkill.exe" /f /im "RBClientService.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"C:\Windows\System32\taskkill.exe" /f /im "RightBackup.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"C:\Windows\System32\taskkill.exe" /f /im "RBClientService.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"C:\Windows\System32\taskkill.exe" /f /im "RightBackup.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"C:\Windows\System32\taskkill.exe" /f /im "RBClientService.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"C:\Windows\System32\taskkill.exe" /f /im "RBNotifier.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"C:\Windows\System32\taskkill.exe" /f /im "RightBackup.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"C:\Windows\System32\taskkill.exe" /f /im "RBClientService.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"C:\Windows\System32\taskkill.exe" /f /im "RBNotifier.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /delete /tn "NotifierRight Backup" /f
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /delete /tn "NotifierRight Backup_startup" /f
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /delete /tn "Right BackupNotifier" /f
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /delete /tn "Right BackupNotifier_startup" /f
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /delete /tn "Right BackupNotifier_trigger" /f
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /delete /tn "NotifierRight Backup_WD" /f
|
||
C:\Program Files (x86)\Right Backup\RightBackup.exe
|
"C:\Program Files (x86)\Right Backup\RightBackup.exe" loadvalues
|
||
C:\Program Files (x86)\Right Backup\RightBackup.exe
|
"C:\Program Files (x86)\Right Backup\RightBackup.exe" install
|
||
C:\Program Files (x86)\Right Backup\RBClientService.exe
|
"C:\Program Files (x86)\Right Backup\RBClientService.exe"
|
||
C:\Program Files (x86)\Right Backup\RightBackup.exe
|
"C:\Program Files (x86)\Right Backup\RightBackup.exe" firstinstall -autoscanafterinstall -fireurlsilently
|
||
C:\Program Files (x86)\Right Backup\RBNotifier.exe
|
"C:\Program Files (x86)\Right Backup\RBNotifier.exe" createschedule -fireurlsilently
|
||
C:\Program Files (x86)\Right Backup\RightBackup.exe
|
"C:\Program Files (x86)\Right Backup\RightBackup.exe" loadvalues
|
||
C:\Program Files (x86)\Right Backup\RightBackup.exe
|
"C:\Program Files (x86)\Right Backup\RightBackup.exe" autolaunch
|
||
C:\Program Files (x86)\Right Backup\RBNotifier.exe
|
"C:\Program Files (x86)\Right Backup\RBNotifier.exe" neweventtrigger
|
||
C:\Program Files (x86)\Right Backup\RBNotifier.exe
|
"C:\Program Files (x86)\Right Backup\RBNotifier.exe" startup
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
There are 48 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.rightbackup.com/getipaddress.asp/
|
157.245.131.96
|
||
https://www.rightbackup.com/css/modal.css
|
157.245.131.96
|
||
http://schemas.datacontract.org/2004/07/RightBackupServicek
|
unknown
|
||
http://www.rightbackup.com/getipaddress.asp8
|
unknown
|
||
https://is.systweak.com/
|
unknown
|
||
http://www.rightbackup.com/afterinstall.aspx?newrb=1&&utm_content=AfterInstall&&
|
unknown
|
||
http://schemas.datacontract.org/2004/07/RightBackupServiceo
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultL
|
unknown
|
||
http://tempuri.org/IBackupRequest/IsServiceRunningLR
|
unknown
|
||
http://schemas.datacontract.org
|
unknown
|
||
http://schemas.datacontract.org/2004/07/RightBackupServicec
|
unknown
|
||
http://www.rightbackup.com/?
|
unknown
|
||
http://schemas.datacontract.org/2004/07/RightBackupServiced
|
unknown
|
||
http://www.rightbackup.com/afterinstall.aspx?newrb=1&utm_content=AfterInstall&
|
unknown
|
||
http://schemas.datacontract.org/2004/07/RightBackupServiceb
|
unknown
|
||
http://schemas.datacontract.org/2004/07/RightBackupServiceg
|
unknown
|
||
http://schemas.datacontract.org/2004/07/RightBackupServiceh
|
unknown
|
||
https://wkrn9i3f01.execute-api.us-east-1.amazonaws.com/
|
unknown
|
||
http://schemas.datacontract.org/2004/07/RightBackupServicee
|
unknown
|
||
http://schemas.datacontract.org/2004/07/RightBackupServicef
|
unknown
|
||
http://tempuri.org/IRightBackupServer/BeginDeltaFileBackupT
|
unknown
|
||
http://tempuri.org/IRightBackupServer/GetUserDeltaFileSetListResponse
|
unknown
|
||
http://www.rightbackup.com/getipaddress.aspH
|
unknown
|
||
http://tempuri.org/
|
unknown
|
||
http://tempuri.org/IBackupRequest/IsServiceRunningResponseT
|
unknown
|
||
http://tempuri.org/IRightBackupServer/IsWebFileDeltaResponse
|
unknown
|
||
http://tempuri.org/IRightBackupServer/BeginWebFileBackupResponse
|
unknown
|
||
http://tempuri.org/IRightBackupServer/GetUserDeltaFilesListT
|
unknown
|
||
http://tempuri.org/IRightBackupServer/BeginFileBackupResponse
|
unknown
|
||
http://tempuri.org/IRightBackupServer/GetFileSearchByNameResponse
|
unknown
|
||
http://tempuri.org/IRightBackupServer/BeginFileSetBackupT
|
unknown
|
||
http://tempuri.org/IRightBackupServer/SendInvitationResponse
|
unknown
|
||
http://tempuri.org/IRightBackupServer/GetUserSmartDirFilesResponse
|
unknown
|
||
https://www.rightbackup.com/
|
unknown
|
||
http://www.opensource.org/licenses/mit-license.php
|
unknown
|
||
http://schemas.datacontract.org/2004/07/IPCCommunicationd
|
unknown
|
||
http://tempuri.org/IRightBackupServer/GetUserSmartDirDetailsResponse
|
unknown
|
||
http://www.rightbackup.com/Policy#TermsOfUse
|
unknown
|
||
https://www.remobjects.com/ps
|
unknown
|
||
https://www.innosetup.com/
|
unknown
|
||
http://blogs.msdn.com/b/chuckw/archive/2013/09/10/manifest-madness.aspx
|
unknown
|
||
http://tempuri.org/IRightBackupServer/BeginWebFileBackupT
|
unknown
|
||
http://schemas.datacontract.org/2004/07/RightBackupServiceY
|
unknown
|
||
http://tempuri.org/IRightBackupServer/CommitDeltaFileSetBackupT
|
unknown
|
||
http://schemas.datacontract.org/2004/07/RightBackupServiceZ
|
unknown
|
||
http://schemas.datacontract.org/2004/07/RightBackupService_
|
unknown
|
||
http://tempuri.org/IBackupRequest/SmartBackupRunRequestLR
|
unknown
|
||
http://tempuri.org/IRightBackupServer/GetEnumsResponse
|
unknown
|
||
http://schemas.datacontract.org/2004/07/RightBackupServiceT
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://www.rightbackup.com/Policy#DMCA
|
unknown
|
||
http://track.rightbackup.com/tempfile/
|
unknown
|
||
http://tempuri.org/IBackupRequest/SignOutRequestLR
|
unknown
|
||
http://tempuri.org/IBackupRequest/SmartRestoreRunRequestResponseT
|
unknown
|
||
http://tempuri.org/IRightBackupServer/GetUserMachinesResponse
|
unknown
|
||
https://ws1c.systweak.com/cRightBackupServer
|
unknown
|
||
http://tempuri.org/IBackupRequest/SignOutRequestResponseT
|
unknown
|
||
http://tempuri.org/IRightBackupServer/UpdateMachineInfoT
|
unknown
|
||
http://cdn.systweak.com/setups/df/NDP452.exe
|
unknown
|
||
http://aws.amazon.com/t-
|
unknown
|
||
http://tempuri.org/IRightBackupServer/RegisterUserT
|
unknown
|
||
http://tempuri.org/IRightBackupServer/GetUserSmartBackupDetailsResponse
|
unknown
|
||
http://tempuri.org/IRightBackupServer/SetRestoreLogsResponse
|
unknown
|
||
http://schemas.datacontract.org/2004/07/RightBackupService
|
unknown
|
||
https://trackingapi.systweak.com/trservice.js
|
23.108.29.119
|
||
http://tempuri.org/IRightBackupServer/GetUserConfig2T
|
unknown
|
||
http://tempuri.org/IRightBackupServer/GetDirTreeResponse
|
unknown
|
||
http://www.rightbackup.com/autologin/?
|
unknown
|
||
https://cdn.systweak.com/website/rightbackup/images/afterinstall_upload.png
|
69.164.42.2
|
||
http://schemas.datacontract.org/2004/07/RightBackupService(
|
unknown
|
||
http://schemas.datacontract.org/2004/07/RightBackupService&
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
http://www.rightbackup.com/6http://www.rightbackup.com/
|
unknown
|
||
http://tempuri.org/IRightBackupServer/GetUserSmartFilesListT
|
unknown
|
||
http://ws1c.systweak.com/
|
unknown
|
||
https://www.rightbackup.com/R2
|
unknown
|
||
http://tempuri.org/IRightBackupServer/GetUserSmartDirFilesT
|
unknown
|
||
http://schemas.datacontract.org/2004/07/RightBackupService1
|
unknown
|
||
http://schemas.datacontract.org/2004/07/RightBackupService8
|
unknown
|
||
http://tempuri.org/IRightBackupServer/DeleteFilesFromWebT
|
unknown
|
||
http://tempuri.org/IBackupRequest/
|
unknown
|
||
http://tempuri.org/IRightBackupServer/GetUserSmartFilesListResponse
|
unknown
|
||
http://www.istool.org/isxdl.aspx
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing
|
unknown
|
||
http://sqlite.phxsoftware.comn#
|
unknown
|
||
http://tempuri.org/IBackupRequest/CustomBackupStopRequestResponseT
|
unknown
|
||
http://www.rightbackup.com/Policy#PrivacyPolicy
|
unknown
|
||
http://www.google.com/sorry/index?continue=http://www.google.com/&q=EgRRtTk0GO_bhrEGIjBicapeUPPORed_k7SaohNnnaEUzA_nA6L1WELRTq_i0fpuMUuxRz1Zkh1zrha3hF0yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
|
64.233.177.99
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
http://www.rightbackup.com/getipaddress.aspS
|
unknown
|
||
http://tempuri.org/IRightBackupServer/GetUserConfigT
|
unknown
|
||
http://ws1b.systweak.com/
|
unknown
|
||
https://wkrn9i3f01.execute-api.us-east-1.amazonaws.com/ip?ip=81.181.57.52
|
13.33.4.104
|
||
http://y31uv4ra1.vo.llnwd.net/
|
unknown
|
||
http://tempuri.org/IRightBackupServer/DeleteFilesByPathResponse
|
unknown
|
||
http://tempuri.org/IRightBackupServer/CommitDeltaFileSetBackupResponse
|
unknown
|
||
http://tempuri.org/IRightBackupServer/GetAmazonCredentialsResponse
|
unknown
|
||
http://tempuri.org/IRightBackupServer/GetDirTreeByLevelT
|
unknown
|
||
http://tempuri.org/IBackupRequest/CustomRestoreRunRequestLR
|
unknown
|
||
http://aws.amazon.com/s3
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.rightbackup.com
|
157.245.131.96
|
||
wkrn9i3f01.execute-api.us-east-1.amazonaws.com
|
13.33.4.104
|
||
systweak1.hs.llnwd.net
|
69.164.42.2
|
||
trackingapi.systweak.com
|
23.108.29.119
|
||
googleads.g.doubleclick.net
|
172.217.215.154
|
||
activate123.com
|
165.227.176.158
|
||
cdnjs.cloudflare.com
|
104.17.24.14
|
||
www.google.com
|
64.233.177.99
|
||
s1kegmsmob.execute-api.us-east-1.amazonaws.com
|
99.84.208.33
|
||
cdn.systweak.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
157.245.131.96
|
www.rightbackup.com
|
United States
|
||
104.17.24.14
|
cdnjs.cloudflare.com
|
United States
|
||
172.217.215.154
|
googleads.g.doubleclick.net
|
United States
|
||
69.164.42.2
|
systweak1.hs.llnwd.net
|
United States
|
||
13.33.4.104
|
wkrn9i3f01.execute-api.us-east-1.amazonaws.com
|
United States
|
||
99.84.208.33
|
s1kegmsmob.execute-api.us-east-1.amazonaws.com
|
United States
|
||
64.233.177.99
|
www.google.com
|
United States
|
||
23.108.29.119
|
trackingapi.systweak.com
|
United States
|
||
165.227.176.158
|
activate123.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0
|
1206
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1
|
1206
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0
|
1407
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1
|
1407
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
|
1206
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
|
1407
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup
|
countrycode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
|
AFTINSTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup
|
AFTINSTS
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
|
pxl
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup
|
pxl
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
|
instdts
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup
|
instdts
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
|
bdts
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup
|
bdts
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
|
finalparams
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup
|
finalparams
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
|
TELNO
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
|
isphone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
|
issilent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
|
CplURL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Params
|
utm_source
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Params
|
utm_campaign
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Params
|
utm_medium
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Params
|
affiliateid
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Params
|
x-at
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Params
|
TELNO
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
|
utm_campaign
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
|
affiliateid
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
|
x-at
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
|
IsUpdateBuild
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
|
utm_installdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup
|
utm_source
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup
|
utm_medium
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup
|
TELNO
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup
|
utm_installdate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
|
BuyNowURL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
|
RenewNowURL
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup
|
InstalledPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
|
Inno Setup: Setup Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
|
Inno Setup: App Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
|
Inno Setup: Icon Group
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
|
Inno Setup: User
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
|
Inno Setup: Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
|
DisplayIcon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
|
QuietUninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
|
MajorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
|
MinorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Right Backup_is1
|
EstimatedSize
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\LANG
|
LangCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup\LANG
|
LangID
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\LANG
|
LangID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
|
afterInstallUrl
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
|
afterUpdateUrl
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Right Backup\RightBackup.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Right Backup\RightBackup.exe.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
|
CplUrl
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Taskband
|
FavoritesResolve
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Taskband
|
Favorites
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Taskband
|
FavoritesChanges
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
|
MachineUniqueId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RightBackup_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\-1
|
OSFriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\-1
|
RAM
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\-1
|
ProcessorName
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\-1
|
Model
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\-1
|
Manufacturer
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\-1
|
ManufacturerName
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\-1
|
pcrts
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\-1
|
pcrt
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\-1
|
utm_days
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\-1
|
utm_nag_days
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
|
AutoBackupLogFiles
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\Service1
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DirectDraw\MostRecentApplication
|
Name
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DirectDraw\MostRecentApplication
|
ID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
|
auslnt
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\-1
|
auslnt
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
|
snbs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\rightbackup.com
|
NumberOfSubdomains
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total
|
NULL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.rightbackup.com
|
NULL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\rightbackup.com
|
Total
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Systweak\Right Backup
|
issilent
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total
|
NULL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.rightbackup.com
|
NULL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\rightbackup.com
|
Total
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total
|
NULL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.rightbackup.com
|
NULL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\rightbackup.com
|
Total
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total
|
NULL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.rightbackup.com
|
NULL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\rightbackup.com
|
Total
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
|
C:\Program Files (x86)\Right Backup\RBNotifier.exe
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RBNotifier_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup\notifier
|
nst
|
||
HKEY_CURRENT_USER\SOFTWARE\Systweak\Right Backup
|
param
|
There are 133 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
60D2000
|
unkown
|
page readonly
|
||
D92000
|
unkown
|
page readonly
|
||
E2000
|
unkown
|
page readonly
|
||
7630000
|
direct allocation
|
page read and write
|
||
12000
|
unkown
|
page readonly
|
||
4AA2000
|
unkown
|
page readonly
|
||
13BD4000
|
trusted library allocation
|
page read and write
|
||
2944000
|
trusted library allocation
|
page read and write
|
||
593B000
|
trusted library allocation
|
page read and write
|
||
305D000
|
trusted library allocation
|
page read and write
|
||
74D0000
|
trusted library allocation
|
page execute and read and write
|
||
1BED000
|
trusted library allocation
|
page execute and read and write
|
||
913E000
|
heap
|
page read and write
|
||
2113DC13000
|
heap
|
page read and write
|
||
FF2C000
|
trusted library allocation
|
page read and write
|
||
14290000
|
trusted library allocation
|
page read and write
|
||
170E000
|
stack
|
page read and write
|
||
5747000
|
heap
|
page read and write
|
||
19C2000
|
trusted library allocation
|
page read and write
|
||
14E1D000
|
trusted library allocation
|
page read and write
|
||
3355000
|
trusted library allocation
|
page read and write
|
||
3A1D000
|
trusted library allocation
|
page read and write
|
||
3600000
|
heap
|
page read and write
|
||
6D6000
|
unkown
|
page read and write
|
||
39E9F7C000
|
stack
|
page read and write
|
||
5C9F000
|
stack
|
page read and write
|
||
3085000
|
trusted library allocation
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
39E7000
|
trusted library allocation
|
page read and write
|
||
B9DA000
|
heap
|
page read and write
|
||
B975000
|
heap
|
page read and write
|
||
81CE000
|
trusted library allocation
|
page read and write
|
||
14E22000
|
trusted library allocation
|
page read and write
|
||
6813000
|
heap
|
page read and write
|
||
3788000
|
trusted library allocation
|
page read and write
|
||
BA50000
|
heap
|
page read and write
|
||
6CDA000
|
trusted library allocation
|
page read and write
|
||
364C000
|
trusted library allocation
|
page read and write
|
||
851E000
|
stack
|
page read and write
|
||
5CD0000
|
heap
|
page read and write
|
||
45C1000
|
trusted library allocation
|
page read and write
|
||
3354000
|
trusted library allocation
|
page read and write
|
||
14556000
|
trusted library allocation
|
page read and write
|
||
2D2E000
|
trusted library allocation
|
page read and write
|
||
3540000
|
trusted library allocation
|
page read and write
|
||
3BA6000
|
trusted library allocation
|
page read and write
|
||
C230000
|
trusted library allocation
|
page read and write
|
||
3591000
|
trusted library allocation
|
page read and write
|
||
B680000
|
trusted library allocation
|
page read and write
|
||
12E5D000
|
stack
|
page read and write
|
||
2FB6000
|
trusted library allocation
|
page read and write
|
||
DCF6000
|
trusted library allocation
|
page read and write
|
||
7490000
|
direct allocation
|
page read and write
|
||
1C50000
|
trusted library allocation
|
page execute and read and write
|
||
63E0000
|
trusted library allocation
|
page execute and read and write
|
||
110F000
|
stack
|
page read and write
|
||
831E000
|
stack
|
page read and write
|
||
1BD0000
|
trusted library allocation
|
page read and write
|
||
1600000
|
trusted library allocation
|
page read and write
|
||
14B0000
|
trusted library allocation
|
page execute and read and write
|
||
ACA000
|
direct allocation
|
page read and write
|
||
76FE000
|
stack
|
page read and write
|
||
2CB4000
|
trusted library allocation
|
page read and write
|
||
1595000
|
heap
|
page read and write
|
||
6805000
|
trusted library allocation
|
page read and write
|
||
3797000
|
trusted library allocation
|
page read and write
|
||
A6E0000
|
trusted library allocation
|
page execute and read and write
|
||
7B72000
|
unkown
|
page readonly
|
||
371E000
|
trusted library allocation
|
page read and write
|
||
357A000
|
trusted library allocation
|
page read and write
|
||
19A0000
|
trusted library allocation
|
page read and write
|
||
3E18000
|
trusted library allocation
|
page read and write
|
||
4F9C000
|
trusted library allocation
|
page read and write
|
||
21143100000
|
trusted library allocation
|
page read and write
|
||
F2000
|
unkown
|
page readonly
|
||
448B000
|
trusted library allocation
|
page read and write
|
||
6D00000
|
trusted library allocation
|
page read and write
|
||
977000
|
heap
|
page read and write
|
||
6D9B000
|
stack
|
page read and write
|
||
4A63000
|
trusted library allocation
|
page read and write
|
||
61FE000
|
stack
|
page read and write
|
||
5E3E000
|
trusted library allocation
|
page read and write
|
||
56A0000
|
heap
|
page execute and read and write
|
||
6B0000
|
heap
|
page read and write
|
||
A139000
|
heap
|
page read and write
|
||
A6CD000
|
trusted library allocation
|
page read and write
|
||
E047000
|
heap
|
page read and write
|
||
92F000
|
heap
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page execute
|
||
5D2E000
|
trusted library allocation
|
page read and write
|
||
5B1E000
|
stack
|
page read and write
|
||
AEA3000
|
heap
|
page read and write
|
||
112D000
|
trusted library allocation
|
page execute and read and write
|
||
5900000
|
trusted library allocation
|
page read and write
|
||
5DA0000
|
trusted library allocation
|
page execute and read and write
|
||
595C000
|
stack
|
page read and write
|
||
4A75000
|
heap
|
page read and write
|
||
35F2000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
644000
|
trusted library allocation
|
page read and write
|
||
B982000
|
heap
|
page read and write
|
||
445F000
|
trusted library allocation
|
page read and write
|
||
6390000
|
trusted library allocation
|
page read and write
|
||
64D6000
|
heap
|
page read and write
|
||
2CAC000
|
trusted library allocation
|
page read and write
|
||
14135000
|
trusted library allocation
|
page read and write
|
||
289E000
|
trusted library allocation
|
page read and write
|
||
926000
|
heap
|
page read and write
|
||
2113E340000
|
trusted library allocation
|
page read and write
|
||
4FAF000
|
stack
|
page read and write
|
||
8174000
|
trusted library allocation
|
page read and write
|
||
898E000
|
stack
|
page read and write
|
||
2931000
|
trusted library allocation
|
page read and write
|
||
3040000
|
trusted library allocation
|
page read and write
|
||
39FC000
|
trusted library allocation
|
page read and write
|
||
3BD3000
|
trusted library allocation
|
page read and write
|
||
E0B8000
|
heap
|
page read and write
|
||
2113E400000
|
heap
|
page read and write
|
||
33AB000
|
trusted library allocation
|
page read and write
|
||
35E7000
|
trusted library allocation
|
page read and write
|
||
3569000
|
trusted library allocation
|
page read and write
|
||
5DEE000
|
trusted library allocation
|
page read and write
|
||
6B80000
|
trusted library allocation
|
page execute and read and write
|
||
573F000
|
heap
|
page read and write
|
||
2D3F000
|
trusted library allocation
|
page read and write
|
||
13A20000
|
trusted library allocation
|
page read and write
|
||
6472000
|
heap
|
page read and write
|
||
3620000
|
trusted library allocation
|
page read and write
|
||
259F000
|
trusted library allocation
|
page read and write
|
||
506F000
|
trusted library allocation
|
page read and write
|
||
5D1E000
|
stack
|
page read and write
|
||
80FD000
|
stack
|
page read and write
|
||
4D63000
|
trusted library allocation
|
page read and write
|
||
1440000
|
trusted library allocation
|
page read and write
|
||
8467000
|
trusted library allocation
|
page read and write
|
||
370D000
|
trusted library allocation
|
page read and write
|
||
466C000
|
stack
|
page read and write
|
||
520C000
|
stack
|
page read and write
|
||
130D6000
|
heap
|
page read and write
