IOC Report

loading gif

Files

File Path
Type
Category
Malicious
LMSetup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Lenovo\UNIInstaller\cache\cacheInfo.txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Lenovo\UNIInstaller\cache\gui\9511D742-CA40-42CE-A2BE-0175921F1BCF\5ac5cb72096d48a6558be5f0603b9946
HTML document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Lenovo\UNIInstaller\cache\gui\9511D742-CA40-42CE-A2BE-0175921F1BCF\5ac5cb72096d48a6558be5f0603b9946_defaultmenu
HTML document, ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Lenovo\UNIInstaller\cache\gui\9511D742-CA40-42CE-A2BE-0175921F1BCF\5ac5cb72096d48a6558be5f0603b9946_welcome
HTML document, ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Lenovo\UNIInstaller\cache\gui\9511D742-CA40-42CE-A2BE-0175921F1BCF\memcache
data
dropped
C:\Users\user\AppData\Local\Lenovo\UNIInstaller\cache\gui\cacheid
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Lenovo\UNIInstaller\cache\plugins\InstallerPackages\Lenovo.UNI\Lenovo.UNI.zip
Zip archive data, at least v2.0 to extract
dropped
C:\Users\user\AppData\Local\Lenovo\UNIInstaller\cache\plugins\InstallerPackages\Lenovo.UNI\manifest.json
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Lenovo\UNIInstaller\cache\plugins\InstallerPackages\dsdk\dsdk.zip
Zip archive data, at least v2.0 to extract
dropped
C:\Users\user\AppData\Local\Lenovo\UNIInstaller\cache\plugins\InstallerPackages\dsdk\manifest.json
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Lenovo\UNIInstaller\cache\plugins\InstallerPackages\installer\installer.zip
Zip archive data, at least v2.0 to extract
dropped
C:\Users\user\AppData\Local\Lenovo\UNIInstaller\cache\plugins\InstallerPackages\installer\manifest.json
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Lenovo\UNIInstaller\cache\plugins\InstallerPackages\printerinstaller\manifest.json
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Lenovo\UNIInstaller\cache\plugins\InstallerPackages\printerinstaller\printerinstaller.zip
Zip archive data, at least v2.0 to extract
dropped
C:\Users\user\AppData\Local\Lenovo\UNIInstaller\cache\plugins\InstallerPackages\sdk\manifest.json
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Lenovo\UNIInstaller\cache\plugins\InstallerPackages\sdk\sdk.zip
Zip archive data, at least v2.0 to extract
dropped
C:\Users\user\AppData\Local\Lenovo\UNIInstaller\cache\plugins\packages.json
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Lenovo\UNIInstaller\cache\plugins\~state\40d704470259297f93bee626c12b71fb_Installer_state
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\ugtn53ek\ugtn53ek\ux.cab
Microsoft Cabinet archive data, 7941732 bytes, 111 files
dropped
C:\Windows\Temp\{06CB1A7C-0362-456A-A8DC-276F5C54CBCA}\.cr\LMSetup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\BootstrapperApplicationData.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\BootstrapperCore.config
XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\FW5FWSDK_Net45_vs12.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\FW5JCore_vs12_x86.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\FWWindowNative.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\FullInstaller.zip
Zip archive data, at least v2.0 to extract
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\JBM_AppConfig_vs12.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\JBM_Encryption_vs12.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\JBM_InstallerUtils_Static.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\JBM_Locale_vs12.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\JBM_PluginCache_vs12.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\JBM_Propertybag_vs12.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\JBM_RAF_Static.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\JBM_Resolver_vs12.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\JBM_SNMP_vs12.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\JBM_StateMachine_vs12.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\JBM_System_vs12.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\JBM_User_vs12.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\JBM_WixInstaller_Static.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\License\cs\license.txt
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\License\da\license.txt
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\License\de-de\license.txt
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\License\el\license.txt
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\License\en-gb\license.txt
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\License\en-us\license.txt
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\License\es-es\license.txt
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\License\fi\license.txt
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\License\fr-fr\license.txt
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\License\hu\license.txt
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\License\it-it\license.txt
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\License\ja\license.txt
UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\License\nl-nl\license.txt
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\License\no-no\license.txt
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\License\pl\license.txt
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\License\pt-br\license.txt
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\License\pt-pt\license.txt
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\License\ru\license.txt
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\License\sv-se\license.txt
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\License\tr-tr\license.txt
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\License\zh-cn\license.txt
UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\License\zh-tw\license.txt
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\NotificationGUID.txt
ASCII text