|
||
BCCC000
|
trusted library section
|
page read and write
|
||
8410000
|
trusted library allocation
|
page read and write
|
||
98E000
|
heap
|
page read and write
|
||
4D26000
|
trusted library allocation
|
page read and write
|
||
56D5000
|
heap
|
page read and write
|
||
D0B000
|
stack
|
page read and write
|
||
91F0000
|
heap
|
page read and write
|
||
5105000
|
trusted library allocation
|
page read and write
|
||
2114351B000
|
heap
|
page read and write
|
||
5160000
|
trusted library allocation
|
page read and write
|
||
B390000
|
trusted library allocation
|
page read and write
|
||
F257000
|
trusted library allocation
|
page read and write
|
||
14E30000
|
trusted library allocation
|
page read and write
|
||
2113DC8E000
|
heap
|
page read and write
|
||
5BC0000
|
trusted library allocation
|
page read and write
|
||
2F0B000
|
trusted library allocation
|
page read and write
|
||
728000
|
heap
|
page read and write
|
||
5B2E000
|
stack
|
page read and write
|
||
2FA3000
|
trusted library allocation
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
3570000
|
trusted library allocation
|
page read and write
|
||
4F79000
|
trusted library allocation
|
page read and write
|
||
1404C000
|
trusted library allocation
|
page read and write
|
||
7D5000
|
heap
|
page read and write
|
||
6928000
|
trusted library allocation
|
page read and write
|
||
8198000
|
trusted library allocation
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
21143270000
|
trusted library allocation
|
page read and write
|
||
2F55000
|
trusted library allocation
|
page read and write
|
||
76BE000
|
stack
|
page read and write
|
||
A99D000
|
trusted library allocation
|
page read and write
|
||
57AE000
|
stack
|
page read and write
|
||
2F79000
|
heap
|
page read and write
|
||
ADC5000
|
heap
|
page read and write
|
||
AE8F000
|
heap
|
page read and write
|
||
268E000
|
trusted library allocation
|
page read and write
|
||
2E6F000
|
trusted library allocation
|
page read and write
|
||
6310000
|
trusted library allocation
|
page read and write
|
||
34B7000
|
heap
|
page read and write
|
||
119D000
|
trusted library allocation
|
page execute and read and write
|
||
92F0000
|
trusted library allocation
|
page read and write
|
||
91DD000
|
heap
|
page read and write
|
||
1368B000
|
trusted library allocation
|
page read and write
|
||
A610000
|
trusted library allocation
|
page read and write
|
||
1476000
|
trusted library allocation
|
page execute and read and write
|
||
B8FE000
|
trusted library allocation
|
page read and write
|
||
32F2000
|
trusted library allocation
|
page read and write
|
||
1B32000
|
trusted library allocation
|
page read and write
|
||
62BB000
|
trusted library allocation
|
page read and write
|
||
2609000
|
trusted library allocation
|
page read and write
|
||
211432F0000
|
trusted library allocation
|
page read and write
|
||
4F6F000
|
trusted library allocation
|
page read and write
|
||
59F0000
|
heap
|
page read and write
|
||
753F000
|
direct allocation
|
page read and write
|
||
BBF0000
|
trusted library section
|
page read and write
|
||
65B6000
|
trusted library allocation
|
page read and write
|
||
532F000
|
stack
|
page read and write
|
||
C10E000
|
heap
|
page read and write
|
||
19BD000
|
trusted library allocation
|
page execute and read and write
|
||
14280000
|
heap
|
page read and write
|
||
257E000
|
trusted library allocation
|
page read and write
|
||
56FD000
|
heap
|
page read and write
|
||
7340000
|
trusted library allocation
|
page execute and read and write
|
||
138D2000
|
trusted library allocation
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
787000
|
heap
|
page read and write
|
||
2D5E000
|
trusted library allocation
|
page read and write
|
||
62EE000
|
stack
|
page read and write
|
||
397F000
|
trusted library allocation
|
page read and write
|
||
561E000
|
stack
|
page read and write
|
||
56E3000
|
heap
|
page read and write
|
||
AEC5000
|
heap
|
page read and write
|
||
4F3C000
|
trusted library allocation
|
page read and write
|
||
5E15000
|
trusted library allocation
|
page read and write
|
||
8220000
|
trusted library allocation
|
page read and write
|
||
B2C0000
|
trusted library allocation
|
page read and write
|
||
6372000
|
trusted library allocation
|
page read and write
|
||
14444000
|
trusted library allocation
|
page read and write
|
||
3615000
|
trusted library allocation
|
page read and write
|
||
5BD2000
|
trusted library allocation
|
page read and write
|
||
4D50000
|
trusted library allocation
|
page execute and read and write
|
||
E0CF000
|
heap
|
page read and write
|
||
56D7000
|
heap
|
page read and write
|
||
909E000
|
stack
|
page read and write
|
||
28E9000
|
trusted library allocation
|
page read and write
|
||
BB19000
|
heap
|
page read and write
|
||
17E0000
|
heap
|
page read and write
|
||
7720000
|
heap
|
page read and write
|
||
534E000
|
stack
|
page read and write
|
||
517E000
|
trusted library allocation
|
page read and write
|
||
626B000
|
stack
|
page read and write
|
||
15000
|
unkown
|
page readonly
|
||
F35000
|
heap
|
page read and write
|
||
44DD000
|
trusted library allocation
|
page read and write
|
||
4916000
|
trusted library allocation
|
page read and write
|
||
2DF1000
|
trusted library allocation
|
page read and write
|
||
80B4000
|
trusted library allocation
|
page read and write
|
||
2734000
|
trusted library allocation
|
page read and write
|
||
149E8000
|
trusted library allocation
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
3487000
|
heap
|
page read and write
|
||
39EA57E000
|
unkown
|
page readonly
|
||
4AB4000
|
trusted library allocation
|
page read and write
|
||
C016000
|
heap
|
page read and write
|
||
7FAA0000
|
trusted library allocation
|
page execute and read and write
|
||
3709000
|
direct allocation
|
page read and write
|
||
149CE000
|
trusted library allocation
|
page read and write
|
||
39EA37E000
|
unkown
|
page readonly
|
||
269F000
|
trusted library allocation
|
page read and write
|
||
6380000
|
heap
|
page read and write
|
||
62D1000
|
trusted library allocation
|
page read and write
|
||
3051000
|
trusted library allocation
|
page read and write
|
||
4920000
|
heap
|
page read and write
|
||
5114000
|
trusted library allocation
|
page read and write
|
||
4D97000
|
trusted library allocation
|
page read and write
|
||
5C90000
|
heap
|
page read and write
|
||
3FDD000
|
heap
|
page read and write
|
||
2151000
|
trusted library allocation
|
page read and write
|
||
3280000
|
trusted library allocation
|
page read and write
|
||
5092000
|
trusted library allocation
|
page read and write
|
||
3740000
|
direct allocation
|
page read and write
|
||
39EA87E000
|
unkown
|
page readonly
|
||
14B3E000
|
trusted library allocation
|
page read and write
|
||
2BFD000
|
trusted library allocation
|
page read and write
|
||
39A2000
|
trusted library allocation
|
page read and write
|
||
621E000
|
heap
|
page read and write
|
||
3034000
|
trusted library allocation
|
page read and write
|
||
572D000
|
heap
|
page read and write
|
||
6607000
|
trusted library allocation
|
page read and write
|
||
35B2000
|
trusted library allocation
|
page read and write
|
||
25EA000
|
trusted library allocation
|
page read and write
|
||
2691000
|
trusted library allocation
|
page read and write
|
||
97D000
|
heap
|
page read and write
|
||
4F39000
|
trusted library allocation
|
page read and write
|
||
AED9000
|
heap
|
page read and write
|
||
A6C4000
|
trusted library allocation
|
page read and write
|
||
5DDE000
|
trusted library allocation
|
page read and write
|
||
25F9000
|
trusted library allocation
|
page read and write
|
||
2113DD29000
|
heap
|
page read and write
|
||
4998000
|
trusted library allocation
|
page read and write
|
||
C019000
|
heap
|
page read and write
|
||
5727000
|
heap
|
page read and write
|
||
779B000
|
stack
|
page read and write
|
||
B0ED000
|
stack
|
page read and write
|
||
8127000
|
trusted library allocation
|
page read and write
|
||
1430D000
|
trusted library allocation
|
page read and write
|
||
ADB6000
|
heap
|
page read and write
|
||
3BD2000
|
trusted library allocation
|
page read and write
|
||
4A22000
|
trusted library allocation
|
page read and write
|
||
A2DE000
|
heap
|
page read and write
|
||
53F0000
|
trusted library allocation
|
page execute and read and write
|
||
9170000
|
heap
|
page read and write
|
||
3722000
|
direct allocation
|
page read and write
|
||
3524000
|
trusted library allocation
|
page read and write
|
||
56DF000
|
stack
|
page read and write
|
||
277F000
|
trusted library allocation
|
page read and write
|
||
5DCC000
|
stack
|
page read and write
|
||
4AAF000
|
trusted library allocation
|
page read and write
|
||
7F510000
|
trusted library allocation
|
page execute and read and write
|
||
917D000
|
heap
|
page read and write
|
||
4D7000
|
unkown
|
page readonly
|
||
B9F2000
|
heap
|
page read and write
|
||
6280000
|
trusted library allocation
|
page execute and read and write
|
||
50C0000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
50DE000
|
trusted library allocation
|
page read and write
|
||
2665000
|
direct allocation
|
page read and write
|
||
13C30000
|
trusted library allocation
|
page read and write
|
||
56D2000
|
heap
|
page read and write
|
||
38E7000
|
trusted library allocation
|
page read and write
|
||
7CFE000
|
stack
|
page read and write
|
||
814A000
|
trusted library allocation
|
page read and write
|
||
66FC000
|
stack
|
page read and write
|
||
7EF0000
|
trusted library allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
AD0000
|
trusted library allocation
|
page read and write
|
||
BE10000
|
trusted library allocation
|
page execute and read and write
|
||
78C0000
|
trusted library section
|
page readonly
|
||
8120000
|
trusted library allocation
|
page read and write
|
||
644C000
|
stack
|
page read and write
|
||
62BE000
|
trusted library allocation
|
page read and write
|
||
273C000
|
trusted library allocation
|
page read and write
|
||
6FC000
|
unkown
|
page readonly
|
||
50C9000
|
trusted library allocation
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
1CD7000
|
heap
|
page read and write
|
||
8F7000
|
heap
|
page read and write
|
||
1326000
|
trusted library allocation
|
page execute and read and write
|
||
B9D4000
|
heap
|
page read and write
|
||
4CD0000
|
trusted library allocation
|
page execute and read and write
|
||
3525000
|
trusted library allocation
|
page read and write
|
||
2620000
|
trusted library allocation
|
page read and write
|
||
3441000
|
trusted library allocation
|
page read and write
|
||
211434BB000
|
heap
|
page read and write
|
||
2EB4000
|
trusted library allocation
|
page read and write
|
||
6330000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
heap
|
page read and write
|
||
8173000
|
trusted library allocation
|
page read and write
|
||
14AA0000
|
trusted library allocation
|
page read and write
|
||
3602000
|
trusted library allocation
|
page read and write
|
||
A78E000
|
stack
|
page read and write
|
||
94D000
|
heap
|
page read and write
|
||
1432000
|
trusted library allocation
|
page read and write
|
||
3C25000
|
trusted library allocation
|
page read and write
|
||
6ABA000
|
trusted library allocation
|
page read and write
|
||
4775000
|
trusted library allocation
|
page read and write
|
||
2E7A000
|
trusted library allocation
|
page read and write
|
||
3760000
|
trusted library allocation
|
page read and write
|
||
4B44000
|
unkown
|
page readonly
|
||
B68D000
|
trusted library allocation
|
page read and write
|
||
5B70000
|
trusted library allocation
|
page read and write
|
||
5080000
|
trusted library allocation
|
page read and write
|
||
A00000
|
direct allocation
|
page read and write
|
||
1C2B000
|
trusted library allocation
|
page execute and read and write
|
||
2F72000
|
trusted library allocation
|
page read and write
|
||
1CD0000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
A2F3000
|
heap
|
page read and write
|
||
21143513000
|
heap
|
page read and write
|
||
3FD0000
|
heap
|
page read and write
|
||
3EBA000
|
trusted library allocation
|
page read and write
|
||
56D3000
|
heap
|
page read and write
|
||
77E0000
|
heap
|
page read and write
|
||
39EB57B000
|
stack
|
page read and write
|
||
5C4C000
|
stack
|
page read and write
|
||
25F7000
|
trusted library allocation
|
page read and write
|
||
3390000
|
trusted library allocation
|
page read and write
|
||
8193000
|
trusted library allocation
|
page read and write
|
||
338B000
|
trusted library allocation
|
page read and write
|
||
3E39000
|
trusted library allocation
|
page read and write
|
||
8367000
|
trusted library allocation
|
page read and write
|
||
1BA0000
|
heap
|
page read and write
|
||
662000
|
trusted library allocation
|
page read and write
|
||
3666000
|
trusted library allocation
|
page read and write
|
||
7360000
|
trusted library allocation
|
page read and write
|
||
6BA0000
|
trusted library allocation
|
page read and write
|
||
E15B000
|
heap
|
page read and write
|
||
642C000
|
stack
|
page read and write
|
||
A246000
|
heap
|
page read and write
|
||
330F000
|
trusted library allocation
|
page read and write
|
||
4A4F000
|
trusted library allocation
|
page read and write
|
||
17F9000
|
heap
|
page read and write
|
||
7F450000
|
trusted library allocation
|
page execute and read and write
|
||
3C48000
|
trusted library allocation
|
page read and write
|
||
B940000
|
heap
|
page read and write
|
||
819C000
|
trusted library allocation
|
page read and write
|
||
AD8000
|
direct allocation
|
page read and write
|
||
1394C000
|
trusted library allocation
|
page read and write
|
||
A44E000
|
stack
|
page read and write
|
||
516B000
|
trusted library allocation
|
page read and write
|
||
2C80000
|
trusted library allocation
|
page read and write
|
||
130B8000
|
heap
|
page read and write
|
||
1487000
|
trusted library allocation
|
page execute and read and write
|
||
25B2000
|
trusted library allocation
|
page read and write
|
||
B400000
|
trusted library allocation
|
page read and write
|
||
BF10000
|
heap
|
page read and write
|
||
91D5000
|
heap
|
page read and write
|
||
3795000
|
trusted library allocation
|
page read and write
|
||
39EAD7E000
|
stack
|
page read and write
|
||
2560000
|
heap
|
page execute and read and write
|
||
595D000
|
trusted library allocation
|
page read and write
|
||
4A65000
|
trusted library allocation
|
page read and write
|
||
B420000
|
trusted library allocation
|
page read and write
|
||
5690000
|
trusted library allocation
|
page read and write
|
||
3413000
|
heap
|
page read and write
|
||
33C5000
|
trusted library allocation
|
page read and write
|
||
4CA000
|
unkown
|
page readonly
|
||
185000
|
heap
|
page read and write
|
||
827E000
|
trusted library allocation
|
page read and write
|
||
8670000
|
heap
|
page read and write
|
||
2FC0000
|
trusted library allocation
|
page read and write
|
||
2113E415000
|
heap
|
page read and write
|
||
1465D000
|
trusted library allocation
|
page read and write
|
||
8474000
|
trusted library allocation
|
page read and write
|
||
6ACC000
|
trusted library allocation
|
page read and write
|
||
2C7E000
|
trusted library allocation
|
page read and write
|
||
15F0000
|
heap
|
page read and write
|
||
2FBA000
|
trusted library allocation
|
page read and write
|
||
1358A000
|
heap
|
page read and write
|
||
B646000
|
trusted library allocation
|
page read and write
|
||
6AAD000
|
trusted library allocation
|
page read and write
|
||
305B000
|
trusted library allocation
|
page read and write
|
||
6900000
|
trusted library allocation
|
page read and write
|
||
732000
|
trusted library allocation
|
page read and write
|
||
73A000
|
trusted library allocation
|
page execute and read and write
|
||
39EAF7E000
|
stack
|
page read and write
|
||
39EBBFE000
|
stack
|
page read and write
|
||
AEC3000
|
heap
|
page read and write
|
||
9A9000
|
heap
|
page read and write
|
||
3CB7000
|
trusted library allocation
|
page read and write
|
||
4F85000
|
trusted library allocation
|
page read and write
|
||
6327000
|
trusted library allocation
|
page read and write
|
||
25E0000
|
heap
|
page read and write
|
||
2C45000
|
trusted library allocation
|
page read and write
|
||
2992000
|
direct allocation
|
page read and write
|
||
A2A0000
|
trusted library section
|
page read and write
|
||
6298000
|
trusted library allocation
|
page read and write
|
||
F230000
|
heap
|
page read and write
|
||
A159000
|
heap
|
page read and write
|
||
356E000
|
trusted library allocation
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page execute and read and write
|
||
2B70000
|
trusted library allocation
|
page read and write
|
||
5BA0000
|
trusted library allocation
|
page read and write
|
||
BF20000
|
heap
|
page read and write
|
||
AD24000
|
heap
|
page read and write
|
||
149C0000
|
trusted library allocation
|
page read and write
|
||
5085000
|
trusted library allocation
|
page read and write
|
||
56FE000
|
heap
|
page read and write
|
||
2114345D000
|
heap
|
page read and write
|
||
132BD000
|
heap
|
page read and write
|
||
1387E000
|
stack
|
page read and write
|
||
6AB2000
|
trusted library allocation
|
page read and write
|
||
3F02000
|
trusted library allocation
|
page read and write
|
||
28A1000
|
trusted library allocation
|
page read and write
|
||
E054000
|
heap
|
page read and write
|
||
3701000
|
direct allocation
|
page read and write
|
||
178A000
|
heap
|
page read and write
|
||
2C48000
|
trusted library allocation
|
page read and write
|
||
2B6A000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
heap
|
page read and write
|
||
62B1000
|
heap
|
page read and write
|
||
25EC000
|
trusted library allocation
|
page read and write
|
||
3378000
|
trusted library allocation
|
page read and write
|
||
2113DC43000
|
heap
|
page read and write
|
||
62C8000
|
trusted library allocation
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
16E7000
|
heap
|
page read and write
|
||
6925000
|
trusted library allocation
|
page read and write
|
||
574F000
|
heap
|
page read and write
|
||
33A7000
|
trusted library allocation
|
page read and write
|
||
26A5000
|
trusted library allocation
|
page read and write
|
||
26BA000
|
trusted library allocation
|
page read and write
|
||
2113DC95000
|
heap
|
page read and write
|
||
142F9000
|
trusted library allocation
|
page read and write
|
||
397D000
|
trusted library allocation
|
page read and write
|
||
572E000
|
stack
|
page read and write
|
||
87CE000
|
stack
|
page read and write
|
||
32D9000
|
trusted library allocation
|
page read and write
|
||
1985000
|
heap
|
page read and write
|
||
131EF000
|
heap
|
page read and write
|
||
13FA3000
|
trusted library allocation
|
page read and write
|
||
4BCC000
|
stack
|
page read and write
|
||
4D80000
|
trusted library allocation
|
page read and write
|
||
816D000
|
trusted library allocation
|
page read and write
|
||
920A000
|
heap
|
page read and write
|
||
1180000
|
trusted library allocation
|
page read and write
|
||
7705000
|
trusted library allocation
|
page read and write
|
||
987000
|
heap
|
page read and write
|
||
113E000
|
stack
|
page read and write
|
||
2BA2000
|
trusted library allocation
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
2697000
|
direct allocation
|
page read and write
|
||
6F6E000
|
heap
|
page read and write
|
||
13C48000
|
trusted library allocation
|
page read and write
|
||
2BDC000
|
trusted library allocation
|
page read and write
|
||
65A4000
|
trusted library allocation
|
page read and write
|
||
4C35000
|
trusted library allocation
|
page read and write
|
||
6590000
|
trusted library allocation
|
page read and write
|
||
184E000
|
stack
|
page read and write
|
||
62B2000
|
trusted library allocation
|
page read and write
|
||
100D3000
|
unkown
|
page read and write
|
||
E036000
|
heap
|
page read and write
|
||
6430000
|
heap
|
page read and write
|
||
3950000
|
heap
|
page read and write
|
||
118D000
|
trusted library allocation
|
page execute and read and write
|
||
7C7000
|
heap
|
page read and write
|
||
934000
|
heap
|
page read and write
|
||
AAF000
|
stack
|
page read and write
|
||
14551000
|
trusted library allocation
|
page read and write
|
||
62EF000
|
heap
|
page read and write
|
||
196E000
|
stack
|
page read and write
|
||
6D09000
|
trusted library allocation
|
page read and write
|
||
7490000
|
trusted library allocation
|
page read and write
|
||
5E32000
|
trusted library allocation
|
page read and write
|
||
4F49000
|
trusted library allocation
|
page read and write
|
||
50BE000
|
stack
|
page read and write
|
||
62B4000
|
trusted library allocation
|
page read and write
|
||
2FA7000
|
trusted library allocation
|
page read and write
|
||
17D9000
|
heap
|
page read and write
|
||
62F0000
|
trusted library allocation
|
page read and write
|
||
65D0000
|
trusted library allocation
|
page read and write
|
||
2171000
|
trusted library allocation
|
page read and write
|
||
3B61000
|
trusted library allocation
|
page read and write
|
||
1BE4000
|
trusted library allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
5B9E000
|
stack
|
page read and write
|
||
7960000
|
heap
|
page read and write
|
||
5620000
|
heap
|
page execute and read and write
|
||
2E11000
|
trusted library allocation
|
page read and write
|
||
1B36000
|
trusted library allocation
|
page execute and read and write
|
||
405F000
|
stack
|
page read and write
|
||
21143459000
|
heap
|
page read and write
|
||
3309000
|
heap
|
page read and write
|
||
67B000
|
trusted library allocation
|
page execute and read and write
|
||
1800000
|
heap
|
page read and write
|
||
14E38000
|
trusted library allocation
|
page read and write
|
||
65B1000
|
trusted library allocation
|
page read and write
|
||
4A8B000
|
trusted library allocation
|
page read and write
|
||
597F000
|
trusted library allocation
|
page read and write
|
||
1317F000
|
heap
|
page read and write
|
||
605E000
|
stack
|
page read and write
|
||
14AB5000
|
trusted library allocation
|
page read and write
|
||
4F73000
|
trusted library allocation
|
page read and write
|
||
32DB000
|
trusted library allocation
|
page read and write
|
||
9A7000
|
heap
|
page read and write
|
||
5C8E000
|
stack
|
page read and write
|
||
3601000
|
trusted library allocation
|
page read and write
|
||
9EF000
|
stack
|
page read and write
|
||
90E0000
|
trusted library allocation
|
page read and write
|
||
192C000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
66AD000
|
stack
|
page read and write
|
||
5CC0000
|
trusted library section
|
page readonly
|
||
A6B0000
|
trusted library allocation
|
page read and write
|
||
3780000
|
trusted library allocation
|
page read and write
|
||
5F30000
|
heap
|
page read and write
|
||
65E0000
|
trusted library allocation
|
page read and write
|
||
967000
|
heap
|
page read and write
|
||
E150000
|
heap
|
page read and write
|
||
57BD000
|
stack
|
page read and write
|
||
35C1000
|
trusted library allocation
|
page read and write
|
||
13FAA000
|
trusted library allocation
|
page read and write
|
||
81A1000
|
trusted library allocation
|
page read and write
|
||
39D7000
|
trusted library allocation
|
page read and write
|
||
2C91000
|
trusted library allocation
|
page read and write
|
||
3707000
|
trusted library allocation
|
page read and write
|
||
62BD000
|
heap
|
page read and write
|
||
14039000
|
trusted library allocation
|
page read and write
|
||
2D50000
|
trusted library allocation
|
page read and write
|
||
6090000
|
trusted library allocation
|
page read and write
|
||
100D3000
|
unkown
|
page read and write
|
||
8256000
|
trusted library allocation
|
page read and write
|
||
2114344D000
|
heap
|
page read and write
|
||
6AAA000
|
trusted library allocation
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
7FA1000
|
trusted library allocation
|
page read and write
|
||
2F7D000
|
heap
|
page read and write
|
||
3571000
|
trusted library allocation
|
page read and write
|
||
91EC000
|
heap
|
page read and write
|
||
BCEF000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
3A17000
|
trusted library allocation
|
page read and write
|
||
91E1000
|
heap
|
page read and write
|
||
7270000
|
trusted library allocation
|
page read and write
|
||
7EB1000
|
trusted library allocation
|
page read and write
|
||
DE70000
|
trusted library allocation
|
page execute and read and write
|
||
65C0000
|
trusted library allocation
|
page read and write
|
||
194E000
|
stack
|
page read and write
|
||
F2DB000
|
trusted library allocation
|
page read and write
|
||
36A2000
|
trusted library allocation
|
page read and write
|
||
3380000
|
trusted library allocation
|
page read and write
|
||
9250000
|
trusted library section
|
page readonly
|
||
5400000
|
heap
|
page read and write
|
||
28C1000
|
trusted library allocation
|
page read and write
|
||
2C8D000
|
trusted library allocation
|
page read and write
|
||
34B5000
|
heap
|
page read and write
|
||
35E5000
|
trusted library allocation
|
page read and write
|
||
13953000
|
trusted library allocation
|
page read and write
|
||
39EB179000
|
stack
|
page read and write
|
||
5731000
|
heap
|
page read and write
|
||
142C0000
|
trusted library allocation
|
page read and write
|
||
3DAD000
|
stack
|
page read and write
|
||
39D1000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
2C10000
|
trusted library allocation
|
page read and write
|
||
14430000
|
trusted library allocation
|
page read and write
|
||
138C6000
|
trusted library allocation
|
page read and write
|
||
28B6000
|
trusted library allocation
|
page read and write
|
||
3781000
|
trusted library allocation
|
page read and write
|
||
2BDA000
|
trusted library allocation
|
page read and write
|
||
14A04000
|
trusted library allocation
|
page read and write
|
||
62C4000
|
trusted library allocation
|
page read and write
|
||
211431B0000
|
trusted library allocation
|
page read and write
|
||
7393000
|
trusted library allocation
|
page read and write
|
||
384D000
|
stack
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
A55C000
|
stack
|
page read and write
|
||
53E0000
|
heap
|
page read and write
|
||
1484000
|
trusted library allocation
|
page read and write
|
||
9410000
|
heap
|
page read and write
|
||
3578000
|
trusted library allocation
|
page read and write
|
||
2D67000
|
trusted library allocation
|
page read and write
|
||
BCEE000
|
trusted library section
|
page read and write
|
||
9167000
|
heap
|
page read and write
|
||
F290000
|
trusted library allocation
|
page read and write
|
||
16B0000
|
heap
|
page read and write
|
||
6397000
|
trusted library allocation
|
page read and write
|
||
2C99000
|
trusted library allocation
|
page read and write
|
||
11F3000
|
trusted library allocation
|
page execute and read and write
|
||
1710000
|
heap
|
page read and write
|
||
1332C000
|
heap
|
page read and write
|
||
2E95000
|
trusted library allocation
|
page read and write
|
||
6A20000
|
trusted library allocation
|
page read and write
|
||
6A90000
|
trusted library allocation
|
page read and write
|
||
F303000
|
trusted library allocation
|
page read and write
|
||
13393000
|
heap
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
13724000
|
trusted library allocation
|
page read and write
|
||
ADEE000
|
heap
|
page read and write
|
||
54CB000
|
heap
|
page read and write
|
||
2F81000
|
trusted library allocation
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
5720000
|
heap
|
page read and write
|
||
114A000
|
trusted library allocation
|
page execute and read and write
|
||
5DC0000
|
trusted library allocation
|
page read and write
|
||
3523000
|
trusted library allocation
|
page read and write
|
||
4A16000
|
trusted library allocation
|
page read and write
|
||
E0C7000
|
heap
|
page read and write
|
||
915F000
|
heap
|
page read and write
|
||
28DA000
|
trusted library allocation
|
page read and write
|
||
287E000
|
trusted library allocation
|
page read and write
|
||
2560000
|
direct allocation
|
page read and write
|
||
395A000
|
trusted library allocation
|
page read and write
|
||
E2C0000
|
trusted library allocation
|
page execute and read and write
|
||
967000
|
heap
|
page read and write
|
||
585D000
|
stack
|
page read and write
|
||
26B6000
|
trusted library allocation
|
page read and write
|
||
3983000
|
trusted library allocation
|
page read and write
|
||
329B000
|
trusted library allocation
|
page execute and read and write
|
||
498B000
|
trusted library allocation
|
page read and write
|
||
3A06000
|
trusted library allocation
|
page read and write
|
||
37C5000
|
trusted library allocation
|
page read and write
|
||
21143110000
|
trusted library allocation
|
page read and write
|
||
2578000
|
trusted library allocation
|
page read and write
|
||
AFB0000
|
trusted library allocation
|
page read and write
|
||
3BF2000
|
trusted library allocation
|
page read and write
|
||
A2B5000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
138A0000
|
trusted library allocation
|
page execute
|
||
14A20000
|
trusted library allocation
|
page read and write
|
||
918A000
|
heap
|
page read and write
|
||
91B8000
|
heap
|
page read and write
|
||
5100000
|
trusted library allocation
|
page read and write
|
||
710000
|
trusted library allocation
|
page read and write
|
||
2BE7000
|
trusted library allocation
|
page read and write
|
||
149F5000
|
trusted library allocation
|
page read and write
|
||
90C8000
|
trusted library allocation
|
page read and write
|
||
4150000
|
trusted library allocation
|
page read and write
|
||
F22A000
|
stack
|
page read and write
|
||
2658000
|
trusted library allocation
|
page read and write
|
||
AF50000
|
trusted library allocation
|
page read and write
|
||
333B000
|
stack
|
page read and write
|
||
80F7000
|
trusted library allocation
|
page read and write
|
||
192F000
|
stack
|
page read and write
|
||
2113E502000
|
heap
|
page read and write
|
||
4019000
|
heap
|
page read and write
|
||
643000
|
trusted library allocation
|
page execute and read and write
|
||
FF6C000
|
trusted library allocation
|
page read and write
|
||
A30C000
|
heap
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
5FE0000
|
trusted library allocation
|
page execute and read and write
|
||
306A000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
C858000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page execute and read and write
|
||
149B000
|
stack
|
page read and write
|
||
C013000
|
heap
|
page read and write
|
||
8148000
|
trusted library allocation
|
page read and write
|
||
56FD000
|
heap
|
page read and write
|
||
1990000
|
heap
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
3297000
|
trusted library allocation
|
page execute and read and write
|
||
DA0000
|
heap
|
page read and write
|
||
5561000
|
trusted library allocation
|
page read and write
|
||
606A000
|
trusted library allocation
|
page read and write
|
||
39E5000
|
trusted library allocation
|
page read and write
|
||
3BF5000
|
trusted library allocation
|
page read and write
|
||
6A30000
|
trusted library allocation
|
page execute and read and write
|
||
34B0000
|
direct allocation
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
5070000
|
trusted library allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
1184000
|
trusted library allocation
|
page read and write
|
||
1365C000
|
heap
|
page read and write
|
||
14091000
|
trusted library allocation
|
page read and write
|
||
13C55000
|
trusted library allocation
|
page read and write
|
||
35D3000
|
trusted library allocation
|
page read and write
|
||
145B0000
|
trusted library allocation
|
page read and write
|
||
5A60000
|
trusted library allocation
|
page read and write
|
||
822C000
|
trusted library allocation
|
page read and write
|
||
275B000
|
trusted library allocation
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page execute and read and write
|
||
67AC000
|
heap
|
page read and write
|
||
BD0B000
|
heap
|
page read and write
|
||
14E20000
|
trusted library allocation
|
page read and write
|
||
7E91000
|
trusted library allocation
|
page read and write
|
||
775E000
|
stack
|
page read and write
|
||
832B000
|
trusted library allocation
|
page read and write
|
||
6D05000
|
trusted library allocation
|
page read and write
|
||
15FA000
|
trusted library allocation
|
page read and write
|
||
3968000
|
heap
|
page read and write
|
||
3DB6000
|
trusted library allocation
|
page read and write
|
||
91F6000
|
heap
|
page read and write
|
||
14660000
|
trusted library allocation
|
page read and write
|
||
826E000
|
trusted library allocation
|
page read and write
|
||
3BE4000
|
trusted library allocation
|
page read and write
|
||
6440000
|
heap
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
9100000
|
trusted library allocation
|
page read and write
|
||
5E26000
|
trusted library allocation
|
page read and write
|
||
8419000
|
trusted library allocation
|
page read and write
|
||
BF52000
|
heap
|
page read and write
|
||
E90E000
|
stack
|
page read and write
|
||
1AD0000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
3604000
|
trusted library allocation
|
page read and write
|
||
669C000
|
stack
|
page read and write
|
||
13A40000
|
trusted library allocation
|
page read and write
|
||
1456D000
|
trusted library allocation
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
1ADF000
|
stack
|
page read and write
|
||
7B40000
|
trusted library allocation
|
page execute and read and write
|
||
A136000
|
heap
|
page read and write
|
||
A6D0000
|
trusted library allocation
|
page read and write
|
||
B380000
|
trusted library allocation
|
page execute and read and write
|
||
A0D4000
|
heap
|
page read and write
|
||
890E000
|
stack
|
page read and write
|
||
355B000
|
trusted library allocation
|
page read and write
|
||
7FB30000
|
direct allocation
|
page read and write
|
||
14030000
|
trusted library allocation
|
page read and write
|
||
62D4000
|
trusted library allocation
|
page read and write
|
||
58BE000
|
stack
|
page read and write
|
||
962000
|
heap
|
page read and write
|
||
2114342C000
|
heap
|
page read and write
|
||
1802000
|
heap
|
page read and write
|
||
2BF9000
|
trusted library allocation
|
page read and write
|
||
F253000
|
trusted library allocation
|
page read and write
|
||
356C000
|
trusted library allocation
|
page read and write
|
||
1009F000
|
unkown
|
page readonly
|
||
3489000
|
heap
|
page read and write
|
||
14DFA000
|
trusted library allocation
|
page read and write
|
||
3490000
|
direct allocation
|
page read and write
|
||
6B35000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
heap
|
page read and write
|
||
5195000
|
trusted library allocation
|
page read and write
|
||
14D60000
|
trusted library allocation
|
page read and write
|
||
2D41000
|
trusted library allocation
|
page read and write
|
||
767E000
|
stack
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
11A8000
|
heap
|
page read and write
|
||
135C5000
|
heap
|
page read and write
|
||
39EAC7E000
|
unkown
|
page readonly
|
||
366A000
|
trusted library allocation
|
page read and write
|
||
622E000
|
heap
|
page read and write
|
||
6240000
|
trusted library allocation
|
page read and write
|
||
6374000
|
trusted library allocation
|
page read and write
|
||
6580000
|
trusted library allocation
|
page execute and read and write
|
||
303C000
|
trusted library allocation
|
page read and write
|
||
90B0000
|
trusted library allocation
|
page execute and read and write
|
||
93000
|
stack
|
page read and write
|
||
8340000
|
trusted library allocation
|
page read and write
|
||
549E000
|
stack
|
page read and write
|
||
35B7000
|
trusted library allocation
|
page read and write
|
||
3538000
|
trusted library allocation
|
page read and write
|
||
7FE1E000
|
direct allocation
|
page read and write
|
||
21143260000
|
trusted library allocation
|
page read and write
|
||
875E000
|
stack
|
page read and write
|
||
5CDE000
|
stack
|
page read and write
|
||
6AE7000
|
trusted library allocation
|
page read and write
|
||
7EAA000
|
trusted library allocation
|
page read and write
|
||
2641000
|
direct allocation
|
page read and write
|
||
6AF5000
|
heap
|
page read and write
|
||
1B2D000
|
trusted library allocation
|
page execute and read and write
|
||
7E7D000
|
stack
|
page read and write
|
||
3F30000
|
heap
|
page read and write
|
||
28FA000
|
trusted library allocation
|
page read and write
|
||
3390000
|
heap
|
page execute and read and write
|
||
19A4000
|
trusted library allocation
|
page read and write
|
||
4CFD000
|
stack
|
page read and write
|
||
14E4B000
|
trusted library allocation
|
page read and write
|
||
509C000
|
trusted library allocation
|
page read and write
|
||
1257000
|
heap
|
page read and write
|
||
35B0000
|
trusted library allocation
|
page read and write
|
||
691C000
|
stack
|
page read and write
|
||
625000
|
heap
|
page read and write
|
||
14327000
|
heap
|
page read and write
|
||
2673000
|
direct allocation
|
page read and write
|
||
616E000
|
stack
|
page read and write
|
||
354D000
|
trusted library allocation
|
page read and write
|
||
A510000
|
trusted library allocation
|
page read and write
|
||
704000
|
trusted library allocation
|
page read and write
|
||
1B10000
|
trusted library allocation
|
page read and write
|
||
2113DBB0000
|
heap
|
page read and write
|
||
17E5000
|
heap
|
page read and write
|
||
25B6000
|
trusted library allocation
|
page read and write
|
||
643F000
|
stack
|
page read and write
|
||
5550000
|
trusted library allocation
|
page execute and read and write
|
||
3564000
|
trusted library allocation
|
page read and write
|
||
145AE000
|
trusted library allocation
|
page read and write
|
||
39E938B000
|
stack
|
page read and write
|
||
56D9000
|
heap
|
page read and write
|
||
A5B0000
|
trusted library allocation
|
page execute and read and write
|
||
2D2C000
|
trusted library allocation
|
page read and write
|
||
4DAD000
|
trusted library allocation
|
page read and write
|
||
4E2F000
|
stack
|
page read and write
|
||
134C4000
|
heap
|
page read and write
|
||
32CF000
|
trusted library allocation
|
page read and write
|
||
3DAC000
|
trusted library allocation
|
page read and write
|
||
304F000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
heap
|
page read and write
|
||
58BE000
|
trusted library allocation
|
page read and write
|
||
BB1D000
|
heap
|
page read and write
|
||
AEA6000
|
heap
|
page read and write
|
||
2113DC67000
|
heap
|
page read and write
|
||
1C12000
|
trusted library allocation
|
page read and write
|
||
3C35000
|
trusted library allocation
|
page read and write
|
||
679C000
|
stack
|
page read and write
|
||
2F24000
|
trusted library allocation
|
page read and write
|
||
A161000
|
heap
|
page read and write
|
||
C19C000
|
stack
|
page read and write
|
||
12000
|
unkown
|
page readonly
|
||
1CB0000
|
trusted library allocation
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
3121000
|
trusted library allocation
|
page read and write
|
||
5B40000
|
heap
|
page execute and read and write
|
||
62B6000
|
trusted library allocation
|
page read and write
|
||
125D000
|
heap
|
page read and write
|
||
36EC000
|
trusted library allocation
|
page read and write
|
||
26BC000
|
trusted library allocation
|
page read and write
|
||
2B79000
|
trusted library allocation
|
page read and write
|
||
54F9000
|
trusted library allocation
|
page read and write
|
||
303A000
|
trusted library allocation
|
page read and write
|
||
7350000
|
heap
|
page read and write
|
||
B9D7000
|
heap
|
page read and write
|
||
BF22000
|
heap
|
page read and write
|
||
3CAC000
|
stack
|
page read and write
|
||
11F4000
|
trusted library allocation
|
page read and write
|
||
A6A0000
|
trusted library allocation
|
page execute and read and write
|
||
6F0000
|
trusted library allocation
|
page read and write
|
||
4200000
|
remote allocation
|
page read and write
|
||
AE87000
|
heap
|
page read and write
|
||
33CA000
|
trusted library allocation
|
page read and write
|
||
575C000
|
stack
|
page read and write
|
||
32F5000
|
trusted library allocation
|
page execute and read and write
|
||
3460000
|
trusted library allocation
|
page read and write
|
||
65E5000
|
trusted library allocation
|
page read and write
|
||
14A11000
|
trusted library allocation
|
page read and write
|
||
61AD000
|
stack
|
page read and write
|
||
5D4C000
|
stack
|
page read and write
|
||
2F8E000
|
trusted library allocation
|
page read and write
|
||
8181000
|
trusted library allocation
|
page read and write
|
||
353E000
|
trusted library allocation
|
page read and write
|
||
39EB67E000
|
unkown
|
page readonly
|
||
32EA000
|
trusted library allocation
|
page read and write
|
||
1170000
|
trusted library allocation
|
page read and write
|
||
5174000
|
trusted library allocation
|
page read and write
|
||
5A00000
|
trusted library allocation
|
page read and write
|
||
E1F0000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
6350000
|
trusted library allocation
|
page read and write
|
||
3BC7000
|
trusted library allocation
|
page read and write
|
||
A7B0000
|
heap
|
page read and write
|
||
32B0000
|
trusted library allocation
|
page read and write
|
||
3950000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
4A50000
|
trusted library allocation
|
page execute and read and write
|
||
32D3000
|
trusted library allocation
|
page read and write
|
||
3555000
|
trusted library allocation
|
page read and write
|
||
A610000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
unkown
|
page write copy
|
||
A220000
|
heap
|
page read and write
|
||
3552000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
trusted library allocation
|
page read and write
|
||
821E000
|
stack
|
page read and write
|
||
3C6F000
|
stack
|
page read and write
|
||
21143190000
|
trusted library allocation
|
page read and write
|
||
6C7000
|
unkown
|
page read and write
|
||
1890000
|
trusted library allocation
|
page read and write
|
||
60B0000
|
trusted library allocation
|
page read and write
|
||
14540000
|
trusted library allocation
|
page read and write
|
||
5480000
|
trusted library allocation
|
page read and write
|
||
39EBC7E000
|
unkown
|
page readonly
|
||
AEF000
|
direct allocation
|
page read and write
|
||
35CE000
|
trusted library allocation
|
page read and write
|
||
39EAB7E000
|
unkown
|
page readonly
|
||
F2C8000
|
trusted library allocation
|
page read and write
|
||
CA50000
|
trusted library allocation
|
page read and write
|
||
71D000
|
trusted library allocation
|
page execute and read and write
|
||
76E0000
|
trusted library allocation
|
page execute and read and write
|
||
44CB000
|
trusted library allocation
|
page read and write
|
||
B686000
|
trusted library allocation
|
page read and write
|
||
DB5000
|
heap
|
page read and write
|
||
3295000
|
trusted library allocation
|
page execute and read and write
|
||
992000
|
heap
|
page read and write
|
||
12BB000
|
stack
|
page read and write
|
||
3CF9000
|
trusted library allocation
|
page read and write
|
||
46A1000
|
trusted library allocation
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
1C03000
|
trusted library allocation
|
page read and write
|
||
39EAE7E000
|
unkown
|
page readonly
|
||
2802000
|
trusted library allocation
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
39EA7FE000
|
stack
|
page read and write
|
||
6080000
|
trusted library allocation
|
page read and write
|
||
13F90000
|
trusted library allocation
|
page read and write
|
||
A8BE000
|
stack
|
page read and write
|
||
7470000
|
trusted library allocation
|
page read and write
|
||
5110000
|
heap
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
32EE000
|
trusted library allocation
|
page read and write
|
||
56A0000
|
heap
|
page read and write
|
||
8175000
|
trusted library allocation
|
page read and write
|
||
21143490000
|
heap
|
page read and write
|
||
BD11000
|
heap
|
page read and write
|
||
4DD3000
|
trusted library allocation
|
page read and write
|
||
F2DD000
|
trusted library allocation
|
page read and write
|
||
AE10000
|
heap
|
page read and write
|
||
816F000
|
trusted library allocation
|
page read and write
|
||
644E000
|
stack
|
page read and write
|
||
2EF7000
|
trusted library allocation
|
page read and write
|
||
AF80000
|
trusted library allocation
|
page execute and read and write
|
||
C850000
|
heap
|
page read and write
|
||
2D24000
|
trusted library allocation
|
page read and write
|
||
1760000
|
heap
|
page read and write
|
||
541C000
|
heap
|
page read and write
|
||
9165000
|
heap
|
page read and write
|
||
7E9B000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
2920000
|
trusted library allocation
|
page read and write
|
||
14D9000
|
trusted library allocation
|
page read and write
|
||
2D64000
|
trusted library allocation
|
page read and write
|
||
50EF000
|
trusted library allocation
|
page read and write
|
||
5A9E000
|
stack
|
page read and write
|
||
BB0F000
|
heap
|
page read and write
|
||
6231000
|
trusted library allocation
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
845C000
|
trusted library allocation
|
page read and write
|
||
3371000
|
trusted library allocation
|
page read and write
|
||
77E000
|
heap
|
page read and write
|
||
1C98000
|
heap
|
page read and write
|
||
39EA4FE000
|
stack
|
page read and write
|
||
757E000
|
stack
|
page read and write
|
||
1200000
|
trusted library allocation
|
page execute and read and write
|
||
FF83000
|
trusted library allocation
|
page read and write
|
||
FF88000
|
trusted library allocation
|
page read and write
|
||
6AD7000
|
trusted library allocation
|
page read and write
|
||
6B47000
|
trusted library allocation
|
page read and write
|
||
5E2D000
|
trusted library allocation
|
page read and write
|
||
6910000
|
heap
|
page read and write
|
||
9192000
|
heap
|
page read and write
|
||
27E1000
|
trusted library allocation
|
page read and write
|
||
14148000
|
trusted library allocation
|
page read and write
|
||
8170000
|
trusted library allocation
|
page read and write
|
||
3FAA000
|
heap
|
page read and write
|
||
3309000
|
trusted library allocation
|
page read and write
|
||
5181000
|
trusted library allocation
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
1796000
|
heap
|
page read and write
|
||
13613000
|
heap
|
page read and write
|
||
14CB000
|
trusted library allocation
|
page read and write
|
||
5709000
|
heap
|
page read and write
|
||
6A7B000
|
trusted library allocation
|
page read and write
|
||
510E000
|
trusted library allocation
|
page read and write
|
||
198E000
|
stack
|
page read and write
|
||
6F60000
|
heap
|
page read and write
|
||
45C8000
|
trusted library allocation
|
page read and write
|
||
8206000
|
trusted library allocation
|
page read and write
|
||
BB88000
|
heap
|
page read and write
|
||
603E000
|
stack
|
page read and write
|
||
13396000
|
heap
|
page read and write
|
||
C072000
|
heap
|
page read and write
|
||
C025000
|
heap
|
page read and write
|
||
4C2000
|
unkown
|
page write copy
|
||
6D50000
|
heap
|
page read and write
|
||
51AB000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
heap
|
page read and write
|
||
64EA000
|
heap
|
page read and write
|
||
3681000
|
trusted library allocation
|
page read and write
|
||
21143260000
|
trusted library allocation
|
page read and write
|
||
39FA000
|
trusted library allocation
|
page read and write
|
||
6AA6000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
83DE000
|
stack
|
page read and write
|
||
B0A0000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
2669000
|
trusted library allocation
|
page read and write
|
||
58B6000
|
trusted library allocation
|
page read and write
|
||
2113F100000
|
trusted library allocation
|
page read and write
|
||
3D6E000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
heap
|
page execute and read and write
|
||
2B87000
|
trusted library allocation
|
page read and write
|
||
2F9B000
|
trusted library allocation
|
page read and write
|
||
91CD000
|
heap
|
page read and write
|
||
A26E000
|
heap
|
page read and write
|
||
14D54000
|
trusted library allocation
|
page read and write
|
||
1B9E000
|
stack
|
page read and write
|
||
4CF0000
|
trusted library allocation
|
page read and write
|
||
5D3E000
|
trusted library allocation
|
page read and write
|
||
54DE000
|
stack
|
page read and write
|
||
37BA000
|
trusted library allocation
|
page read and write
|
||
2E89000
|
trusted library allocation
|
page read and write
|
||
2B76000
|
trusted library allocation
|
page read and write
|
||
260F000
|
trusted library allocation
|
page read and write
|
||
5189000
|
trusted library allocation
|
page read and write
|
||
14F30000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
trusted library allocation
|
page read and write
|
||
394F000
|
stack
|
page read and write
|
||
6242000
|
heap
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
139B000
|
trusted library allocation
|
page read and write
|
||
2113DBD0000
|
heap
|
page read and write
|
||
2770000
|
trusted library allocation
|
page read and write
|
||
145AB000
|
trusted library allocation
|
page read and write
|
||
81A7000
|
trusted library allocation
|
page read and write
|
||
2684000
|
trusted library allocation
|
page read and write
|
||
35CC000
|
trusted library allocation
|
page read and write
|
||
E27E000
|
stack
|
page read and write
|
||
3645000
|
trusted library allocation
|
page read and write
|
||
A2D2000
|
heap
|
page read and write
|
||
81A0000
|
trusted library allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
B04000
|
direct allocation
|
page read and write
|
||
1C10000
|
trusted library allocation
|
page read and write
|
||
7260000
|
trusted library allocation
|
page read and write
|
||
8163000
|
trusted library allocation
|
page read and write
|
||
135A7000
|
heap
|
page read and write
|
||
629E000
|
trusted library allocation
|
page read and write
|
||
2689000
|
direct allocation
|
page read and write
|
||
63F0000
|
heap
|
page read and write
|
||
62D1000
|
trusted library allocation
|
page read and write
|
||
76C0000
|
trusted library allocation
|
page read and write
|
||
4120000
|
trusted library allocation
|
page execute and read and write
|
||
26E0000
|
heap
|
page read and write
|
||
A148000
|
heap
|
page read and write
|
||
29A0000
|
direct allocation
|
page read and write
|
||
2C0A000
|
trusted library allocation
|
page read and write
|
||
5E50000
|
heap
|
page execute and read and write
|
||
DF8000
|
stack
|
page read and write
|
||
76D0000
|
trusted library allocation
|
page execute and read and write
|
||