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Readme\cs\readme.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Readme\da\readme.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Readme\de-de\readme.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Readme\en-gb\readme.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Readme\en-us\readme.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Readme\es-es\readme.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Readme\fi\readme.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Readme\fr-fr\readme.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Readme\hu\readme.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Readme\it-it\readme.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Readme\ja\readme.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Readme\nl-nl\readme.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Readme\no-no\readme.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Readme\pl\readme.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Readme\pt-br\readme.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Readme\pt-pt\readme.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Readme\ru\readme.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Readme\sv-se\readme.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Readme\tr-tr\readme.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Readme\zh-cn\readme.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Readme\zh-tw\readme.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Strings\installer\cs\strings.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Strings\installer\da\strings.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Strings\installer\de-de\strings.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Strings\installer\en-gb\strings.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Strings\installer\en-us\strings.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Strings\installer\es-es\strings.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Strings\installer\fi\strings.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Strings\installer\fr-fr\strings.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Strings\installer\hu\strings.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Strings\installer\it-it\strings.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Strings\installer\ja\strings.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Strings\installer\nl-nl\strings.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Strings\installer\no-no\strings.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Strings\installer\pl\strings.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Strings\installer\pt-br\strings.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Strings\installer\pt-pt\strings.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Strings\installer\ru\strings.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Strings\installer\sv-se\strings.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Strings\installer\tr-tr\strings.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Strings\installer\zh-cn\strings.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\Strings\installer\zh-tw\strings.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\TAP.Template.Full_msifile.wxi
exported SGML document, ASCII text
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\TAP.Template.Full_payloaddriver.wxi
ASCII text
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\TAP.Template.Full_payloadvariables.wxi
ASCII text
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\TAPInstallerNative.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\TAPToaster.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\0
XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u0
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u1
XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u10
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u11
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u12
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u13
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u14
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u15
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u16
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u17
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u18
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u19
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u2
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u20
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u21
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u22
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u23
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u24
ASCII text
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u25
exported SGML document, ASCII text
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u26
ASCII text
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u27
ASCII text
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u28
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u29
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u3
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u30
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u31
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u32
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u33
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u34
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u35
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u36
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u37
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u38
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u39
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u4
Zip archive data, at least v2.0 to extract
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u40
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u41
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u42
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u43
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u44
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u45
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u46
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u47
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u48
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u49
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u5
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u50
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u51
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u52
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u53
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u54
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u55
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u56
UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u57
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u58
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u59
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u6
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u60
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u61
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u62
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u63