5914000
|
trusted library allocation
|
page read and write
|
||
11FC000
|
stack
|
page read and write
|
||
123A000
|
heap
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
9180000
|
heap
|
page read and write
|
||
5E3E000
|
trusted library allocation
|
page read and write
|
||
3A41000
|
trusted library allocation
|
page read and write
|
||
5BB0000
|
heap
|
page read and write
|
||
69A0000
|
trusted library allocation
|
page execute and read and write
|
||
6950000
|
trusted library allocation
|
page read and write
|
||
6BBC000
|
heap
|
page read and write
|
||
4FE0000
|
trusted library allocation
|
page read and write
|
||
135D9000
|
heap
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
91F4000
|
heap
|
page read and write
|
||
947000
|
heap
|
page read and write
|
||
5D4E000
|
stack
|
page read and write
|
||
81B2000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
1C16000
|
trusted library allocation
|
page execute and read and write
|
||
630000
|
trusted library allocation
|
page read and write
|
||
2D75000
|
trusted library allocation
|
page read and write
|
||
3658000
|
trusted library allocation
|
page read and write
|
||
1338F000
|
heap
|
page read and write
|
||
356E000
|
trusted library allocation
|
page read and write
|
||
6400000
|
trusted library allocation
|
page execute and read and write
|
||
1730000
|
heap
|
page read and write
|
||
738D000
|
stack
|
page read and write
|
||
9EF000
|
stack
|
page read and write
|
||
1371F000
|
stack
|
page read and write
|
||
14042000
|
trusted library allocation
|
page read and write
|
||
266D000
|
trusted library allocation
|
page read and write
|
||
5178000
|
trusted library allocation
|
page read and write
|
||
E034000
|
heap
|
page read and write
|
||
DE0000
|
unkown
|
page readonly
|
||
38CD000
|
trusted library allocation
|
page read and write
|
||
13175000
|
heap
|
page read and write
|
||
3674000
|
trusted library allocation
|
page read and write
|
||
336E000
|
trusted library allocation
|
page read and write
|
||
1767000
|
heap
|
page read and write
|
||
1355A000
|
heap
|
page read and write
|
||
13146000
|
heap
|
page read and write
|
||
2B89000
|
trusted library allocation
|
page read and write
|
||
33CE000
|
trusted library allocation
|
page read and write
|
||
4A70000
|
heap
|
page read and write
|
||
35EB000
|
trusted library allocation
|
page read and write
|
||
BF34000
|
heap
|
page read and write
|
||
6D1000
|
unkown
|
page read and write
|
||
BD70000
|
trusted library section
|
page read and write
|
||
4C81000
|
trusted library allocation
|
page read and write
|
||
15DF000
|
stack
|
page read and write
|
||
3392000
|
trusted library allocation
|
page read and write
|
||
2F28000
|
trusted library allocation
|
page read and write
|
||
74D7000
|
direct allocation
|
page read and write
|
||
317F000
|
trusted library allocation
|
page read and write
|
||
3F5A000
|
heap
|
page read and write
|
||
335E000
|
stack
|
page read and write
|
||
4A93000
|
heap
|
page read and write
|
||
211432E0000
|
trusted library allocation
|
page read and write
|
||
5E50000
|
trusted library allocation
|
page read and write
|
||
5B86000
|
heap
|
page execute and read and write
|
||
5709000
|
heap
|
page read and write
|
||
9A5000
|
heap
|
page read and write
|
||
75C0000
|
trusted library allocation
|
page execute and read and write
|
||
AF6000
|
direct allocation
|
page read and write
|
||
30F0000
|
trusted library allocation
|
page read and write
|
||
6770000
|
trusted library allocation
|
page execute and read and write
|
||
13D9000
|
heap
|
page read and write
|
||
B396000
|
trusted library allocation
|
page read and write
|
||
5700000
|
heap
|
page read and write
|
||
8245000
|
trusted library allocation
|
page read and write
|
||
1336F000
|
heap
|
page read and write
|
||
3BF0000
|
trusted library allocation
|
page read and write
|
||
275D000
|
trusted library allocation
|
page read and write
|
||
2F3C000
|
stack
|
page read and write
|
||
317C000
|
trusted library allocation
|
page read and write
|
||
7370000
|
trusted library allocation
|
page read and write
|
||
1110000
|
heap
|
page execute and read and write
|
||
3606000
|
trusted library allocation
|
page read and write
|
||
3C9B000
|
trusted library allocation
|
page read and write
|
||
14DE000
|
stack
|
page read and write
|
||
5DDD000
|
stack
|
page read and write
|
||
6305000
|
trusted library allocation
|
page read and write
|
||
6BB0000
|
heap
|
page read and write
|
||
6E9D000
|
stack
|
page read and write
|
||
3BF9000
|
trusted library allocation
|
page read and write
|
||
6960000
|
trusted library allocation
|
page execute and read and write
|
||
8014000
|
trusted library allocation
|
page read and write
|
||
180C000
|
heap
|
page read and write
|
||
635E000
|
trusted library allocation
|
page read and write
|
||
5E0E000
|
trusted library allocation
|
page read and write
|
||
2113E350000
|
trusted library section
|
page read and write
|
||
838C000
|
trusted library allocation
|
page read and write
|
||
39EA3FE000
|
stack
|
page read and write
|
||
2626000
|
trusted library allocation
|
page read and write
|
||
333F000
|
trusted library allocation
|
page read and write
|
||
4A11000
|
trusted library allocation
|
page read and write
|
||
63C0000
|
trusted library allocation
|
page read and write
|
||
4A39000
|
trusted library allocation
|
page read and write
|
||
4F45000
|
trusted library allocation
|
page read and write
|
||
5962000
|
trusted library allocation
|
page read and write
|
||
1B40000
|
heap
|
page read and write
|
||
6D1F000
|
stack
|
page read and write
|
||
49F4000
|
trusted library allocation
|
page read and write
|
||
4C8D000
|
trusted library allocation
|
page read and write
|
||
55DE000
|
stack
|
page read and write
|
||
647A000
|
trusted library allocation
|
page read and write
|
||
6210000
|
trusted library allocation
|
page read and write
|
||
4A61000
|
trusted library allocation
|
page read and write
|
||
110000
|
unkown
|
page readonly
|
||
265D000
|
direct allocation
|
page read and write
|
||
45FB000
|
trusted library allocation
|
page read and write
|
||
65A8000
|
trusted library allocation
|
page read and write
|
||
4200000
|
remote allocation
|
page read and write
|
||
7E9F000
|
trusted library allocation
|
page read and write
|
||
E200000
|
trusted library allocation
|
page read and write
|
||
371E000
|
stack
|
page read and write
|
||
7900000
|
trusted library allocation
|
page execute and read and write
|
||
9179000
|
heap
|
page read and write
|
||
5A5C000
|
stack
|
page read and write
|
||
2605000
|
trusted library allocation
|
page read and write
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
675000
|
trusted library allocation
|
page execute and read and write
|
||
3CF9000
|
trusted library allocation
|
page read and write
|
||
2F4D000
|
trusted library allocation
|
page read and write
|
||
6A90000
|
trusted library allocation
|
page read and write
|
||
C3B000
|
stack
|
page read and write
|
||
1B14000
|
trusted library allocation
|
page read and write
|
||
5956000
|
trusted library allocation
|
page read and write
|
||
369E000
|
stack
|
page read and write
|
||
846E000
|
trusted library allocation
|
page read and write
|
||
730000
|
trusted library allocation
|
page read and write
|
||
41AD000
|
stack
|
page read and write
|
||
50E9000
|
trusted library allocation
|
page read and write
|
||
1320000
|
trusted library allocation
|
page read and write
|
||
18A8000
|
heap
|
page read and write
|
||
14F56000
|
trusted library allocation
|
page read and write
|
||
56A0000
|
heap
|
page read and write
|
||
90B1000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
heap
|
page read and write
|
||
5990000
|
trusted library allocation
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
13437000
|
heap
|
page read and write
|
||
3718000
|
trusted library allocation
|
page read and write
|
||
5A3E000
|
stack
|
page read and write
|
||
5740000
|
heap
|
page read and write
|
||
211434D4000
|
heap
|
page read and write
|
||
3307000
|
trusted library allocation
|
page read and write
|
||
39DF000
|
trusted library allocation
|
page read and write
|
||
6D07000
|
trusted library allocation
|
page read and write
|
||
6240000
|
heap
|
page read and write
|
||
5DD0000
|
trusted library allocation
|
page execute and read and write
|
||
3CFD000
|
trusted library allocation
|
page read and write
|
||
B9B4000
|
heap
|
page read and write
|
||
371B000
|
trusted library allocation
|
page read and write
|
||
7B70000
|
unkown
|
page readonly
|
||
7FDE0000
|
trusted library allocation
|
page execute and read and write
|
||
2C3B000
|
trusted library allocation
|
page read and write
|
||
39E96FF000
|
stack
|
page read and write
|
||
BC9B000
|
heap
|
page read and write
|
||
4B0D000
|
trusted library allocation
|
page read and write
|
||
3BB2000
|
trusted library allocation
|
page read and write
|
||
25F2000
|
trusted library allocation
|
page read and write
|
||
6BB6000
|
heap
|
page read and write
|
||
3720000
|
direct allocation
|
page read and write
|
||
14F2B000
|
stack
|
page read and write
|
||
7230000
|
heap
|
page read and write
|
||
6AEB000
|
trusted library allocation
|
page read and write
|
||
1DDE000
|
stack
|
page read and write
|
||
2688000
|
trusted library allocation
|
page read and write
|
||
14AE0000
|
trusted library allocation
|
page read and write
|
||
7F0D000
|
trusted library allocation
|
page read and write
|
||
2BE0000
|
trusted library allocation
|
page read and write
|
||
2C74000
|
trusted library allocation
|
page read and write
|
||
BB6B000
|
heap
|
page read and write
|
||
81B8000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
trusted library allocation
|
page read and write
|
||
ADD7000
|
heap
|
page read and write
|
||
B69E000
|
trusted library allocation
|
page read and write
|
||
1402000
|
unkown
|
page readonly
|
||
1367C000
|
trusted library allocation
|
page read and write
|
||
5E04000
|
trusted library allocation
|
page read and write
|
||
26C4000
|
trusted library allocation
|
page read and write
|
||
3969000
|
trusted library allocation
|
page read and write
|
||
26F0000
|
direct allocation
|
page execute and read and write
|
||
4F71000
|
trusted library allocation
|
page read and write
|
||
4F7000
|
stack
|
page read and write
|
||
5E2E000
|
stack
|
page read and write
|
||
100D3000
|
unkown
|
page read and write
|
||
3598000
|
trusted library allocation
|
page read and write
|
||
136CD000
|
stack
|
page read and write
|
||
1398D000
|
trusted library allocation
|
page read and write
|
||
6CD6000
|
trusted library allocation
|
page read and write
|
||
66DC000
|
stack
|
page read and write
|
||
6A28000
|
trusted library allocation
|
page read and write
|
||
1C60000
|
heap
|
page execute and read and write
|
||
5166000
|
trusted library allocation
|
page read and write
|
||
13BD0000
|
trusted library allocation
|
page read and write
|
||
5F30000
|
trusted library allocation
|
page execute and read and write
|
||
BAE000
|
stack
|
page read and write
|
||
572C000
|
stack
|
page read and write
|
||
13F83000
|
trusted library allocation
|
page read and write
|
||
74B000
|
trusted library allocation
|
page execute and read and write
|
||
6290000
|
trusted library allocation
|
page read and write
|
||
11CA000
|
heap
|
page read and write
|
||
4C0E000
|
stack
|
page read and write
|
||
2F0D000
|
trusted library allocation
|
page read and write
|
||
2621000
|
direct allocation
|
page read and write
|
||
260D000
|
trusted library allocation
|
page read and write
|
||
5930000
|
trusted library allocation
|
page read and write
|
||
17FE000
|
heap
|
page read and write
|
||
3F9A000
|
heap
|
page read and write
|
||
703000
|
trusted library allocation
|
page execute and read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
3BE6000
|
trusted library allocation
|
page read and write
|
||
4A1D000
|
trusted library allocation
|
page read and write
|
||
5E21000
|
trusted library allocation
|
page read and write
|
||
A319000
|
heap
|
page read and write
|
||
6377000
|
trusted library allocation
|
page read and write
|
||
E1C000
|
heap
|
page read and write
|
||
3970000
|
trusted library allocation
|
page execute and read and write
|
||
14E4E000
|
trusted library allocation
|
page read and write
|
||
1480000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
5E18000
|
trusted library allocation
|
page read and write
|
||
2113E51A000
|
heap
|
page read and write
|
||
395C000
|
trusted library allocation
|
page read and write
|
||
A17C000
|
heap
|
page read and write
|
||
2E80000
|
trusted library allocation
|
page read and write
|
||
AD1000
|
direct allocation
|
page read and write
|
||
B20E000
|
trusted library allocation
|
page read and write
|
||
5948000
|
trusted library allocation
|
page read and write
|
||
3954000
|
trusted library allocation
|
page read and write
|
||
131EA000
|
heap
|
page read and write
|
||
58AE000
|
stack
|
page read and write
|
||
2FA9000
|
trusted library allocation
|
page read and write
|
||
E0C9000
|
heap
|
page read and write
|
||
14140000
|
trusted library allocation
|
page read and write
|
||
3038000
|
trusted library allocation
|
page read and write
|
||
140F1000
|
trusted library allocation
|
page read and write
|
||
5E0B000
|
trusted library allocation
|
page read and write
|
||
13EF000
|
heap
|
page read and write
|
||
6400000
|
trusted library allocation
|
page execute and read and write
|
||
34B9000
|
heap
|
page read and write
|
||
14138000
|
trusted library allocation
|
page read and write
|
||
3440000
|
heap
|
page read and write
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
760000
|
trusted library allocation
|
page read and write
|
||
13BAE000
|
stack
|
page read and write
|
||
1485000
|
trusted library allocation
|
page execute and read and write
|
||
5BDE000
|
stack
|
page read and write
|
||
14572000
|
trusted library allocation
|
page read and write
|
||
25EE000
|
trusted library allocation
|
page read and write
|
||
147A000
|
trusted library allocation
|
page execute and read and write
|
||
821B000
|
trusted library allocation
|
page read and write
|
||
569D000
|
trusted library allocation
|
page read and write
|
||
7910000
|
heap
|
page read and write
|
||
19A3000
|
trusted library allocation
|
page execute and read and write
|
||
3714000
|
direct allocation
|
page read and write
|
||
6290000
|
trusted library allocation
|
page read and write
|
||
63B0000
|
trusted library allocation
|
page read and write
|
||
211432D0000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
916A000
|
heap
|
page read and write
|
||
64EE000
|
heap
|
page read and write
|
||
5E3C000
|
trusted library allocation
|
page read and write
|
||
BD92000
|
trusted library section
|
page read and write
|
||
14670000
|
trusted library allocation
|
page read and write
|
||
89CE000
|
stack
|
page read and write
|
||
AF30000
|
trusted library allocation
|
page read and write
|
||
B3C0000
|
trusted library allocation
|
page read and write
|
||
268A000
|
trusted library allocation
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page execute and read and write
|
||
2595000
|
trusted library allocation
|
page read and write
|
||
81B3000
|
trusted library allocation
|
page read and write
|
||
3BAC000
|
trusted library allocation
|
page read and write
|
||
10FE000
|
trusted library allocation
|
page read and write
|
||
999000
|
heap
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
813A000
|
trusted library allocation
|
page read and write
|
||
3BFB000
|
trusted library allocation
|
page read and write
|
||
7480000
|
heap
|
page read and write
|
||
26B4000
|
trusted library allocation
|
page read and write
|
||
E1D0000
|
trusted library allocation
|
page execute and read and write
|
||
815C000
|
trusted library allocation
|
page read and write
|
||
5CDE000
|
stack
|
page read and write
|
||
83FF000
|
trusted library allocation
|
page read and write
|
||
8570000
|
heap
|
page read and write
|
||
2E38000
|
trusted library allocation
|
page read and write
|
||
AA63000
|
trusted library allocation
|
page read and write
|
||
6B00000
|
trusted library allocation
|
page read and write
|
||
13D3000
|
trusted library allocation
|
page read and write
|
||
798000
|
heap
|
page read and write
|
||
2D6F000
|
trusted library allocation
|
page read and write
|
||
518D000
|
trusted library allocation
|
page read and write
|
||
6260000
|
trusted library allocation
|
page read and write
|
||
A2E1000
|
heap
|
page read and write
|
||
4F1C000
|
trusted library allocation
|
page read and write
|
||
5820000
|
heap
|
page read and write
|
||
2113DD02000
|
heap
|
page read and write
|
||
149A6000
|
trusted library allocation
|
page read and write
|
||
3940000
|
trusted library allocation
|
page read and write
|
||
174F000
|
heap
|
page read and write
|
||
1C77000
|
trusted library allocation
|
page execute and read and write
|
||
11B6000
|
heap
|
page read and write
|
||
261A000
|
trusted library allocation
|
page read and write
|
||
54CD000
|
stack
|
page read and write
|
||
8A5000
|
heap
|
page read and write
|
||
6596000
|
trusted library allocation
|
page read and write
|
||
D38000
|
stack
|
page read and write
|
||
39EA2FE000
|
stack
|
page read and write
|
||
36DE000
|
trusted library allocation
|
page read and write
|
||
2D60000
|
trusted library allocation
|
page read and write
|
||
97F000
|
heap
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
94A000
|
heap
|
page read and write
|
||
2EF2000
|
trusted library allocation
|
page read and write
|
||
4A66000
|
trusted library allocation
|
page read and write
|
||
B1A000
|
direct allocation
|
page read and write
|
||
7FCA0000
|
trusted library allocation
|
page execute and read and write
|
||
7700000
|
trusted library allocation
|
page read and write
|
||
E2000
|
unkown
|
page readonly
|
||
91B3000
|
heap
|
page read and write
|
||
26A1000
|
trusted library allocation
|
page read and write
|
||
4A90000
|
heap
|
page read and write
|
||
62E5000
|
trusted library allocation
|
page read and write
|
||
C8F0000
|
heap
|
page read and write
|
||
3350000
|
trusted library allocation
|
page read and write
|
||
524E000
|
stack
|
page read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
25A3000
|
trusted library allocation
|
page read and write
|
||
842B000
|
trusted library allocation
|
page read and write
|
||
BC40000
|
heap
|
page read and write
|
||
FF38000
|
trusted library allocation
|
page read and write
|
||
6B08000
|
unkown
|
page readonly
|
||
21143500000
|
heap
|
page read and write
|
||
2F8A000
|
trusted library allocation
|
page read and write
|
||
ADFA000
|
heap
|
page read and write
|
||
5CA0000
|
heap
|
page read and write
|
||
48F4000
|
trusted library allocation
|
page read and write
|
||
2E97000
|
trusted library allocation
|
page read and write
|
||
515E000
|
stack
|
page read and write
|
||
6B00000
|
trusted library allocation
|
page read and write
|
||
14D09000
|
trusted library allocation
|
page read and write
|
||
53D0000
|
trusted library section
|
page readonly
|
||
648D000
|
stack
|
page read and write
|
||
50C7000
|
trusted library allocation
|
page read and write
|
||
5DA0000
|
trusted library allocation
|
page execute and read and write
|
||
510C000
|
stack
|
page read and write
|
||
13037000
|
heap
|
page read and write
|
||
4DB5000
|
trusted library allocation
|
page read and write
|
||
594E000
|
trusted library allocation
|
page read and write
|
||
5E77000
|
trusted library allocation
|
page read and write
|
||
3340000
|
trusted library allocation
|
page execute and read and write
|
||
1460000
|
trusted library allocation
|
page read and write
|
||
506E000
|
stack
|
page read and write
|
||
B250000
|
trusted library allocation
|
page read and write
|
||
BC8000
|
heap
|
page read and write
|
||
132BB000
|
heap
|
page read and write
|
||
BCAA000
|
trusted library section
|
page read and write
|
||
582F000
|
stack
|
page read and write
|
||
A5C0000
|
heap
|
page read and write
|
||
747000
|
trusted library allocation
|
page execute and read and write
|
||
A7C0000
|
trusted library allocation
|
page read and write
|
||
93F000
|
heap
|
page read and write
|
||
81DB000
|
trusted library allocation
|
page read and write
|
||
5186000
|
trusted library allocation
|
page read and write
|
||
3608000
|
trusted library allocation
|
page read and write
|
||
14E2E000
|
trusted library allocation
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page execute and read and write
|
||
17FC000
|
heap
|
page read and write
|
||
850E000
|
stack
|
page read and write
|
||
15E0000
|
trusted library allocation
|
page read and write
|
||
B200000
|
trusted library allocation
|
page read and write
|
||
2113EA40000
|
trusted library allocation
|
page read and write
|
||
919E000
|
heap
|
page read and write
|
||
F6C000
|
stack
|
page read and write
|
||
132A000
|
trusted library allocation
|
page execute and read and write
|
||
1718000
|
heap
|
page read and write
|
||
26C0000
|
trusted library allocation
|
page read and write
|
||
13F7C000
|
trusted library allocation
|
page read and write
|
||
28F6000
|
trusted library allocation
|
page read and write
|
||
5706000
|
heap
|
page read and write
|
||
6BC0000
|
heap
|
page read and write
|
||
1615000
|
heap
|
page read and write
|
||
6371000
|
trusted library allocation
|
page read and write
|
||
6ABE000
|
trusted library allocation
|
page read and write
|
||
2C7A000
|
trusted library allocation
|
page read and write
|
||
F43C000
|
stack
|
page read and write
|
||
2622000
|
trusted library allocation
|
page read and write
|
||
5ABE000
|
stack
|
page read and write
|
||
7273000
|
trusted library allocation
|
page read and write
|
||
2E84000
|
trusted library allocation
|
page read and write
|
||
C093000
|
heap
|
page read and write
|
||
E0FB000
|
heap
|
page read and write
|
||
50CB000
|
trusted library allocation
|
page read and write
|
||
6420000
|
trusted library allocation
|
page read and write
|
||
4ACE000
|
trusted library allocation
|
page read and write
|
||
7B50000
|
trusted library allocation
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
BE20000
|
heap
|
page read and write
|
||
1910000
|
heap
|
page read and write
|
||
19C0000
|
trusted library allocation
|
page read and write
|
||
13604000
|
heap
|
page read and write
|
||
DCF0000
|
trusted library allocation
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
24AC000
|
stack
|
page read and write
|
||
B300000
|
trusted library allocation
|
page execute and read and write
|
||
3630000
|
trusted library allocation
|
page execute and read and write
|
||
37AD000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
5076000
|
trusted library allocation
|
page read and write
|
||
5E06000
|
trusted library allocation
|
page read and write
|
||
50D3000
|
trusted library allocation
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
6ADA000
|
trusted library allocation
|
page read and write
|
||
C21F000
|
trusted library allocation
|
page read and write
|
||
266C000
|
direct allocation
|
page read and write
|
||
9196000
|
heap
|
page read and write
|
||
4CB0000
|
trusted library allocation
|
page read and write
|
||
15E5000
|
trusted library allocation
|
page read and write
|
||
1587000
|
trusted library allocation
|
page read and write
|
||
677000
|
trusted library allocation
|
page execute and read and write
|
||
9185000
|
heap
|
page read and write
|
||
1210000
|
trusted library allocation
|
page read and write
|
||
7691000
|
trusted library allocation
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page read and write
|
||
5089000
|
trusted library allocation
|
page read and write
|
||
770000
|
trusted library allocation
|
page execute and read and write
|
||
3692000
|
trusted library allocation
|
page read and write
|
||
5BD0000
|
heap
|
page execute and read and write
|
||
BA5A000
|
heap
|
page read and write
|
||
12EB2000
|
heap
|
page read and write
|
||
6A30000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
13040000
|
heap
|
page read and write
|
||
5DEE000
|
stack
|
page read and write
|
||
983000
|
heap
|
page read and write
|
||
6AB0000
|
trusted library section
|
page readonly
|
||
FF25000
|
trusted library allocation
|
page read and write
|
||
6B28000
|
trusted library allocation
|
page read and write
|
||
3580000
|
trusted library allocation
|
page read and write
|
||
58CC000
|
trusted library allocation
|
page read and write
|
||
3CED000
|
trusted library allocation
|
page read and write
|
||
78FE000
|
stack
|
page read and write
|
||
3DA8000
|
trusted library allocation
|
page read and write
|
||
1738000
|
heap
|
page read and write
|
||
13C67000
|
trusted library allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
5E27000
|
trusted library allocation
|
page read and write
|
||
593E000
|
trusted library allocation
|
page read and write
|
||
7250000
|
trusted library allocation
|
page read and write
|
||
6CFC000
|
trusted library allocation
|
page read and write
|
||
1C1A000
|
trusted library allocation
|
page execute and read and write
|
||
81AD000
|
trusted library allocation
|
page read and write
|
||
DD10000
|
trusted library allocation
|
page read and write
|
||
21143170000
|
trusted library allocation
|
page read and write
|
||
7480000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
3CB3000
|
trusted library allocation
|
page read and write
|
||
35F4000
|
trusted library allocation
|
page read and write
|
||
371D000
|
direct allocation
|
page read and write
|
||
2F82000
|
trusted library allocation
|
page read and write
|
||
2C5F000
|
trusted library allocation
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
B640000
|
trusted library allocation
|
page read and write
|
||
C0B0000
|
heap
|
page read and write
|
||
725000
|
heap
|
page read and write
|
||
3BCB000
|
trusted library allocation
|
page read and write
|
||
6D10000
|
trusted library allocation
|
page read and write
|
||
3776000
|
trusted library allocation
|
page read and write
|
||
F31E000
|
trusted library allocation
|
page read and write
|
||
2113EC80000
|
trusted library allocation
|
page read and write
|
||
835C000
|
stack
|
page read and write
|
||
56D5000
|
heap
|
page read and write
|
||
6B2A000
|
trusted library allocation
|
page read and write
|
||
B430000
|
trusted library allocation
|
page execute and read and write
|
||
91E5000
|
heap
|
page read and write
|
||
2F4B000
|
trusted library allocation
|
page read and write
|
||
1465F000
|
trusted library allocation
|
page read and write
|
||
787E000
|
stack
|
page read and write
|
||
35E2000
|
trusted library allocation
|
page read and write
|
||
267A000
|
direct allocation
|
page read and write
|
||
813D000
|
trusted library allocation
|
page read and write
|
||
83A1000
|
trusted library allocation
|
page read and write
|
||
50A0000
|
trusted library allocation
|
page read and write
|
||
372C000
|
trusted library allocation
|
page read and write
|
||
3C6D000
|
trusted library allocation
|
page read and write
|
||
62D6000
|
trusted library allocation
|
page read and write
|
||
35DC000
|
trusted library allocation
|
page read and write
|
||
2681000
|
direct allocation
|
page read and write
|
||
2380000
|
direct allocation
|
page read and write
|
||
53DF000
|
trusted library section
|
page readonly
|
||
180000
|
heap
|
page read and write
|
||
6AC4000
|
trusted library allocation
|
page read and write
|
||
6CF4000
|
trusted library allocation
|
page read and write
|
||
8F90000
|
heap
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
6CC4000
|
trusted library allocation
|
page read and write
|
||
135D1000
|
heap
|
page read and write
|
||
FFCC000
|
trusted library allocation
|
page read and write
|
||
26BE000
|
trusted library allocation
|
page read and write
|
||
77B0000
|
heap
|
page read and write
|
||
27D0000
|
trusted library allocation
|
page read and write
|
||
2EE8000
|
trusted library allocation
|
page read and write
|
||
2D2A000
|
trusted library allocation
|
page read and write
|
||
422A000
|
trusted library allocation
|
page read and write
|
||
9AA000
|
heap
|
page read and write
|
||
2F6D000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
63E8000
|
trusted library allocation
|
page read and write
|
||
3148000
|
trusted library allocation
|
page read and write
|
||
A290000
|
trusted library allocation
|
page read and write
|
||
74B7000
|
direct allocation
|
page read and write
|
||
2113E701000
|
trusted library allocation
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
366D000
|
trusted library allocation
|
page read and write
|
||
4681000
|
trusted library allocation
|
page read and write
|
||
7FC00000
|
trusted library allocation
|
page execute and read and write
|
||
39EA77E000
|
unkown
|
page readonly
|
||
13C6A000
|
trusted library allocation
|
page read and write
|
||
6340000
|
trusted library allocation
|
page execute and read and write
|
||
EA9000
|
heap
|
page read and write
|
||
7380000
|
trusted library allocation
|
page read and write
|
||
264F000
|
direct allocation
|
page read and write
|
||
62C5000
|
heap
|
page read and write
|
||
91A8000
|
heap
|
page read and write
|
||
3590000
|
trusted library allocation
|
page read and write
|
||
9120000
|
heap
|
page read and write
|
||
13F01000
|
trusted library allocation
|
page read and write
|
||
3286000
|
trusted library allocation
|
page execute and read and write
|
||
3D5E000
|
trusted library allocation
|
page read and write
|
||
32EC000
|
trusted library allocation
|
page read and write
|
||
1878000
|
heap
|
page read and write
|
||
2BA6000
|
trusted library allocation
|
page read and write
|
||
2838000
|
trusted library allocation
|
page read and write
|
||
134AD000
|
heap
|
page read and write
|
||
2F84000
|
trusted library allocation
|
page read and write
|
||
5081000
|
trusted library allocation
|
page read and write
|
||
5DC0000
|
trusted library allocation
|
page read and write
|
||
A15B000
|
heap
|
page read and write
|
||
276A000
|
trusted library allocation
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
1421000
|
heap
|
page read and write
|
||
25F4000
|
trusted library allocation
|
page read and write
|
||
13218000
|
heap
|
page read and write
|
||
35F0000
|
trusted library allocation
|
page read and write
|
||
F313000
|
trusted library allocation
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
14EC0000
|
trusted library allocation
|
page read and write
|
||
988000
|
heap
|
page read and write
|
||
2DAF000
|
trusted library allocation
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
8132000
|
trusted library allocation
|
page read and write
|
||
14D6C000
|
trusted library allocation
|
page read and write
|
||
A2F6000
|
heap
|
page read and write
|
||
5A6C000
|
heap
|
page read and write
|
||
65BD000
|
trusted library allocation
|
page read and write
|
||
7BFE000
|
stack
|
page read and write
|
||
3740000
|
heap
|
page execute and read and write
|
||
2113E3D1000
|
trusted library allocation
|
page read and write
|
||
130F000
|
stack
|
page read and write
|
||
E0D7000
|
heap
|
page read and write
|
||
B958000
|
heap
|
page read and write
|
||
56DB000
|
heap
|
page read and write
|
||
5AC0000
|
trusted library allocation
|
page read and write
|
||
D9B000
|
unkown
|
page readonly
|
||
AFD000
|
direct allocation
|
page read and write
|
||
F271000
|
trusted library allocation
|
page read and write
|
||
659B000
|
trusted library allocation
|
page read and write
|
||
4C5D000
|
trusted library allocation
|
page read and write
|
||
33E0000
|
heap
|
page execute and read and write
|
||
2F9F000
|
trusted library allocation
|
page read and write
|
||
25F0000
|
trusted library allocation
|
page read and write
|
||
B210000
|
trusted library allocation
|
page read and write
|
||
BAF9000
|
heap
|
page read and write
|
||
14C60000
|
trusted library allocation
|
page read and write
|
||
157C000
|
trusted library allocation
|
page read and write
|
||
4921000
|
trusted library allocation
|
page read and write
|
||
6B05000
|
trusted library allocation
|
page read and write
|
||
F19B000
|
stack
|
page read and write
|
||
2597000
|
trusted library allocation
|
page read and write
|
||
5DE0000
|
heap
|
page read and write
|
||
BB1F000
|
heap
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
276E000
|
trusted library allocation
|
page read and write
|
||
37A3000
|
trusted library allocation
|
page read and write
|
||
8239000
|
trusted library allocation
|
page read and write
|
||
1BF0000
|
heap
|
page read and write
|
||
5BCF000
|
stack
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
4B7000
|
unkown
|
page read and write
|
||
BD09000
|
heap
|
page read and write
|
||
5E00000
|
trusted library allocation
|
page read and write
|
||
14320000
|
heap
|
page read and write
|
||
130B6000
|
heap
|
page read and write
|
||
7330000
|
trusted library allocation
|
page read and write
|
||
659E000
|
trusted library allocation
|
page read and write
|
||
E0DA000
|
heap
|
page read and write
|
||
A320000
|
heap
|
page read and write
|
||
39EB37E000
|
stack
|
page read and write
|
||
3702000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
trusted library allocation
|
page read and write
|
||
6AD0000
|
heap
|
page read and write
|
||
549E000
|
stack
|
page read and write
|
||
A660000
|
trusted library allocation
|
page read and write
|
||
AFA0000
|
trusted library allocation
|
page execute and read and write
|
||
1C22000
|
trusted library allocation
|
page read and write
|
||
2CAA000
|
trusted library allocation
|
page read and write
|
||
E950000
|
trusted library allocation
|
page execute and read and write
|
||
336F000
|
trusted library allocation
|
page read and write
|
||
6920000
|
trusted library allocation
|
page read and write
|
||
1BE3000
|
trusted library allocation
|
page execute and read and write
|
||
35D0000
|
trusted library allocation
|
page read and write
|
||
35E4000
|
trusted library allocation
|
page read and write
|
||
A2CF000
|
heap
|
page read and write
|
||
2113E402000
|
heap
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
1308B000
|
heap
|
page read and write
|
||
145FF000
|
trusted library allocation
|
page read and write
|
||
2EF4000
|
trusted library allocation
|
page read and write
|
||
6AD4000
|
trusted library allocation
|
page read and write
|
||
623F000
|
stack
|
page read and write
|
||
926000
|
heap
|
page read and write
|
||
A84E000
|
stack
|
page read and write
|
||
4591000
|
trusted library allocation
|
page read and write
|
||
6592000
|
trusted library allocation
|
page read and write
|
||
A275000
|
heap
|
page read and write
|
||
1AB0000
|
trusted library allocation
|
page read and write
|
||
528E000
|
trusted library allocation
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
81F3000
|
trusted library allocation
|
page read and write
|
||
8510000
|
heap
|
page read and write
|
||
B3C9000
|
trusted library allocation
|
page read and write
|
||
2E9D000
|
trusted library allocation
|
page read and write
|
||
39EB07E000
|
unkown
|
page readonly
|
||
91D2000
|
heap
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
3485000
|
heap
|
page read and write
|
||
475A000
|
trusted library allocation
|
page read and write
|
||
13F4000
|
unkown
|
page readonly
|
||
327D000
|
trusted library allocation
|
page execute and read and write
|
||
14D10000
|
trusted library allocation
|
page read and write
|
||
5DE0000
|
trusted library allocation
|
page read and write
|
||
A2A1000
|
heap
|
page read and write
|
||
5509000
|
trusted library allocation
|
page read and write
|
||
A090000
|
heap
|
page read and write
|
||
670000
|
trusted library allocation
|
page read and write
|
||
FEF0000
|
trusted library allocation
|
page read and write
|
||
19B3000
|
trusted library allocation
|
page read and write
|
||
3B56000
|
trusted library allocation
|
page read and write
|
||
2C70000
|
trusted library allocation
|
page read and write
|
||
6A40000
|
trusted library allocation
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
1394E000
|
trusted library allocation
|
page read and write
|
||
5B9D000
|
stack
|
page read and write
|
||
14C40000
|
trusted library allocation
|
page read and write
|
||
175A000
|
heap
|
page read and write
|
||
4441000
|
trusted library allocation
|
page read and write
|
||
13F9F000
|
trusted library allocation
|
page read and write
|
||
2690000
|
direct allocation
|
page read and write
|
||
1536000
|
trusted library allocation
|
page read and write
|
||
2113DC62000
|
heap
|
page read and write
|
||
B1EE000
|
stack
|
page read and write
|
||
330B000
|
trusted library allocation
|
page read and write
|
||
2E7E000
|
trusted library allocation
|
page read and write
|
||
6A94000
|
trusted library allocation
|
page read and write
|
||
3BB4000
|
trusted library allocation
|
page read and write
|
||
3373000
|
trusted library allocation
|
page read and write
|
||
91A3000
|
heap
|
page read and write
|
||
7FE000
|
heap
|
page read and write
|
||
342E000
|
stack
|
page read and write
|
||
144C000
|
stack
|
page read and write
|
||
3310000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
742000
|
trusted library allocation
|
page read and write
|
||
613F000
|
stack
|
page read and write
|
||
6320000
|
trusted library allocation
|
page read and write
|
||
F8EC000
|
stack
|
page read and write
|
||
40AC000
|
stack
|
page read and write
|
||
3B6E000
|
stack
|
page read and write
|
||
F2C1000
|
trusted library allocation
|
page read and write
|
||
98E000
|
heap
|
page read and write
|
||
E0CB000
|
heap
|
page read and write
|
||
2113ED60000
|
trusted library section
|
page readonly
|
||
330D000
|
trusted library allocation
|
page read and write
|
||
828F000
|
trusted library allocation
|
page read and write
|
||
6CE000
|
unkown
|
page read and write
|
||
509E000
|
trusted library allocation
|
page read and write
|
||
650000
|
trusted library allocation
|
page read and write
|
||
25B4000
|
trusted library allocation
|
page read and write
|
||
A670000
|
trusted library allocation
|
page read and write
|
||
DE40000
|
trusted library allocation
|
page read and write
|
||
3356000
|
trusted library allocation
|
page read and write
|
||
6AAC000
|
stack
|
page read and write
|
||
C064000
|
heap
|
page read and write
|
||
2CAE000
|
trusted library allocation
|
page read and write
|
||
12D5B000
|
stack
|
page read and write
|
||
2F22000
|
trusted library allocation
|
page read and write
|
||
FC1E000
|
stack
|
page read and write
|
||
65C2000
|
trusted library allocation
|
page read and write
|
||
8127000
|
trusted library allocation
|
page read and write
|
||
3074000
|
trusted library allocation
|
page read and write
|
||
4DD6000
|
trusted library allocation
|
page read and write
|
||
AB1000
|
direct allocation
|
page read and write
|
||
8437000
|
trusted library allocation
|
page read and write
|
||
189B000
|
heap
|
page read and write
|
||
6970000
|
heap
|
page read and write
|
||
2FA1000
|
trusted library allocation
|
page read and write
|
||
14B08000
|
trusted library allocation
|
page read and write
|
||
A292000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
625C000
|
heap
|
page read and write
|
||
1252000
|
heap
|
page read and write
|
||
274F000
|
trusted library allocation
|
page read and write
|
||
14A71000
|
trusted library allocation
|
page read and write
|
||
2FBE000
|
trusted library allocation
|
page read and write
|
||
1990000
|
trusted library allocation
|
page read and write
|
||
5510000
|
heap
|
page read and write
|
||
A233000
|
heap
|
page read and write
|
||
8139000
|
trusted library allocation
|
page read and write
|
||
8461000
|
trusted library allocation
|
page read and write
|
||
2E78000
|
trusted library allocation
|
page read and write
|
||
2FBC000
|
trusted library allocation
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
978000
|
heap
|
page read and write
|
||
6F4000
|
unkown
|
page readonly
|
||
780000
|
heap
|
page read and write
|
||
2740000
|
trusted library allocation
|
page read and write
|
||
A48D000
|
stack
|
page read and write
|
||
70D000
|
trusted library allocation
|
page execute and read and write
|
||
30E0000
|
trusted library allocation
|
page read and write
|
||
9A9000
|
heap
|
page read and write
|
||
2F07000
|
trusted library allocation
|
page read and write
|
||
3BC9000
|
trusted library allocation
|
page read and write
|
||
2E86000
|
trusted library allocation
|
page read and write
|
||
4C10000
|
trusted library allocation
|
page read and write
|
||
BF6E000
|
heap
|
page read and write
|
||
39EA07E000
|
unkown
|
page readonly
|
||
AEE0000
|
heap
|
page read and write
|
||
39EAA7E000
|
unkown
|
page readonly
|
||
76F0000
|
trusted library allocation
|
page read and write
|
||
6540000
|
trusted library allocation
|
page read and write
|
||
3F5E000
|
stack
|
page read and write
|
||
6EE000
|
stack
|
page read and write
|
||
2580000
|
trusted library allocation
|
page read and write
|
||
A80E000
|
stack
|
page read and write
|
||
6B3C000
|
trusted library allocation
|
page read and write
|
||
1980000
|
heap
|
page read and write
|
||
64E2000
|
heap
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
58B0000
|
trusted library allocation
|
page read and write
|
||
4F2E000
|
stack
|
page read and write
|
||
2CB2000
|
trusted library allocation
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
FF63000
|
trusted library allocation
|
page read and write
|
||
73B0000
|
trusted library allocation
|
page execute and read and write
|
||
2114341F000
|
heap
|
page read and write
|
||
660000
|
trusted library allocation
|
page read and write
|
||
3620000
|
trusted library allocation
|
page read and write
|
||
2E6C000
|
trusted library allocation
|
page read and write
|
||
3BEB000
|
trusted library allocation
|
page read and write
|
||
B6D0000
|
trusted library allocation
|
page read and write
|
||
4565000
|
trusted library allocation
|
page read and write
|
||
13671000
|
trusted library allocation
|
page read and write
|
||
64DA000
|
heap
|
page read and write
|
||
1597000
|
stack
|
page read and write
|
||
5DAE000
|
stack
|
page read and write
|
||
2B6C000
|
trusted library allocation
|
page read and write
|
||
260B000
|
trusted library allocation
|
page read and write
|
||
5D1E000
|
stack
|
page read and write
|
||
2121000
|
trusted library allocation
|
page read and write
|
||
48F0000
|
trusted library allocation
|
page read and write
|
||
BD97000
|
trusted library section
|
page read and write
|
||
3C61000
|
trusted library allocation
|
page read and write
|
||
6AE0000
|
trusted library allocation
|
page read and write
|
||
840D000
|
stack
|
page read and write
|
||
8136000
|
trusted library allocation
|
page read and write
|
||
506C000
|
trusted library allocation
|
page read and write
|
||
2E9F000
|
trusted library allocation
|
page read and write
|
||
994000
|
heap
|
page read and write
|
||
A97B000
|
trusted library allocation
|
page read and write
|
||
1DE000
|
stack
|
page read and write
|
||
7390000
|
trusted library allocation
|
page read and write
|
||
A23D000
|
heap
|
page read and write
|
||
463B000
|
trusted library allocation
|
page read and write
|
||
62DD000
|
trusted library allocation
|
page read and write
|
||
13AD000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
3BAA000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
14F50000
|
trusted library allocation
|
page read and write
|
||
13A35000
|
trusted library allocation
|
page read and write
|
||
11B000
|
stack
|
page read and write
|
||
3531000
|
trusted library allocation
|
page read and write
|
||
BE30000
|
heap
|
page read and write
|
||
7F7E000
|
stack
|
page read and write
|
||
315B000
|
trusted library allocation
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
14145000
|
trusted library allocation
|
page read and write
|
||
3CC5000
|
trusted library allocation
|
page read and write
|
||
1595000
|
trusted library allocation
|
page read and write
|
||
14434000
|
trusted library allocation
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
988000
|
heap
|
page read and write
|
||
50E0000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
501D000
|
stack
|
page read and write
|
||
1B00000
|
trusted library allocation
|
page read and write
|
||
15FE000
|
trusted library allocation
|
page read and write
|
||
B690000
|
trusted library allocation
|
page read and write
|
||
4CE0000
|
trusted library allocation
|
page read and write
|
||
2582000
|
trusted library allocation
|
page read and write
|
||
B260000
|
trusted library allocation
|
page execute and read and write
|
||
5944000
|
trusted library allocation
|
page read and write
|
||
335C000
|
trusted library allocation
|
page read and write
|
||
B6A0000
|
trusted library allocation
|
page read and write
|
||
90D9000
|
trusted library allocation
|
page read and write
|
||
1780000
|
heap
|
page read and write
|
||
486A000
|
trusted library allocation
|
page read and write
|
||
6A40000
|
trusted library allocation
|
page read and write
|
||
2113EDA0000
|
trusted library section
|
page readonly
|
||
92C000
|
heap
|
page read and write
|
||
81AD000
|
trusted library allocation
|
page read and write
|
||
6CC0000
|
trusted library allocation
|
page read and write
|
||
3480000
|
direct allocation
|
page read and write
|
||
3A1B000
|
trusted library allocation
|
page read and write
|
||
568D000
|
stack
|
page read and write
|
||
149B6000
|
trusted library allocation
|
page read and write
|
||
5104000
|
trusted library allocation
|
page read and write
|
||
E910000
|
trusted library allocation
|
page read and write
|
||
50F9000
|
trusted library allocation
|
page read and write
|
||
5C40000
|
trusted library allocation
|
page execute and read and write
|
||
81C4000
|
trusted library allocation
|
page read and write
|
||
6A31000
|
unkown
|
page execute read
|
||
E0DD000
|
heap
|
page read and write
|
||
6450000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
heap
|
page read and write
|
||
2113DC2B000
|
heap
|
page read and write
|
||
1C20000
|
trusted library allocation
|
page read and write
|
||
551C000
|
stack
|
page read and write
|
||
3FA2000
|
heap
|
page read and write
|
||
77D0000
|
trusted library allocation
|
page read and write
|
||
62B5000
|
heap
|
page read and write
|
||
6385000
|
trusted library allocation
|
page read and write
|
||
5E35000
|
trusted library allocation
|
page read and write
|
||
BC27000
|
heap
|
page read and write
|
||
131D000
|
trusted library allocation
|
page execute and read and write
|
||
16E0000
|
heap
|
page read and write
|
||
2FB8000
|
trusted library allocation
|
page read and write
|
||
E1EA000
|
trusted library allocation
|
page read and write
|
||
6A86000
|
heap
|
page read and write
|
||
F274000
|
trusted library allocation
|
page read and write
|
||
AF60000
|
trusted library allocation
|
page execute and read and write
|
||
58C0000
|
trusted library allocation
|
page read and write
|
||
1178000
|
trusted library allocation
|
page read and write
|
||
6320000
|
trusted library allocation
|
page execute and read and write
|
||
1730000
|
heap
|
page read and write
|
||
E152000
|
heap
|
page read and write
|
||
5930000
|
heap
|
page read and write
|
||
3542000
|
trusted library allocation
|
page read and write
|
||
6B03000
|
unkown
|
page write copy
|
||
9AD000
|
heap
|
page read and write
|
||
476B000
|
trusted library allocation
|
page read and write
|
||
39E9E7E000
|
unkown
|
page readonly
|
||
3675000
|
trusted library allocation
|
page read and write
|
||
130BF000
|
heap
|
page read and write
|
||
3606000
|
trusted library allocation
|
page read and write
|
||
637C000
|
trusted library allocation
|
page read and write
|
||
9206000
|
heap
|
page read and write
|
||
6250000
|
trusted library allocation
|
page execute and read and write
|
||
2C43000
|
trusted library allocation
|
page read and write
|
||
4AC8000
|
trusted library allocation
|
page read and write
|
||
B9B8000
|
heap
|
page read and write
|
||
1338B000
|
heap
|
page read and write
|
||
3DB2000
|
trusted library allocation
|
page read and write
|
||
70A000
|
unkown
|
page readonly
|
||
3036000
|
trusted library allocation
|
page read and write
|
||
A297000
|
trusted library allocation
|
page read and write
|
||
33A5000
|
trusted library allocation
|
page read and write
|
||
6B49000
|
trusted library allocation
|
page read and write
|
||
14301000
|
trusted library allocation
|
page read and write
|
||
BB2A000
|
heap
|
page read and write
|
||
39EAAFE000
|
stack
|
page read and write
|
||
5911000
|
trusted library allocation
|
page read and write
|
||
2BE2000
|
trusted library allocation
|
page read and write
|
||
39EA6FE000
|
stack
|
page read and write
|
||
3A02000
|
trusted library allocation
|
page read and write
|
||
3527000
|
trusted library allocation
|
page read and write
|
||
B9C2000
|
heap
|
page read and write
|
||
26000
|
unkown
|
page readonly
|
||
2113E500000
|
heap
|
page read and write
|
||
58DA000
|
trusted library allocation
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
6470000
|
trusted library allocation
|
page read and write
|
||
5F2A000
|
trusted library allocation
|
page read and write
|
||
B987000
|
heap
|
page read and write
|
||
2F69000
|
trusted library allocation
|
page read and write
|
||
12E7C000
|
heap
|
page read and write
|
||
13A3B000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
489A000
|
trusted library allocation
|
page read and write
|
||
39EB47E000
|
unkown
|
page readonly
|
||
14672000
|
trusted library allocation
|
page read and write
|
||
A7AE000
|
stack
|
page read and write
|
||
130C6000
|
heap
|
page read and write
|
||
A50E000
|
stack
|
page read and write
|
||
3290000
|
trusted library allocation
|
page read and write
|
||
1193000
|
trusted library allocation
|
page read and write
|
||
81DE000
|
trusted library allocation
|
page read and write
|
||
76A0000
|
trusted library allocation
|
page read and write
|
||
138DB000
|
trusted library allocation
|
page read and write
|
||
95F000
|
heap
|
page read and write
|
||
820A000
|
trusted library allocation
|
page read and write
|
||
B3FD000
|
trusted library allocation
|
page read and write
|
||
ADDE000
|
heap
|
page read and write
|
||
3626000
|
trusted library allocation
|
page read and write
|
||
2C62000
|
trusted library allocation
|
page read and write
|
||
2571000
|
trusted library allocation
|
page read and write
|
||
39E9977000
|
stack
|
page read and write
|
||
2E71000
|
trusted library allocation
|
page read and write
|
||
80E5000
|
trusted library allocation
|
page read and write
|
||
34F8000
|
trusted library allocation
|
page read and write
|
||
6F8000
|
heap
|
page read and write
|
||
10000
|
unkown
|
page readonly
|
||
3930000
|
trusted library allocation
|
page execute and read and write
|
||
366A000
|
direct allocation
|
page read and write
|
||
39E9C7E000
|
unkown
|
page readonly
|
||
272E000
|
trusted library allocation
|
page read and write
|
||
633E000
|
trusted library allocation
|
page read and write
|
||
63C0000
|
trusted library allocation
|
page read and write
|
||
266F000
|
trusted library allocation
|
page read and write
|
||
9AB000
|
heap
|
page read and write
|
||
847A000
|
trusted library allocation
|
page read and write
|
||
1546000
|
stack
|
page read and write
|
||
359C000
|
trusted library allocation
|
page read and write
|
||
218E000
|
trusted library allocation
|
page read and write
|
||
BD07000
|
heap
|
page read and write
|
||
321D000
|
stack
|
page read and write
|
||
1330F000
|
heap
|
page read and write
|
||
2E82000
|
trusted library allocation
|
page read and write
|
||
8387000
|
trusted library allocation
|
page read and write
|
||
276C000
|
trusted library allocation
|
page read and write
|
||
6600000
|
trusted library allocation
|
page read and write
|
||
526C000
|
trusted library allocation
|
page read and write
|
||
5A10000
|
trusted library allocation
|
page read and write
|
||
32F7000
|
trusted library allocation
|
page read and write
|
||
73A0000
|
trusted library allocation
|
page execute and read and write
|
||
3370000
|
heap
|
page read and write
|
||
AF0A000
|
heap
|
page read and write
|
||
39EB27E000
|
unkown
|
page readonly
|
||
3977000
|
trusted library allocation
|
page read and write
|
||
4F26000
|
trusted library allocation
|
page read and write
|
||
5959000
|
trusted library allocation
|
page read and write
|
||
35C8000
|
trusted library allocation
|
page read and write
|
||
65C5000
|
trusted library allocation
|
page read and write
|
||
8F8D000
|
stack
|
page read and write
|
||
628C000
|
stack
|
page read and write
|
||
727000
|
heap
|
page read and write
|
||
2905000
|
trusted library allocation
|
page read and write
|
||
5370000
|
heap
|
page read and write
|
||
2686000
|
trusted library allocation
|
page read and write
|
||
4FD0000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
14E43000
|
trusted library allocation
|
page read and write
|
||
149E0000
|
trusted library allocation
|
page read and write
|
||
77C0000
|
heap
|
page read and write
|
||
1B23000
|
trusted library allocation
|
page read and write
|
||
1274000
|
heap
|
page read and write
|
||
5C8E000
|
stack
|
page read and write
|
||
355D000
|
trusted library allocation
|
page read and write
|
||
4AA0000
|
unkown
|
page readonly
|
||
3553000
|
trusted library allocation
|
page read and write
|
||
38DF000
|
trusted library allocation
|
page read and write
|
||
2753000
|
trusted library allocation
|
page read and write
|
||
E28000
|
heap
|
page read and write
|
||
2760000
|
trusted library allocation
|
page read and write
|
||
15C5000
|
heap
|
page read and write
|
||
7162000
|
trusted library allocation
|
page read and write
|
||
5970000
|
trusted library allocation
|
page read and write
|
||
2113DC6C000
|
heap
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
298A000
|
direct allocation
|
page read and write
|
||
13A62000
|
unkown
|
page read and write
|
||
184E000
|
stack
|
page read and write
|
||
269D000
|
trusted library allocation
|
page read and write
|
||
33E0000
|
trusted library allocation
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
63CA000
|
trusted library allocation
|
page read and write
|
||
2851000
|
trusted library allocation
|
page read and write
|
||
211432C0000
|
trusted library allocation
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
5095000
|
trusted library allocation
|
page read and write
|
||
6A1C000
|
stack
|
page read and write
|
||
39F8000
|
trusted library allocation
|
page read and write
|
||
F53C000
|
stack
|
page read and write
|
||
BF15000
|
heap
|
page read and write
|
||
3070000
|
trusted library allocation
|
page read and write
|
||
3BB6000
|
trusted library allocation
|
page read and write
|
||
4A80000
|
trusted library allocation
|
page read and write
|
||
2113DCB2000
|
heap
|
page read and write
|
||
5E70000
|
trusted library allocation
|
page read and write
|
||
2D1E000
|
trusted library allocation
|
page read and write
|
||
367B000
|
trusted library allocation
|
page read and write
|
||
F87000
|
heap
|
page read and write
|
||
12ED1000
|
heap
|
page read and write
|
||
6560000
|
trusted library allocation
|
page execute and read and write
|
||
5450000
|
heap
|
page read and write
|
||
2E9B000
|
trusted library allocation
|
page read and write
|
||
5E4A000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page execute and read and write
|
||
A190000
|
heap
|
page read and write
|
||
1A9E000
|
stack
|
page read and write
|
||
2584000
|
trusted library allocation
|
page read and write
|
||
3B6C000
|
trusted library allocation
|
page read and write
|
||
1356D000
|
heap
|
page read and write
|
||
115B000
|
trusted library allocation
|
page execute and read and write
|
||
2B74000
|
trusted library allocation
|
page read and write
|
||
2E99000
|
trusted library allocation
|
page read and write
|
||
395A000
|
trusted library allocation
|
page read and write
|
||
1183000
|
trusted library allocation
|
page execute and read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
5DD0000
|
trusted library allocation
|
page read and write
|
||
303E000
|
trusted library allocation
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
2D5A000
|
trusted library allocation
|
page read and write
|
||
3D2C000
|
trusted library allocation
|
page read and write
|
||
37A0000
|
trusted library allocation
|
page read and write
|
||
21143502000
|
heap
|
page read and write
|
||
9174000
|
heap
|
page read and write
|
||
571F000
|
heap
|
page read and write
|
||
3615000
|
trusted library allocation
|
page read and write
|
||
5C9C000
|
stack
|
page read and write
|
||
560E000
|
stack
|
page read and write
|
||
3BAA000
|
trusted library allocation
|
page read and write
|
||
2FC4000
|
trusted library allocation
|
page read and write
|
||
273E000
|
trusted library allocation
|
page read and write
|
||
B650000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
3557000
|
trusted library allocation
|
page read and write
|
||
81AA000
|
trusted library allocation
|
page read and write
|
||
257C000
|
trusted library allocation
|
page read and write
|
||
640000
|
trusted library allocation
|
page read and write
|
||
9A6000
|
heap
|
page read and write
|
||
35ED000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
63BE000
|
stack
|
page read and write
|
||
173A000
|
heap
|
page read and write
|
||
B3A0000
|
trusted library allocation
|
page read and write
|
||
1364D000
|
heap
|
page read and write
|
||
AEF4000
|
heap
|
page read and write
|
||
B8ED000
|
trusted library allocation
|
page read and write
|
||
2B72000
|
trusted library allocation
|
page read and write
|
||
2BFB000
|
trusted library allocation
|
page read and write
|
||
91AB000
|
heap
|
page read and write
|
||
4516000
|
trusted library allocation
|
page read and write
|
||
B670000
|
trusted library allocation
|
page execute and read and write
|
||
83A5000
|
trusted library allocation
|
page read and write
|
||
141D7000
|
trusted library allocation
|
page read and write
|
||
81EE000
|
trusted library allocation
|
page read and write
|
||
B8C1000
|
trusted library allocation
|
page read and write
|
||
FF28000
|
trusted library allocation
|
page read and write
|
||
2755000
|
trusted library allocation
|
page read and write
|
||
F293000
|
trusted library allocation
|
page read and write
|
||
64DE000
|
heap
|
page read and write
|
||
108E000
|
stack
|
page read and write
|
||
63A0000
|
trusted library allocation
|
page read and write
|
||
80F1000
|
trusted library allocation
|
page read and write
|
||
3358000
|
trusted library allocation
|
page read and write
|
||
5B40000
|
trusted library allocation
|
page read and write
|
||
5B6E000
|
stack
|
page read and write
|
||
36E7000
|
trusted library allocation
|
page read and write
|
||
62A0000
|
trusted library allocation
|
page execute and read and write
|
||
2BE4000
|
trusted library allocation
|
page read and write
|
||
BAFE000
|
heap
|
page read and write
|
||
3A13000
|
trusted library allocation
|
page read and write
|
||
E1C0000
|
trusted library allocation
|
page execute and read and write
|
||
246E000
|
stack
|
page read and write
|
||
32D7000
|
trusted library allocation
|
page read and write
|
||
3430000
|
heap
|
page execute and read and write
|
||
BCF3000
|
trusted library section
|
page read and write
|
||
B697000
|
trusted library allocation
|
page read and write
|
||
2113DD13000
|
heap
|
page read and write
|
||
AF1B000
|
heap
|
page read and write
|
||
4A60000
|
trusted library allocation
|
page read and write
|
||
33C2000
|
trusted library allocation
|
page read and write
|
||
5A6C000
|
heap
|
page read and write
|
||
1C25000
|
trusted library allocation
|
page execute and read and write
|
||
2FC2000
|
trusted library allocation
|
page read and write
|
||
13AAC000
|
stack
|
page read and write
|
||
A4CE000
|
stack
|
page read and write
|
||
14A40000
|
trusted library allocation
|
page read and write
|
||
66A000
|
trusted library allocation
|
page execute and read and write
|
||
13940000
|
trusted library allocation
|
page read and write
|
||
2822000
|
trusted library allocation
|
page read and write
|
||
7FE6000
|
trusted library allocation
|
page read and write
|
||
A16D000
|
heap
|
page read and write
|
||
CA80000
|
trusted library allocation
|
page execute and read and write
|
||
21143330000
|
remote allocation
|
page read and write
|
||
100D3000
|
unkown
|
page read and write
|
||
62E0000
|
trusted library allocation
|
page read and write
|
||
35D0000
|
trusted library allocation
|
page read and write
|
||
5490000
|
heap
|
page read and write
|
||
940D000
|
stack
|
page read and write
|
||
5D90000
|
trusted library allocation
|
page read and write
|
||
2B3F000
|
stack
|
page read and write
|
||
7356000
|
heap
|
page read and write
|
||
994000
|
heap
|
page read and write
|
||
330D000
|
heap
|
page read and write
|
||
98E000
|
heap
|
page read and write
|
||
A600000
|
trusted library allocation
|
page read and write
|
||
307F000
|
trusted library allocation
|
page read and write
|
||
35E3000
|
trusted library allocation
|
page read and write
|
||
2628000
|
trusted library allocation
|
page read and write
|
||
14F35000
|
trusted library allocation
|
page read and write
|
||
50E4000
|
trusted library allocation
|
page read and write
|
||
3F00000
|
trusted library allocation
|
page read and write
|
||
50E2000
|
trusted library allocation
|
page read and write
|
||
339B000
|
stack
|
page read and write
|
||
6B1D000
|
trusted library allocation
|
page read and write
|
||
565E000
|
stack
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
30BF000
|
trusted library allocation
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
302E000
|
trusted library allocation
|
page read and write
|
||
56BA000
|
stack
|
page read and write
|
||
E1BD000
|
stack
|
page read and write
|
||
7573000
|
trusted library allocation
|
page read and write
|
||
CA60000
|
heap
|
page execute and read and write
|
||
7CE000
|
stack
|
page read and write
|
||
2B61000
|
trusted library allocation
|
page read and write
|
||
E099000
|
heap
|
page read and write
|
||
3574000
|
trusted library allocation
|
page read and write
|
||
63C0000
|
trusted library allocation
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page execute and read and write
|
||
13687000
|
trusted library allocation
|
page read and write
|
||
12E60000
|
heap
|
page read and write
|
||
B694000
|
trusted library allocation
|
page read and write
|
||
1BA000
|
stack
|
page read and write
|
||
4130000
|
trusted library allocation
|
page read and write
|
||
3560000
|
trusted library allocation
|
page read and write
|
||
6060000
|
trusted library allocation
|
page read and write
|
||
1157000
|
trusted library allocation
|
page execute and read and write
|
||
6AE0000
|
trusted library allocation
|
page read and write
|
||
3613000
|
trusted library allocation
|
page read and write
|
||
142AA000
|
trusted library allocation
|
page read and write
|
||
14A00000
|
trusted library allocation
|
page read and write
|
||
423E000
|
stack
|
page read and write
|
||
92A000
|
heap
|
page read and write
|
||
338E000
|
trusted library allocation
|
page read and write
|
||
78F0000
|
heap
|
page read and write
|
||
47B4000
|
trusted library allocation
|
page read and write
|
||
AEE3000
|
heap
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page execute and read and write
|
||
4F56000
|
trusted library allocation
|
page read and write
|
||
33A3000
|
trusted library allocation
|
page read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
C20E000
|
stack
|
page read and write
|
||
1150000
|
trusted library allocation
|
page read and write
|
||
80F4000
|
trusted library allocation
|
page read and write
|
||
77E5000
|
heap
|
page read and write
|
||
2113DC6A000
|
heap
|
page read and write
|
||
B398000
|
trusted library allocation
|
page read and write
|
||
14295000
|
trusted library allocation
|
page read and write
|
||
14680000
|
trusted library allocation
|
page read and write
|
||
13C61000
|
trusted library allocation
|
page read and write
|
||
54F8000
|
heap
|
page read and write
|
||
82FE000
|
trusted library allocation
|
page read and write
|
||
A2D8000
|
heap
|
page read and write
|
||
35E9000
|
trusted library allocation
|
page read and write
|
||
5DEE000
|
trusted library allocation
|
page read and write
|
||
19D0000
|
heap
|
page read and write
|
||
AE26000
|
heap
|
page read and write
|
||
37B0000
|
trusted library allocation
|
page read and write
|
||
ADB1000
|
heap
|
page read and write
|
||
8FB3000
|
heap
|
page read and write
|
||
A510000
|
heap
|
page read and write
|
||
1152000
|
trusted library allocation
|
page read and write
|
||
1497000
|
heap
|
page read and write
|
||
135F7000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
1442000
|
trusted library allocation
|
page read and write
|
||
2941000
|
trusted library allocation
|
page read and write
|
||
6D9000
|
unkown
|
page write copy
|
||
27BF000
|
trusted library allocation
|
page read and write
|
||
A258000
|
heap
|
page read and write
|
||
C855000
|
heap
|
page read and write
|
||
3968000
|
trusted library allocation
|
page read and write
|
||
3350000
|
trusted library allocation
|
page read and write
|
||
2682000
|
trusted library allocation
|
page read and write
|
||
6A0000
|
trusted library allocation
|
page read and write
|
||
1AC0000
|
heap
|
page read and write
|
||
AA68000
|
trusted library allocation
|
page read and write
|
||
6D4B000
|
trusted library allocation
|
page read and write
|
||
3CCA000
|
trusted library allocation
|
page read and write
|
||
6376000
|
trusted library allocation
|
page read and write
|
||
E1E0000
|
trusted library allocation
|
page read and write
|
||
14130000
|
trusted library allocation
|
page read and write
|
||
2DD0000
|
trusted library allocation
|
page read and write
|
||
2881000
|
trusted library allocation
|
page read and write
|
||
32FB000
|
trusted library allocation
|
page execute and read and write
|
||
135AD000
|
heap
|
page read and write
|
||
2113E513000
|
heap
|
page read and write
|
||
B13000
|
direct allocation
|
page read and write
|
||
62C0000
|
trusted library allocation
|
page read and write
|
||
83B9000
|
trusted library allocation
|
page read and write
|
||
395E000
|
trusted library allocation
|
page read and write
|
||
4AC3000
|
trusted library allocation
|
page read and write
|
||
28D6000
|
trusted library allocation
|
page read and write
|
||
4D4C000
|
stack
|
page read and write
|
||
1349A000
|
heap
|
page read and write
|
||
100D3000
|
unkown
|
page read and write
|
||
51EF000
|
trusted library allocation
|
page read and write
|
||
8155000
|
trusted library allocation
|
page read and write
|
||
522E000
|
stack
|
page read and write
|
||
14230000
|
trusted library allocation
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
2F8C000
|
trusted library allocation
|
page read and write
|
||
14E63000
|
trusted library allocation
|
page read and write
|
||
9F9000
|
direct allocation
|
page read and write
|
||
2C78000
|
trusted library allocation
|
page read and write
|
||
13FAF000
|
trusted library allocation
|
page read and write
|
||
142F0000
|
trusted library allocation
|
page read and write
|
||
6C9000
|
unkown
|
page read and write
|
||
3566000
|
trusted library allocation
|
page read and write
|
||
B21000
|
direct allocation
|
page read and write
|
||
1482000
|
trusted library allocation
|
page read and write
|
||
73A0000
|
trusted library allocation
|
page read and write
|
||
39EA47E000
|
unkown
|
page readonly
|
||
3CF4000
|
trusted library allocation
|
page read and write
|
||
5109000
|
trusted library allocation
|
page read and write
|
||
C883000
|
heap
|
page read and write
|
||
6490000
|
trusted library allocation
|
page read and write
|
||
3D27000
|
trusted library allocation
|
page read and write
|
||
5BC5000
|
trusted library allocation
|
page read and write
|
||
13DCC000
|
trusted library allocation
|
page read and write
|
||
13157000
|
heap
|
page read and write
|
||
7EFE000
|
trusted library allocation
|
page read and write
|
||
A9BF000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6529000
|
heap
|
page read and write
|
||
1480000
|
trusted library allocation
|
page read and write
|
||
919A000
|
heap
|
page read and write
|
||
353C000
|
stack
|
page read and write
|
||
AF20000
|
trusted library allocation
|
page read and write
|
||
142E0000
|
trusted library allocation
|
page execute and read and write
|
||
5580000
|
heap
|
page read and write
|
||
5934000
|
trusted library allocation
|
page read and write
|
||
2113E51B000
|
heap
|
page read and write
|
||
80A8000
|
trusted library allocation
|
page read and write
|
||
2113E55B000
|
heap
|
page read and write
|
||
39C0000
|
trusted library allocation
|
page read and write
|
||
7EE5000
|
trusted library allocation
|
page read and write
|
||
137B000
|
heap
|
page read and write
|
||
35CE000
|
trusted library allocation
|
page read and write
|
||
13EF0000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
trusted library allocation
|
page read and write
|
||
E414000
|
trusted library allocation
|
page read and write
|
||
360B000
|
trusted library allocation
|
page read and write
|
||
14132000
|
trusted library allocation
|
page read and write
|
||
14C0000
|
trusted library allocation
|
page read and write
|
||
3681000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
5E2E000
|
trusted library allocation
|
page read and write
|
||
1C70000
|
trusted library allocation
|
page read and write
|
||
2F86000
|
trusted library allocation
|
page read and write
|
||
7970000
|
trusted library allocation
|
page read and write
|
||
19CA000
|
trusted library allocation
|
page execute and read and write
|
||
A45C000
|
stack
|
page read and write
|
||
2ED2000
|
trusted library allocation
|
page read and write
|
||
C1DB000
|
stack
|
page read and write
|
||
464D000
|
trusted library allocation
|
page read and write
|
||
ADF6000
|
heap
|
page read and write
|
||
5853000
|
trusted library allocation
|
page read and write
|
||
3365000
|
trusted library allocation
|
page read and write
|
||
13C50000
|
trusted library allocation
|
page read and write
|
||
63A0000
|
trusted library allocation
|
page read and write
|
||
144B000
|
trusted library allocation
|
page execute and read and write
|
||
1AB3000
|
trusted library allocation
|
page execute and read and write
|
||
56B0000
|
trusted library allocation
|
page execute and read and write
|
||
7696000
|
trusted library allocation
|
page read and write
|
||
2F20000
|
trusted library allocation
|
page read and write
|
||
13B7000
|
stack
|
page read and write
|
||
5D4A000
|
trusted library allocation
|
page read and write
|
||
19C6000
|
trusted library allocation
|
page execute and read and write
|
||
3305000
|
heap
|
page read and write
|
||
638E000
|
trusted library allocation
|
page read and write
|
||
F2CE000
|
trusted library allocation
|
page read and write
|
||
3077000
|
trusted library allocation
|
page read and write
|
||
5E1E000
|
trusted library allocation
|
page read and write
|
||
25B8000
|
trusted library allocation
|
page read and write
|
||
12F5A000
|
heap
|
page read and write
|
||
570D000
|
stack
|
page read and write
|
||
6590000
|
trusted library section
|
page readonly
|
||
211432E0000
|
trusted library allocation
|
page read and write
|
||
3E1E000
|
trusted library allocation
|
page read and write
|
||
63A0000
|
trusted library allocation
|
page read and write
|
||
6A70000
|
trusted library allocation
|
page read and write
|
||
39E3000
|
trusted library allocation
|
page read and write
|
||
9217000
|
heap
|
page read and write
|
||
3F92000
|
heap
|
page read and write
|
||
6620000
|
trusted library allocation
|
page execute and read and write
|
||
4DAA000
|
trusted library allocation
|
page read and write
|
||
158D000
|
trusted library allocation
|
page read and write
|
||
6920000
|
trusted library allocation
|
page read and write
|
||
51A6000
|
trusted library allocation
|
page read and write
|
||
64D000
|
trusted library allocation
|
page execute and read and write
|
||
7EAE000
|
trusted library allocation
|
page read and write
|
||
BB8D000
|
heap
|
page read and write
|
||
BC76000
|
heap
|
page read and write
|
||
5192000
|
trusted library allocation
|
page read and write
|
||
8FA0000
|
heap
|
page read and write
|
||
21143200000
|
trusted library allocation
|
page read and write
|
||
14240000
|
trusted library allocation
|
page execute and read and write
|
||
B720000
|
trusted library allocation
|
page execute and read and write
|
||
720000
|
heap
|
page read and write
|
||
36AC000
|
trusted library allocation
|
page read and write
|
||
1577000
|
stack
|
page read and write
|
||
2D4D000
|
trusted library allocation
|
page read and write
|
||
5DF0000
|
heap
|
page read and write
|
||
127D000
|
heap
|
page read and write
|
||
7FE2C000
|
direct allocation
|
page read and write
|
||
2759000
|
trusted library allocation
|
page read and write
|
||
51DC000
|
trusted library allocation
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
2D28000
|
trusted library allocation
|
page read and write
|
||
3490000
|
trusted library allocation
|
page read and write
|
||
511D000
|
stack
|
page read and write
|
||
367B000
|
trusted library allocation
|
page read and write
|
||
21143180000
|
trusted library allocation
|
page read and write
|
||
254E000
|
stack
|
page read and write
|
||
90F0000
|
trusted library allocation
|
page execute and read and write
|
||
AD87000
|
heap
|
page read and write
|
||
3BC5000
|
trusted library allocation
|
page read and write
|
||
135A2000
|
heap
|
page read and write
|
||
7740000
|
heap
|
page read and write
|
||
1220000
|
trusted library allocation
|
page read and write
|
||
3962000
|
trusted library allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
78BC000
|
stack
|
page read and write
|
||
5936000
|
trusted library allocation
|
page read and write
|
||
39AE000
|
trusted library allocation
|
page read and write
|
||
2BDE000
|
trusted library allocation
|
page read and write
|
||
89E000
|
stack
|
page read and write
|
||
AE34000
|
heap
|
page read and write
|
||
545E000
|
heap
|
page read and write
|
||
62B0000
|
trusted library allocation
|
page read and write
|
||
1B48000
|
heap
|
page read and write
|
||
7ED4000
|
trusted library allocation
|
page read and write
|
||
E90000
|
trusted library allocation
|
page read and write
|
||
6AB8000
|
trusted library allocation
|
page read and write
|
||
14330000
|
heap
|
page read and write
|
||
1331D000
|
heap
|
page read and write
|
||
30D0000
|
trusted library allocation
|
page read and write
|
||
9115000
|
heap
|
page read and write
|
||
377D000
|
trusted library allocation
|
page read and write
|
||
149A0000
|
trusted library allocation
|
page read and write
|
||
5460000
|
trusted library allocation
|
page execute and read and write
|
||
2F53000
|
trusted library allocation
|
page read and write
|
||
C04F000
|
heap
|
page read and write
|
||
3C2E000
|
trusted library allocation
|
page read and write
|
||
366B000
|
trusted library allocation
|
page read and write
|
||
9305000
|
heap
|
page read and write
|
||
306E000
|
trusted library allocation
|
page read and write
|
||
2848000
|
trusted library allocation
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
33A1000
|
trusted library allocation
|
page read and write
|
||
5430000
|
heap
|
page read and write
|
||
2F05000
|
trusted library allocation
|
page read and write
|
||
80BE000
|
stack
|
page read and write
|
||
9300000
|
heap
|
page read and write
|
||
BC3C000
|
heap
|
page read and write
|
||
1746000
|
heap
|
page read and write
|
||
1AA0000
|
heap
|
page read and write
|
||
2F75000
|
heap
|
page read and write
|
||
50BF000
|
trusted library allocation
|
page read and write
|
||
56D8000
|
heap
|
page read and write
|
||
BF17000
|
heap
|
page read and write
|
||
3E71000
|
trusted library allocation
|
page read and write
|
||
9153000
|
heap
|
page read and write
|
||
35D4000
|
trusted library allocation
|
page read and write
|
||
34BB000
|
trusted library allocation
|
page read and write
|
||
6550000
|
trusted library allocation
|
page read and write
|
||
2C18000
|
trusted library allocation
|
page read and write
|
||
3375000
|
trusted library allocation
|
page read and write
|
||
7493000
|
trusted library allocation
|
page read and write
|
||
BF69000
|
heap
|
page read and write
|
||
B3B1000
|
trusted library allocation
|
page read and write
|
||
2CA6000
|
trusted library allocation
|
page read and write
|
||
3F81000
|
trusted library allocation
|
page read and write
|
||
7410000
|
trusted library allocation
|
page read and write
|
||
2B85000
|
trusted library allocation
|
page read and write
|
||
4971000
|
trusted library allocation
|
page read and write
|
||
13171000
|
heap
|
page read and write
|
||
5975000
|
trusted library allocation
|
page read and write
|
||
C11B000
|
heap
|
page read and write
|
||
1470000
|
trusted library allocation
|
page read and write
|
||
C870000
|
heap
|
page read and write
|
||
5164000
|
trusted library allocation
|
page read and write
|
||
71A000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
58CE000
|
trusted library allocation
|
page read and write
|
||
987000
|
heap
|
page read and write
|
||
AA41000
|
trusted library allocation
|
page read and write
|
||
3679000
|
trusted library allocation
|
page read and write
|
||
FC35000
|
trusted library allocation
|
page read and write
|
||
4EAE000
|
stack
|
page read and write
|
||
559E000
|
stack
|
page read and write
|
||
BBD0000
|
heap
|
page read and write
|
||
32D1000
|
trusted library allocation
|
page read and write
|
||
138C0000
|
trusted library allocation
|
page read and write
|
||
91C1000
|
heap
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
14DBA000
|
trusted library allocation
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
||
3E2E000
|
stack
|
page read and write
|
||
50BB000
|
trusted library allocation
|
page read and write
|
||
4AB9000
|
trusted library allocation
|
page read and write
|
||
1B3A000
|
trusted library allocation
|
page execute and read and write
|
||
9A0000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
6300000
|
trusted library allocation
|
page read and write
|
||
91A0000
|
heap
|
page read and write
|
||
21143466000
|
heap
|
page read and write
|
||
824B000
|
trusted library allocation
|
page read and write
|
||
3138000
|
trusted library allocation
|
page read and write
|
||
9F2000
|
direct allocation
|
page read and write
|
||
E940000
|
trusted library allocation
|
page read and write
|
||
36DE000
|
stack
|
page read and write
|
||
32F7000
|
trusted library allocation
|
page execute and read and write
|
||
131E7000
|
heap
|
page read and write
|
||
883000
|
heap
|
page read and write
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
2F26000
|
trusted library allocation
|
page read and write
|
||
5EDC000
|
stack
|
page read and write
|
||
14659000
|
trusted library allocation
|
page read and write
|
||
3E24000
|
trusted library allocation
|
page read and write
|
||
14E82000
|
trusted library allocation
|
page read and write
|
||
4FEB000
|
stack
|
page read and write
|
||
13980000
|
trusted library allocation
|
page read and write
|
||
250E000
|
stack
|
page read and write
|
||
BB0B000
|
heap
|
page read and write
|
||
2BA4000
|
trusted library allocation
|
page read and write
|
||
3BE2000
|
trusted library allocation
|
page read and write
|
||
3292000
|
trusted library allocation
|
page read and write
|
||
50C9000
|
trusted library allocation
|
page read and write
|
||
3DBA000
|
trusted library allocation
|
page read and write
|
||
61B0000
|
trusted library allocation
|
page read and write
|
||
2FA5000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
unkown
|
page readonly
|
||
1768000
|
heap
|
page read and write
|
||
A30D000
|
stack
|
page read and write
|
||
49FB000
|
trusted library allocation
|
page read and write
|
||
1B5E000
|
stack
|
page read and write
|
||
BBEA000
|
heap
|
page read and write
|
||
6CE8000
|
trusted library allocation
|
page read and write
|
||
74E3000
|
direct allocation
|
page read and write
|
||
5729000
|
heap
|
page read and write
|
||
77A0000
|
trusted library section
|
page readonly
|
||
67FC000
|
stack
|
page read and write
|
||
12E70000
|
heap
|
page read and write
|
||
6A30000
|
unkown
|
page readonly
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
2F91000
|
trusted library allocation
|
page read and write
|
||
5D20000
|
trusted library allocation
|
page read and write
|
||
CFB000
|
stack
|
page read and write
|
||
13A6A000
|
unkown
|
page read and write
|
||
1170000
|
trusted library allocation
|
page read and write
|
||
4A0E000
|
trusted library allocation
|
page read and write
|
||
14D9F000
|
trusted library allocation
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
273A000
|
trusted library allocation
|
page read and write
|
||
50C5000
|
trusted library allocation
|
page read and write
|
||
BCDB000
|
heap
|
page read and write
|
||
4170000
|
trusted library allocation
|
page read and write
|
||
14C43000
|
trusted library allocation
|
page read and write
|
||
2BC2000
|
trusted library allocation
|
page read and write
|
||
507E000
|
stack
|
page read and write
|
||
2648000
|
direct allocation
|
page read and write
|
||
21143191000
|
trusted library allocation
|
page read and write
|
||
3534000
|
trusted library allocation
|
page read and write
|
||
1C40000
|
trusted library allocation
|
page read and write
|
||
3C8C000
|
trusted library allocation
|
page read and write
|
||
145B8000
|
trusted library allocation
|
page read and write
|
||
3542000
|
trusted library allocation
|
page read and write
|
||
369D000
|
trusted library allocation
|
page read and write
|
||
B330000
|
trusted library allocation
|
page execute and read and write
|
||
1377E000
|
stack
|
page read and write
|
||
672000
|
trusted library allocation
|
page read and write
|
||
7F850000
|
trusted library allocation
|
page execute and read and write
|
||
5F1E000
|
stack
|
page read and write
|
||
2C14000
|
trusted library allocation
|
page read and write
|
||
62F0000
|
trusted library allocation
|
page execute and read and write
|
||
2C16000
|
trusted library allocation
|
page read and write
|
||
894E000
|
stack
|
page read and write
|
||
14250000
|
trusted library allocation
|
page read and write
|
||
211434CA000
|
heap
|
page read and write
|
||
5380000
|
trusted library allocation
|
page read and write
|
||
B290000
|
trusted library allocation
|
page read and write
|
||
6391000
|
trusted library allocation
|
page read and write
|
||
5D84000
|
trusted library allocation
|
page read and write
|
||
129000
|
unkown
|
page readonly
|
||
822E000
|
trusted library allocation
|
page read and write
|
||
3BCF000
|
trusted library allocation
|
page read and write
|
||
4110000
|
trusted library allocation
|
page read and write
|
||
148B000
|
trusted library allocation
|
page execute and read and write
|
||
39EA97E000
|
stack
|
page read and write
|
||
14CF8000
|
trusted library allocation
|
page read and write
|
||
3545000
|
trusted library allocation
|
page read and write
|
||
825C000
|
stack
|
page read and write
|
||
2C5D000
|
trusted library allocation
|
page read and write
|
||
39E9B7E000
|
stack
|
page read and write
|
||
39E1000
|
trusted library allocation
|
page read and write
|
||
6AD0000
|
trusted library allocation
|
page read and write
|
||
7547000
|
direct allocation
|
page read and write
|
||
50F1000
|
trusted library allocation
|
page read and write
|
||
FB1E000
|
stack
|
page read and write
|
||
2F40000
|
heap
|
page execute and read and write
|
||
2BF5000
|
trusted library allocation
|
page read and write
|
||
91E8000
|
heap
|
page read and write
|
||
60D0000
|
unkown
|
page readonly
|
||
3A2C000
|
trusted library allocation
|
page read and write
|
||
33B5000
|
trusted library allocation
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
2C8F000
|
trusted library allocation
|
page read and write
|
||
6CEA000
|
trusted library allocation
|
page read and write
|
||
84FD000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
56FE000
|
heap
|
page read and write
|
||
1B13000
|
trusted library allocation
|
page execute and read and write
|
||
5D3E000
|
stack
|
page read and write
|
||
5D81000
|
trusted library allocation
|
page read and write
|
||
E09B000
|
heap
|
page read and write
|
||
3BA8000
|
trusted library allocation
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
5AC0000
|
heap
|
page read and write
|
||
135AB000
|
heap
|
page read and write
|
||
12FC3000
|
heap
|
page read and write
|
||
2EF0000
|
trusted library allocation
|
page read and write
|
||
69EE000
|
stack
|
page read and write
|
||
E98000
|
trusted library allocation
|
page read and write
|
||
92E0000
|
heap
|
page read and write
|
||
372E000
|
direct allocation
|
page read and write
|
||
B0C000
|
direct allocation
|
page read and write
|
||
1870000
|
heap
|
page read and write
|
||
1C7B000
|
trusted library allocation
|
page execute and read and write
|
||
65AE000
|
trusted library allocation
|
page read and write
|
||
7A4E000
|
stack
|
page read and write
|
||
63E5000
|
trusted library allocation
|
page read and write
|
||
365D000
|
trusted library allocation
|
page read and write
|
||
A2AC000
|
heap
|
page read and write
|
||
2F0F000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page execute and read and write
|
||
35C0000
|
trusted library allocation
|
page read and write
|
||
3CC1000
|
trusted library allocation
|
page read and write
|
||
6220000
|
trusted library allocation
|
page read and write
|
||
149AF000
|
trusted library allocation
|
page read and write
|
||
1413E000
|
trusted library allocation
|
page read and write
|
||
7FB3000
|
trusted library allocation
|
page read and write
|
||
1443A000
|
trusted library allocation
|
page read and write
|
||
12F4A000
|
heap
|
page read and write
|
||
8A9000
|
heap
|
page read and write
|
||
81FE000
|
stack
|
page read and write
|
||
826000
|
heap
|
page read and write
|
||
2599000
|
trusted library allocation
|
page read and write
|
||
14D5A000
|
trusted library allocation
|
page read and write
|
||
2113EDB0000
|
trusted library section
|
page readonly
|
||
720000
|
heap
|
page read and write
|
||
21143330000
|
remote allocation
|
page read and write
|
||
59D0000
|
trusted library allocation
|
page execute and read and write
|
||
2C72000
|
trusted library allocation
|
page read and write
|
||
14047000
|
trusted library allocation
|
page read and write
|
||
561D000
|
stack
|
page read and write
|
||
35AA000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
5747000
|
heap
|
page read and write
|
||
2BFF000
|
trusted library allocation
|
page read and write
|
||
269B000
|
trusted library allocation
|
page read and write
|
||
1AA0000
|
trusted library allocation
|
page read and write
|
||
5701000
|
heap
|
page read and write
|
||
2F9D000
|
trusted library allocation
|
page read and write
|
||
335D000
|
trusted library allocation
|
page read and write
|
||
5727000
|
heap
|
page read and write
|
||
7498000
|
direct allocation
|
page read and write
|
||
33C0000
|
trusted library allocation
|
page execute and read and write
|
||
2113DCFF000
|
heap
|
page read and write
|
||
3DEA000
|
trusted library allocation
|
page read and write
|
||
2738000
|
trusted library allocation
|
page read and write
|
||
11BE000
|
stack
|
page read and write
|
||
7E0000
|
trusted library allocation
|
page read and write
|
||
2D45000
|
trusted library allocation
|
page read and write
|
||
7B3C000
|
stack
|
page read and write
|
||
3307000
|
heap
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
13A42000
|
trusted library allocation
|
page read and write
|
||
5195000
|
trusted library allocation
|
page read and write
|
||
12990000
|
heap
|
page read and write
|
||
21143190000
|
trusted library allocation
|
page read and write
|
||
5B43000
|
trusted library allocation
|
page read and write
|
||
19AD000
|
trusted library allocation
|
page execute and read and write
|
||
81A0000
|
trusted library allocation
|
page read and write
|
||
923000
|
heap
|
page read and write
|
||
2B68000
|
trusted library allocation
|
page read and write
|
||
6570000
|
trusted library allocation
|
page read and write
|
||
9161000
|
heap
|
page read and write
|
||
7576000
|
trusted library allocation
|
page read and write
|
||
1618000
|
heap
|
page read and write
|
||
32D5000
|
trusted library allocation
|
page read and write
|
||
6A9E000
|
trusted library allocation
|
page read and write
|
||
813D000
|
trusted library allocation
|
page read and write
|
||
A8C1000
|
trusted library allocation
|
page read and write
|
||
142B0000
|
trusted library allocation
|
page execute and read and write
|
||
1C90000
|
heap
|
page read and write
|
||
3742000
|
trusted library allocation
|
page read and write
|
||
5D3C000
|
trusted library allocation
|
page read and write
|
||
C085000
|
heap
|
page read and write
|
||
211434ED000
|
heap
|
page read and write
|
||
3053000
|
trusted library allocation
|
page read and write
|
||
A5E0000
|
trusted library allocation
|
page read and write
|
||
25AA000
|
trusted library allocation
|
page read and write
|
||
14EBC000
|
trusted library allocation
|
page read and write
|
||
13667000
|
heap
|
page read and write
|
||
8125000
|
trusted library allocation
|
page read and write
|
||
7F360000
|
trusted library allocation
|
page execute and read and write
|
||
7280000
|
trusted library allocation
|
page read and write
|
||
2BD8000
|
trusted library allocation
|
page read and write
|
||
181A000
|
heap
|
page read and write
|
||
4F8000
|
stack
|
page read and write
|
||
B270000
|
trusted library allocation
|
page read and write
|
||
5951000
|
trusted library allocation
|
page read and write
|
||
80000
|
unkown
|
page readonly
|
||
2EC7000
|
trusted library allocation
|
page read and write
|
||
5980000
|
trusted library allocation
|
page read and write
|
||
35E0000
|
trusted library allocation
|
page read and write
|
||
A27D000
|
heap
|
page read and write
|
||
14143000
|
trusted library allocation
|
page read and write
|
||
1124000
|
trusted library allocation
|
page read and write
|
||
13F2000
|
unkown
|
page readonly
|
||
25E8000
|
trusted library allocation
|
page read and write
|
||
5E8D000
|
stack
|
page read and write
|
||
3A1F000
|
trusted library allocation
|
page read and write
|
||
13734000
|
trusted library allocation
|
page read and write
|
||
2F6F000
|
trusted library allocation
|
page read and write
|
||
A24F000
|
heap
|
page read and write
|
||
48AB000
|
trusted library allocation
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page execute and read and write
|
||
7530000
|
unkown
|
page readonly
|
||
6370000
|
trusted library allocation
|
page read and write
|
||
6590000
|
trusted library allocation
|
page execute and read and write
|
||
91B0000
|
heap
|
page read and write
|
||
1418000
|
heap
|
page read and write
|
||
32F2000
|
trusted library allocation
|
page read and write
|
||
AB8E000
|
stack
|
page read and write
|
||
8213000
|
trusted library allocation
|
page read and write
|
||
2C7C000
|
trusted library allocation
|
page read and write
|
||
3B8B000
|
trusted library allocation
|
page read and write
|
||
7460000
|
heap
|
page read and write
|
||
649A000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3990000
|
trusted library allocation
|
page read and write
|
||
63A5000
|
trusted library allocation
|
page read and write
|
||
13073000
|
heap
|
page read and write
|
||
9420000
|
heap
|
page read and write
|
||
5090000
|
trusted library allocation
|
page execute and read and write
|
||
3967000
|
trusted library allocation
|
page read and write
|
||
1C27000
|
trusted library allocation
|
page execute and read and write
|
||
636C000
|
stack
|
page read and write
|
||
5540000
|
heap
|
page read and write
|
||
576E000
|
stack
|
page read and write
|
||
BB35000
|
heap
|
page read and write
|
||
5610000
|
trusted library allocation
|
page read and write
|
||
130C3000
|
heap
|
page read and write
|
||
5590000
|
trusted library allocation
|
page execute and read and write
|
||
A2E8000
|
heap
|
page read and write
|
||
3362000
|
trusted library allocation
|
page read and write
|
||
2776000
|
trusted library allocation
|
page read and write
|
||
2EB2000
|
trusted library allocation
|
page read and write
|
||
3648000
|
trusted library allocation
|
page read and write
|
||
14663000
|
trusted library allocation
|
page read and write
|
||
1804000
|
heap
|
page read and write
|
||
6CDD000
|
trusted library allocation
|
page read and write
|
||
2B8B000
|
trusted library allocation
|
page read and write
|
||
1AB4000
|
trusted library allocation
|
page read and write
|
||
D90000
|
unkown
|
page readonly
|
||
4B0B000
|
trusted library allocation
|
page read and write
|
||
5972000
|
trusted library allocation
|
page read and write
|
||
6BAB000
|
trusted library allocation
|
page read and write
|
||
B280000
|
trusted library allocation
|
page execute and read and write
|
||
2DE0000
|
trusted library allocation
|
page read and write
|
||
26B8000
|
trusted library allocation
|
page read and write
|
||
6232000
|
heap
|
page read and write
|
||
1CAE000
|
stack
|
page read and write
|
||
2E60000
|
heap
|
page execute and read and write
|
||
9130000
|
heap
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3653000
|
trusted library allocation
|
page read and write
|
||
2113DC00000
|
heap
|
page read and write
|
||
2656000
|
direct allocation
|
page read and write
|
||
14A17000
|
trusted library allocation
|
page read and write
|
||
33D0000
|
trusted library allocation
|
page read and write
|
||
2EEE000
|
trusted library allocation
|
page read and write
|
||
2672000
|
trusted library allocation
|
page read and write
|
||
21144000000
|
heap
|
page read and write
|
||
1B1D000
|
trusted library allocation
|
page execute and read and write
|
||
3C6D000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
5708000
|
heap
|
page read and write
|
||
77FE000
|
stack
|
page read and write
|
||
1146000
|
trusted library allocation
|
page execute and read and write
|
||
B3DA000
|
trusted library allocation
|
page read and write
|
||
39EA27E000
|
unkown
|
page readonly
|
||
5A1E000
|
stack
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
14E88000
|
trusted library allocation
|
page read and write
|
||
14A0000
|
trusted library allocation
|
page read and write
|
||
BF67000
|
heap
|
page read and write
|
||
3E0E000
|
stack
|
page read and write
|
||
844E000
|
trusted library allocation
|
page read and write
|
||
3BE0000
|
trusted library allocation
|
page read and write
|
||
941000
|
heap
|
page read and write
|
||
13F2000
|
trusted library allocation
|
page read and write
|
||
5F5E000
|
stack
|
page read and write
|
||
2EEC000
|
trusted library allocation
|
page read and write
|
||
5020000
|
heap
|
page read and write
|
||
34E2000
|
trusted library allocation
|
page read and write
|
||
63A2000
|
trusted library allocation
|
page read and write
|
||
9198000
|
heap
|
page read and write
|
||
9A5000
|
heap
|
page read and write
|
||
81EC000
|
trusted library allocation
|
page read and write
|
||
962000
|
heap
|
page read and write
|
||
622A000
|
heap
|
page read and write
|
||
AEF000
|
stack
|
page read and write
|
||
136C000
|
heap
|
page read and write
|
||
36F9000
|
direct allocation
|
page read and write
|
||
BD8F000
|
trusted library section
|
page read and write
|
||
E8BF000
|
stack
|
page read and write
|
||
B410000
|
trusted library allocation
|
page read and write
|
||
3055000
|
trusted library allocation
|
page read and write
|
||
2774000
|
trusted library allocation
|
page read and write
|
||
3490000
|
direct allocation
|
page read and write
|
||
6A2F000
|
stack
|
page read and write
|
||
1470000
|
trusted library allocation
|
page execute and read and write
|
||
35D6000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
trusted library allocation
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
B2F0000
|
trusted library allocation
|
page execute and read and write
|
||
4A50000
|
trusted library allocation
|
page read and write
|
||
13944000
|
trusted library allocation
|
page read and write
|
||
3579000
|
trusted library allocation
|
page read and write
|
||
3101000
|
trusted library allocation
|
page read and write
|
||
15F2000
|
trusted library allocation
|
page read and write
|
||
F27D000
|
trusted library allocation
|
page read and write
|
||
8226000
|
trusted library allocation
|
page read and write
|
||
745000
|
trusted library allocation
|
page execute and read and write
|
||
33F8000
|
trusted library allocation
|
page read and write
|
||
5AEC000
|
stack
|
page read and write
|
||
B28000
|
direct allocation
|
page read and write
|
||
5BDE000
|
trusted library allocation
|
page read and write
|
||
5840000
|
trusted library allocation
|
page execute and read and write
|
||
26A9000
|
trusted library allocation
|
page read and write
|
||
13657000
|
heap
|
page read and write
|
||
7571000
|
trusted library allocation
|
page read and write
|
||
211434FB000
|
heap
|
page read and write
|
||
81E8000
|
trusted library allocation
|
page read and write
|
||
268C000
|
trusted library allocation
|
page read and write
|
||
39DD000
|
trusted library allocation
|
page read and write
|
||
6A25000
|
trusted library allocation
|
page read and write
|
||
4D70000
|
trusted library allocation
|
page execute and read and write
|
||
3BB0000
|
trusted library allocation
|
page read and write
|
||
2D26000
|
trusted library allocation
|
page read and write
|
||
2F58000
|
trusted library allocation
|
page read and write
|
||
37C0000
|
trusted library allocation
|
page execute and read and write
|
||
56E0000
|
trusted library allocation
|
page execute and read and write
|
||
14E0000
|
trusted library allocation
|
page read and write
|
||
6AC0000
|
heap
|
page read and write
|
||
2113ED90000
|
trusted library section
|
page readonly
|
||
50F4000
|
trusted library allocation
|
page read and write
|
||
2114350A000
|
heap
|
page read and write
|
||
2DC0000
|
trusted library allocation
|
page read and write
|
||
C15E000
|
stack
|
page read and write
|
||
6ACF000
|
unkown
|
page readonly
|
||
E03F000
|
heap
|
page read and write
|
||
26A3000
|
trusted library allocation
|
page read and write
|
||
618C000
|
stack
|
page read and write
|
||
2F88000
|
trusted library allocation
|
page read and write
|
||
1C75000
|
trusted library allocation
|
page execute and read and write
|
||
3480000
|
direct allocation
|
page read and write
|
||
B6D8000
|
trusted library allocation
|
page read and write
|
||
130C1000
|
heap
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
BBF2000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
B2E0000
|
trusted library allocation
|
page read and write
|
||
9211000
|
heap
|
page read and write
|
||
553B000
|
stack
|
page read and write
|
||
6234000
|
trusted library allocation
|
page read and write
|
||
211431D4000
|
trusted library allocation
|
page read and write
|
||
ABDE000
|
stack
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
F295000
|
trusted library allocation
|
page read and write
|
||
5585000
|
heap
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
14E12000
|
trusted library allocation
|
page read and write
|
||
2624000
|
trusted library allocation
|
page read and write
|
||
3964000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
direct allocation
|
page read and write
|
||
2BF7000
|
trusted library allocation
|
page read and write
|
||
B370000
|
trusted library allocation
|
page execute and read and write
|
||
6D55000
|
heap
|
page read and write
|
||
2E7C000
|
trusted library allocation
|
page read and write
|
||
4C20000
|
heap
|
page execute and read and write
|
||
38D1000
|
trusted library allocation
|
page read and write
|
||
2113DBE0000
|
heap
|
page read and write
|
||
B1F0000
|
trusted library allocation
|
page execute and read and write
|
||
6AD9000
|
trusted library allocation
|
page read and write
|
||
58F0000
|
trusted library allocation
|
page read and write
|
||
5081000
|
trusted library allocation
|
page read and write
|
||
6350000
|
trusted library allocation
|
page read and write
|
||
4F40000
|
trusted library allocation
|
page read and write
|
||
8160000
|
trusted library allocation
|
page read and write
|
||
1ABD000
|
trusted library allocation
|
page execute and read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
13486000
|
heap
|
page read and write
|
||
5B7A000
|
trusted library allocation
|
page read and write
|
||
3A15000
|
trusted library allocation
|
page read and write
|
||
2785000
|
trusted library allocation
|
page read and write
|
||
935000
|
heap
|
page read and write
|
||
4C6000
|
unkown
|
page readonly
|
||
2B93000
|
trusted library allocation
|
page read and write
|
||
3E20000
|
trusted library allocation
|
page read and write
|
||
35D2000
|
trusted library allocation
|
page read and write
|
||
8020000
|
heap
|
page read and write
|
||
835E000
|
stack
|
page read and write
|
||
E0D2000
|
heap
|
page read and write
|
||
782000
|
heap
|
page read and write
|
||
50EC000
|
trusted library allocation
|
page read and write
|
||
7FE00000
|
direct allocation
|
page read and write
|
||
4C4000
|
unkown
|
page readonly
|
||
6270000
|
trusted library allocation
|
page read and write
|
||
25E3000
|
heap
|
page read and write
|
||
3CD3000
|
trusted library allocation
|
page read and write
|
||
193F000
|
heap
|
page read and write
|
||
666000
|
trusted library allocation
|
page execute and read and write
|
||
AE8000
|
direct allocation
|
page read and write
|
||
13726000
|
trusted library allocation
|
page read and write
|
||
BCED000
|
heap
|
page read and write
|
||
32F4000
|
trusted library allocation
|
page read and write
|
||
1B30000
|
trusted library allocation
|
page read and write
|
||
9110000
|
heap
|
page read and write
|
||
14DC0000
|
trusted library allocation
|
page read and write
|
||
3273000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
D92000
|
unkown
|
page readonly
|
||
3F96000
|
heap
|
page read and write
|
||
2C3D000
|
trusted library allocation
|
page read and write
|
||
15C0000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
14E9C000
|
trusted library allocation
|
page read and write
|
||
BD01000
|
heap
|
page read and write
|
||
1298E000
|
stack
|
page read and write
|
||
6470000
|
heap
|
page read and write
|
||
50D8000
|
trusted library allocation
|
page read and write
|
||
3CF5000
|
trusted library allocation
|
page read and write
|
||
66E000
|
stack
|
page read and write
|
||
1121000
|
trusted library allocation
|
page read and write
|
||
6BB9000
|
heap
|
page read and write
|
||
356A000
|
trusted library allocation
|
page read and write
|
||
63C0000
|
trusted library allocation
|
page read and write
|
||
58D0000
|
trusted library allocation
|
page read and write
|
||
2113ED70000
|
trusted library section
|
page readonly
|
||
3751000
|
trusted library allocation
|
page read and write
|
||
DFB000
|
heap
|
page read and write
|
||
A9C4000
|
trusted library allocation
|
page read and write
|
||
866000
|
heap
|
page read and write
|
||
2D5C000
|
trusted library allocation
|
page read and write
|
||
2EB6000
|
trusted library allocation
|
page read and write
|
||
1944000
|
heap
|
page read and write
|
||
F248000
|
trusted library allocation
|
page read and write
|
||
BCE5000
|
heap
|
page read and write
|
||
BA65000
|
heap
|
page read and write
|
||
14A69000
|
trusted library allocation
|
page read and write
|
||
93E000
|
heap
|
page read and write
|
||
3770000
|
trusted library allocation
|
page execute and read and write
|
||
62D6000
|
trusted library allocation
|
page read and write
|
||
14640000
|
trusted library allocation
|
page read and write
|
||
976000
|
heap
|
page read and write
|
||
2B8F000
|
trusted library allocation
|
page read and write
|
||
336D000
|
trusted library allocation
|
page read and write
|
||
4D60000
|
trusted library allocation
|
page read and write
|
||
6B90000
|
trusted library allocation
|
page read and write
|
||
1800000
|
heap
|
page read and write
|
||
211434F5000
|
heap
|
page read and write
|
||
E160000
|
trusted library allocation
|
page read and write
|
||
1810000
|
heap
|
page read and write
|
||
6332000
|
unkown
|
page readonly
|
||
2BB7000
|
trusted library allocation
|
page read and write
|
||
3758000
|
trusted library allocation
|
page read and write
|
||
28BE000
|
trusted library allocation
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
5D8E000
|
stack
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
90A0000
|
trusted library allocation
|
page read and write
|
||
918F000
|
heap
|
page read and write
|
||
4598000
|
trusted library allocation
|
page read and write
|
||
4200000
|
remote allocation
|
page read and write
|
||
54AA000
|
heap
|
page read and write
|
||
33DB000
|
trusted library allocation
|
page read and write
|
||
36FA000
|
trusted library allocation
|
page read and write
|
||
8C6000
|
heap
|
page read and write
|
||
1352F000
|
heap
|
page read and write
|
||
839E000
|
stack
|
page read and write
|
||
39E9D7C000
|
stack
|
page read and write
|
||
5A31000
|
heap
|
page read and write
|
||
211431D0000
|
trusted library allocation
|
page read and write
|
||
3E1A000
|
trusted library allocation
|
page read and write
|
||
14E98000
|
trusted library allocation
|
page read and write
|
||
8ACE000
|
stack
|
page read and write
|
||
36E8000
|
trusted library allocation
|
page read and write
|
||
1935000
|
heap
|
page read and write
|
||
353C000
|
trusted library allocation
|
page read and write
|
||
6A20000
|
trusted library allocation
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
921B000
|
heap
|
page read and write
|
||
76B0000
|
trusted library allocation
|
page execute and read and write
|
||
2C81000
|
trusted library allocation
|
page read and write
|
||
5A4E000
|
stack
|
page read and write
|
||
13994000
|
trusted library allocation
|
page read and write
|
||
C1F1000
|
trusted library allocation
|
page read and write
|
||
138CC000
|
trusted library allocation
|
page read and write
|
||
14E92000
|
trusted library allocation
|
page read and write
|
||
70E000
|
heap
|
page read and write
|
||
AE99000
|
heap
|
page read and write
|
||
1C0D000
|
trusted library allocation
|
page execute and read and write
|
||
117E000
|
stack
|
page read and write
|
||
306C000
|
trusted library allocation
|
page read and write
|
||
DC3000
|
unkown
|
page readonly
|
||
569E000
|
stack
|
page read and write
|
||
5A70000
|
heap
|
page read and write
|
||
38E5000
|
trusted library allocation
|
page read and write
|
||
8B8000
|
heap
|
page read and write
|
||
21143330000
|
remote allocation
|
page read and write
|
||
398E000
|
trusted library allocation
|
page read and write
|
||
3BAE000
|
trusted library allocation
|
page read and write
|
||
259B000
|
trusted library allocation
|
page read and write
|
||
885F000
|
stack
|
page read and write
|
||
59FD000
|
stack
|
page read and write
|
||
6C7000
|
unkown
|
page write copy
|
||
50ED000
|
stack
|
page read and write
|
||
574E000
|
heap
|
page read and write
|
||
F33D000
|
trusted library allocation
|
page read and write
|
||
3420000
|
trusted library allocation
|
page execute and read and write
|
||
13C36000
|
trusted library allocation
|
page read and write
|
||
1581000
|
trusted library allocation
|
page read and write
|
||
2EEA000
|
trusted library allocation
|
page read and write
|
||
14D80000
|
trusted library allocation
|
page read and write
|
||
AEDD000
|
heap
|
page read and write
|
||
8BB000
|
heap
|
page read and write
|
||
1CC9000
|
heap
|
page read and write
|
||
2F09000
|
trusted library allocation
|
page read and write
|
||
AA60000
|
trusted library allocation
|
page read and write
|
||
5ECE000
|
stack
|
page read and write
|
||
A6CA000
|
trusted library allocation
|
page read and write
|
||
2B8D000
|
trusted library allocation
|
page read and write
|
||
91BD000
|
heap
|
page read and write
|
||
96F000
|
heap
|
page read and write
|
||
81A3000
|
trusted library allocation
|
page read and write
|
||
82F3000
|
trusted library allocation
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
6440000
|
trusted library allocation
|
page execute and read and write
|
||
4A30000
|
trusted library allocation
|
page read and write
|
||
2CB0000
|
trusted library allocation
|
page read and write
|
||
B9C9000
|
heap
|
page read and write
|
||
4F5D000
|
stack
|
page read and write
|
||
3516000
|
trusted library allocation
|
page read and write
|
||
211431C0000
|
trusted library allocation
|
page read and write
|
||
842F000
|
trusted library allocation
|
page read and write
|
||
A2A3000
|
heap
|
page read and write
|
||
6B07000
|
trusted library allocation
|
page read and write
|
||
6550000
|
trusted library allocation
|
page execute and read and write
|
||
2C97000
|
trusted library allocation
|
page read and write
|
||
3600000
|
trusted library allocation
|
page read and write
|
||
597A000
|
trusted library allocation
|
page read and write
|
||
2B9A000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
heap
|
page read and write
|
||
2C93000
|
trusted library allocation
|
page read and write
|
||
4B9000
|
unkown
|
page read and write
|
||
2BE9000
|
trusted library allocation
|
page read and write
|
||
13F98000
|
trusted library allocation
|
page read and write
|
||
26A0000
|
direct allocation
|
page read and write
|
||
5BD5000
|
trusted library allocation
|
page read and write
|
||
146F000
|
stack
|
page read and write
|
||
7470000
|
heap
|
page read and write
|
||
4ADB000
|
trusted library allocation
|
page read and write
|
||
A890000
|
heap
|
page read and write
|
||
49EE000
|
stack
|
page read and write
|
||
32B0000
|
trusted library allocation
|
page read and write
|
||
2D4B000
|
trusted library allocation
|
page read and write
|
||
5D40000
|
trusted library allocation
|
page read and write
|
||
3CBD000
|
trusted library allocation
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
4F94000
|
trusted library allocation
|
page read and write
|
||
6B1A000
|
trusted library allocation
|
page read and write
|
||
74A8000
|
direct allocation
|
page read and write
|
||
2EB8000
|
trusted library allocation
|
page read and write
|
||
6B70000
|
trusted library allocation
|
page execute and read and write
|
||
142D0000
|
trusted library allocation
|
page read and write
|
||
11FD000
|
trusted library allocation
|
page execute and read and write
|
||
14260000
|
trusted library allocation
|
page read and write
|
||
6A70000
|
trusted library allocation
|
page read and write
|
||
1CC0000
|
heap
|
page read and write
|
||
3A02000
|
trusted library allocation
|
page read and write
|
||
5979000
|
trusted library allocation
|
page read and write
|
||
3490000
|
heap
|
page read and write
|
||
2C59000
|
trusted library allocation
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
2D49000
|
trusted library allocation
|
page read and write
|
||
3386000
|
trusted library allocation
|
page read and write
|
||
39E9A7E000
|
unkown
|
page readonly
|
||
5E1F000
|
stack
|
page read and write
|
||
7730000
|
trusted library allocation
|
page read and write
|
||
6530000
|
trusted library allocation
|
page execute and read and write
|
||
E05E000
|
heap
|
page read and write
|
||
6AD0000
|
trusted library allocation
|
page read and write
|
||
700000
|
trusted library allocation
|
page read and write
|
||
21143203000
|
trusted library allocation
|
page read and write
|
||
2B6E000
|
trusted library allocation
|
page read and write
|
||
DDC000
|
unkown
|
page readonly
|
||
AE00000
|
heap
|
page read and write
|
||
3D25000
|
trusted library allocation
|
page read and write
|
||
3388000
|
trusted library allocation
|
page read and write
|
||
35BD000
|
trusted library allocation
|
page read and write
|
||
33B0000
|
trusted library allocation
|
page read and write
|
||
AE1D000
|
heap
|
page read and write
|
||
BB14000
|
heap
|
page read and write
|
||
736000
|
trusted library allocation
|
page execute and read and write
|
||
4D2F000
|
stack
|
page read and write
|
||
77BF000
|
stack
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
4993000
|
trusted library allocation
|
page read and write
|
||
3FEC000
|
heap
|
page read and write
|
||
50F0000
|
trusted library allocation
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
134B000
|
heap
|
page read and write
|
||
80B1000
|
trusted library allocation
|
page read and write
|
||
36BE000
|
trusted library allocation
|
page read and write
|
||
E432000
|
trusted library allocation
|
page read and write
|
||
26C2000
|
trusted library allocation
|
page read and write
|
||
824F000
|
trusted library allocation
|
page read and write
|
||
13987000
|
trusted library allocation
|
page read and write
|
||
5B30000
|
trusted library allocation
|
page execute and read and write
|
||
A68E000
|
stack
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
26A7000
|
trusted library allocation
|
page read and write
|
||
338C000
|
trusted library allocation
|
page read and write
|
||
13BEC000
|
trusted library allocation
|
page read and write
|
||
5D70000
|
trusted library allocation
|
page read and write
|
||
BCE1000
|
heap
|
page read and write
|
||
5990000
|
trusted library allocation
|
page read and write
|
||
7950000
|
heap
|
page read and write
|
||
3CEB000
|
trusted library allocation
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
592F000
|
stack
|
page read and write
|
||
22000
|
unkown
|
page readonly
|
||
2113DCA0000
|
heap
|
page read and write
|
||
6513000
|
heap
|
page read and write
|
||
E030000
|
heap
|
page read and write
|
||
AF90000
|
trusted library allocation
|
page execute and read and write
|
||
33B0000
|
heap
|
page read and write
|
||
7EE2000
|
trusted library allocation
|
page read and write
|
||
2607000
|
trusted library allocation
|
page read and write
|
||
6295000
|
trusted library allocation
|
page read and write
|
||
6340000
|
trusted library allocation
|
page execute and read and write
|
||
61C0000
|
heap
|
page read and write
|
||
1C72000
|
trusted library allocation
|
page read and write
|
||
1710000
|
heap
|
page read and write
|
||
33A0000
|
trusted library allocation
|
page execute and read and write
|
||
74C0000
|
trusted library allocation
|
page execute and read and write
|
||
5570000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
776E000
|
stack
|
page read and write
|
||
39E9000
|
trusted library allocation
|
page read and write
|
||
3F88000
|
trusted library allocation
|
page read and write
|
||
15F5000
|
trusted library allocation
|
page read and write
|
||
8243000
|
trusted library allocation
|
page read and write
|
||
2CA8000
|
trusted library allocation
|
page read and write
|
||
7A8B000
|
stack
|
page read and write
|
||
2113DC90000
|
heap
|
page read and write
|
||
C09F000
|
heap
|
page read and write
|
||
3765000
|
trusted library allocation
|
page read and write
|
||
74C7000
|
direct allocation
|
page read and write
|
||
21143400000
|
heap
|
page read and write
|
||
6594000
|
trusted library allocation
|
page read and write
|
||
63C5000
|
trusted library allocation
|
page read and write
|
||
7437000
|
trusted library allocation
|
page read and write
|
||
BA63000
|
heap
|
page read and write
|
||
1AA6000
|
trusted library allocation
|
page read and write
|
||
5D60000
|
trusted library allocation
|
page read and write
|
||
60C0000
|
trusted library allocation
|
page execute and read and write
|
||
A69A000
|
trusted library allocation
|
page read and write
|
||
1BE0000
|
trusted library allocation
|
page read and write
|
||
5CCB000
|
stack
|
page read and write
|
||
6B16000
|
trusted library allocation
|
page read and write
|
||
6400000
|
trusted library allocation
|
page read and write
|
||
2C95000
|
trusted library allocation
|
page read and write
|
||
637C000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
1123000
|
trusted library allocation
|
page execute and read and write
|
||
3F0F000
|
stack
|
page read and write
|
||
7FE16000
|
direct allocation
|
page read and write
|
||
C0F5000
|
heap
|
page read and write
|
||
62CE000
|
trusted library allocation
|
page read and write
|
||
36B9000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
7FBD000
|
stack
|
page read and write
|
||
2113ED80000
|
trusted library section
|
page readonly
|
||
8135000
|
trusted library allocation
|
page read and write
|
||
2114350D000
|
heap
|
page read and write
|
||
3576000
|
trusted library allocation
|
page read and write
|
||
B3AA000
|
trusted library allocation
|
page read and write
|
||
AFC0000
|
trusted library allocation
|
page read and write
|
||
3570000
|
trusted library allocation
|
page read and write
|
||
818D000
|
trusted library allocation
|
page read and write
|
||
1472000
|
trusted library allocation
|
page read and write
|
||
7EA6000
|
trusted library allocation
|
page read and write
|
||
81DE000
|
trusted library allocation
|
page read and write
|
||
3632000
|
trusted library allocation
|
page read and write
|
||
2EA3000
|
trusted library allocation
|
page read and write
|
||
60E000
|
stack
|
page read and write
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
heap
|
page read and write
|
||
2680000
|
trusted library allocation
|
page read and write
|
||
598B000
|
trusted library allocation
|
page read and write
|
||
65D000
|
trusted library allocation
|
page execute and read and write
|
||
2E28000
|
trusted library allocation
|
page read and write
|
||
AD20000
|
heap
|
page read and write
|
||
39EA17B000
|
stack
|
page read and write
|
||
5965000
|
trusted library allocation
|
page read and write
|
||
9A5000
|
heap
|
page read and write
|
||
62A0000
|
trusted library allocation
|
page execute and read and write
|
||
2C12000
|
trusted library allocation
|
page read and write
|
||
FF4B000
|
trusted library allocation
|
page read and write
|
||
976000
|
heap
|
page read and write
|
||
A5F0000
|
trusted library allocation
|
page execute and read and write
|
||
83EF000
|
trusted library allocation
|
page read and write
|
||
BF20000
|
heap
|
page read and write
|
||
C01F000
|
heap
|
page read and write
|
||
A83000
|
direct allocation
|
page read and write
|
||
2BA8000
|
trusted library allocation
|
page read and write
|
||
8294000
|
trusted library allocation
|
page read and write
|
||
3B34000
|
trusted library allocation
|
page read and write
|
||
2586000
|
trusted library allocation
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
5293000
|
trusted library allocation
|
page read and write
|
||
51C8000
|
trusted library allocation
|
page read and write
|
||
7693000
|
trusted library allocation
|
page read and write
|
||
14095000
|
trusted library allocation
|
page read and write
|
||
851A000
|
heap
|
page read and write
|
||
6B30000
|
heap
|
page read and write
|
||
478D000
|
trusted library allocation
|
page read and write
|
||
5D86000
|
trusted library allocation
|
page read and write
|
||
4F6B000
|
trusted library allocation
|
page read and write
|
||
632E000
|
stack
|
page read and write
|
||
3675000
|
trusted library allocation
|
page read and write
|
||
5916000
|
trusted library allocation
|
page read and write
|
||
5E16000
|
heap
|
page read and write
|
||
1850000
|
heap
|
page read and write
|
||
5C3E000
|
stack
|
page read and write
|
||
2D43000
|
trusted library allocation
|
page read and write
|
||
5A50000
|
trusted library allocation
|
page read and write
|
||
1214000
|
trusted library allocation
|
page read and write
|
||
AE07000
|
heap
|
page read and write
|
||
4AD4000
|
trusted library allocation
|
page read and write
|
||
1399F000
|
trusted library allocation
|
page read and write
|
||
4140000
|
trusted library allocation
|
page read and write
|
||
63A5000
|
trusted library allocation
|
page read and write
|
||
6AE0000
|
trusted library allocation
|
page read and write
|
||
3059000
|
trusted library allocation
|
page read and write
|
||
5099000
|
trusted library allocation
|
page read and write
|
||
5B80000
|
heap
|
page execute and read and write
|
||
3FA6000
|
heap
|
page read and write
|
||
DEE000
|
stack
|
page read and write
|
||
776000
|
heap
|
page read and write
|
||
4F83000
|
trusted library allocation
|
page read and write
|
||
54DE000
|
stack
|
page read and write
|
||
DD30000
|
trusted library allocation
|
page read and write
|
||
1368F000
|
trusted library allocation
|
page read and write
|
||
E15E000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
62C9000
|
heap
|
page read and write
|
||
211431C0000
|
trusted library allocation
|
page read and write
|
||
983000
|
heap
|
page read and write
|
||
259D000
|
trusted library allocation
|
page read and write
|
||
63E7000
|
trusted library allocation
|
page read and write
|
||
37CB000
|
trusted library allocation
|
page read and write
|
||
3B47000
|
trusted library allocation
|
page read and write
|
||
637E000
|
trusted library allocation
|
page read and write
|
||
67C0000
|
heap
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page read and write
|
||
9A6000
|
heap
|
page read and write
|
||
666C000
|
stack
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
21143440000
|
heap
|
page read and write
|
||
211434F9000
|
heap
|
page read and write
|
||
5E90000
|
trusted library allocation
|
page execute and read and write
|
||
786E000
|
stack
|
page read and write
|
||
62D9000
|
trusted library allocation
|
page read and write
|
||
6AE9000
|
trusted library allocation
|
page read and write
|
||
9A6000
|
heap
|
page read and write
|
||
B090000
|
trusted library allocation
|
page execute and read and write
|
||
7538000
|
direct allocation
|
page read and write
|
||
81D9000
|
trusted library allocation
|
page read and write
|
||
27F1000
|
trusted library allocation
|
page read and write
|
||
1447000
|
trusted library allocation
|
page execute and read and write
|
||
2589000
|
trusted library allocation
|
page read and write
|
||
6460000
|
trusted library allocation
|
page execute and read and write
|
||
64E6000
|
heap
|
page read and write
|
||
433F000
|
stack
|
page read and write
|
||
13F77000
|
trusted library allocation
|
page read and write
|
||
13F8D000
|
trusted library allocation
|
page read and write
|
||
3723000
|
trusted library allocation
|
page read and write
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
2639000
|
direct allocation
|
page read and write
|
||
516E000
|
trusted library allocation
|
page read and write
|
||
A261000
|
heap
|
page read and write
|
||
6DE000
|
unkown
|
page readonly
|
||
17CE000
|
heap
|
page read and write
|
||
A2A5000
|
heap
|
page read and write
|
||
13A5A000
|
trusted library allocation
|
page read and write
|
||
A29A000
|
heap
|
page read and write
|
||
6360000
|
trusted library allocation
|
page execute and read and write
|
||
2113DCAE000
|
heap
|
page read and write
|
||
BF30000
|
heap
|
page read and write
|
||
AD22000
|
heap
|
page read and write
|
||
147B000
|
stack
|
page read and write
|
||
62C1000
|
heap
|
page read and write
|
||
10F7000
|
stack
|
page read and write
|
||
3980000
|
trusted library allocation
|
page read and write
|
||
3529000
|
trusted library allocation
|
page read and write
|
||
13C5C000
|
trusted library allocation
|
page read and write
|
||
1806000
|
heap
|
page read and write
|
||
113D000
|
trusted library allocation
|
page execute and read and write
|
||
2C76000
|
trusted library allocation
|
page read and write
|
||
3B2D000
|
trusted library allocation
|
page read and write
|
||
62E2000
|
trusted library allocation
|
page read and write
|
||
60AB000
|
stack
|
page read and write
|
||
987000
|
heap
|
page read and write
|
||
13673000
|
trusted library allocation
|
page read and write
|
||
48CD000
|
trusted library allocation
|
page read and write
|
||
34BD000
|
heap
|
page read and write
|
||
4F88000
|
trusted library allocation
|
page read and write
|
||
6808000
|
trusted library allocation
|
page read and write
|
||
5390000
|
trusted library allocation
|
page execute and read and write
|
||
846A000
|
trusted library allocation
|
page read and write
|
||
A7CE000
|
stack
|
page read and write
|
||
28C4000
|
trusted library allocation
|
page read and write
|
||
5DB0000
|
trusted library allocation
|
page read and write
|
||
51EB000
|
trusted library allocation
|
page read and write
|
||
257A000
|
trusted library allocation
|
page read and write
|
||
2751000
|
trusted library allocation
|
page read and write
|
||
1CC5000
|
heap
|
page read and write
|
||
4160000
|
heap
|
page read and write
|
||
5960000
|
trusted library allocation
|
page read and write
|
||
2EF9000
|
trusted library allocation
|
page read and write
|
||
6236000
|
trusted library allocation
|
page read and write
|
||
100D3000
|
unkown
|
page read and write
|
||
81A8000
|
trusted library allocation
|
page read and write
|
||
2736000
|
trusted library allocation
|
page read and write
|
||
AC0000
|
trusted library allocation
|
page execute and read and write
|
||
A142000
|
heap
|
page read and write
|
||
56FD000
|
heap
|
page read and write
|
||
2C8B000
|
trusted library allocation
|
page read and write
|
||
3F50000
|
heap
|
page read and write
|
||
2950000
|
trusted library allocation
|
page read and write
|
||
35CA000
|
trusted library allocation
|
page read and write
|
||
E84E000
|
stack
|
page read and write
|
||
4D85000
|
trusted library allocation
|
page read and write
|
||
90E000
|
heap
|
page read and write
|
||
60FE000
|
stack
|
page read and write
|
||
1AC8000
|
heap
|
page read and write
|
||
149F0000
|
trusted library allocation
|
page read and write
|
||
13EF3000
|
trusted library allocation
|
page read and write
|
||
13720000
|
trusted library allocation
|
page read and write
|
||
3785000
|
trusted library allocation
|
page read and write
|
||
13F70000
|
trusted library allocation
|
page read and write
|
||
39EABFE000
|
stack
|
page read and write
|
||
5DB0000
|
trusted library allocation
|
page read and write
|
||
A690000
|
trusted library allocation
|
page read and write
|
||
3572000
|
trusted library allocation
|
page read and write
|
||
7F28000
|
trusted library allocation
|
page read and write
|
||
2F77000
|
heap
|
page read and write
|
||
75A0000
|
heap
|
page read and write
|
||
E30E000
|
stack
|
page read and write
|
||
6300000
|
trusted library allocation
|
page read and write
|
||
A680000
|
trusted library allocation
|
page read and write
|
There are 3364 hidden memdumps, click here to show them.