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u64
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u65
UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u66
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u67
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u68
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u69
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u7
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u70
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u71
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u72
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u73
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u74
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u75
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u76
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u77
UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u78
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u79
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u8
MS Windows icon resource - 13 icons, 256x256 withPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, 128x128, 32 bits/pixel
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u80
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u81
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u82
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u83
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u84
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u85
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u86
UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u87
UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u88
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u89
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\UX\u9
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\WixDependencyExtension.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\WixDifxAppExtension.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\WixDirectXExtension.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\WixFirewallExtension.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\WixGamingExtension.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\WixHttpExtension.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\WixIIsExtension.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\WixNetFxExtension.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\WixSqlExtension.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\WixUIExtension.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\WixUtilExtension.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\WixVSExtension.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\dark.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\dark.exe.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\icon.ico
MS Windows icon resource - 13 icons, 256x256 withPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, 128x128, 32 bits/pixel
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\msvcp110.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\msvcr110.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\variables.json
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\vccorlib110.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\winterop.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\wix.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
There are 212 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LMSetup.exe
"C:\Users\user\Desktop\LMSetup.exe"
C:\Windows\Temp\{06CB1A7C-0362-456A-A8DC-276F5C54CBCA}\.cr\LMSetup.exe
"C:\Windows\Temp\{06CB1A7C-0362-456A-A8DC-276F5C54CBCA}\.cr\LMSetup.exe" -burn.clean.room="C:\Users\user\Desktop\LMSetup.exe" -burn.filehandle.attached=556 -burn.filehandle.self=576
C:\Windows\SysWOW64\cmd.exe
cmd" /c C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\dark.exe "C:\Users\user\Desktop\LMSetup.exe" -nologo -x "C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\dark.exe
C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba\dark.exe "C:\Users\user\Desktop\LMSetup.exe" -nologo -x "C:\Windows\Temp\{58155FEA-9500-424F-A76C-4B75D45447D7}\.ba"

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://schemas.m
unknown
http://www.fontbureau.com/designersJ
unknown
http://wixtoolset.org/releases/feed/v3.11
unknown
http://www.fontbureau.com/designersA
unknown
http://www.fontbureau.com/designers?
unknown
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
unknown
http://www.fontbureau.com/designers
unknown
http://appsyndication.org/2006/appsynapplicationapuputil.cppupgradeexclusivetrueenclosuredigestalgor
unknown
http://www.fontbureau.com/designersDC
unknown
http://wixtoolset.org/news/
unknown
http://schemas.micro
unknown
http://wixtoolset.org/releases/yMicrosoft.Tools.WindowsInstallerXml.Extensions.Xsd.netfx.xsd
unknown
http://www.symauth.com/cps0(
unknown
http://www.fontbureau.com/designersS
unknown
http://www.fontbureau.com/designers)
unknown
http://www.fontbureau.com/designers/frere-jones.htmloW~
unknown
http://wixtoolset.org/releases/
unknown
http://wixtoolset.org/releases/uMicrosoft.Tools.WindowsInstallerXml.Extensions.Xsd.iis.xsd
unknown
http://wixtoolset.org
unknown
http://www.fontbureau.com/designers/cabarga.html
unknown
http://www.fontbureau.com/designersl1
unknown
http://www.fontbureau.comitudi
unknown
http://www.symauth.com/rpa00
unknown
http://appsyndication.org/schemas/appsyn5rss/channel/as:applicationKDid
unknown
http://wixtoolset.org/releases/sMicrosoft.Tools.WindowsInstallerXml.Extensions.Xsd.vs.xsd
unknown
http://www.fontbureau.com/designersd
unknown
http://www.fontbureau.comp
unknown
http://www.fontbureau.com/designersb
unknown
http://wixtoolset.org/
unknown
http://wixtoolset.org/telemetry/v
unknown
http://en.wikipqxg
unknown
http://wixtoolset.org/documentation/error217/
unknown
http://www.fontbureau.com/designers:
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.fontbureau.com/designers/
unknown
http://www.fontbureau.com/designers/cabarga.htmlD
unknown
http://wixtoolset.org/releases/uMicrosoft.Tools.WindowsInstallerXml.Extensions.Xsd.sql.xsd
unknown
http://wixtoolset.org/releases/wMicrosoft.Tools.WindowsInstallerXml.Extensions.Xsd.http.xsd
unknown
http://appsyndication.org/2006/appsyn
unknown
http://www.fontbureau.com/designers2
unknown
http://www.fontbureau.com/designersUK
unknown
http://www.fontbureau.comalsFT
unknown
There are 34 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_NINPUT_LEGACYMODE
LMSetup.exe
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\International\CpMRU
Enable
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\International\CpMRU
Size
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\International\CpMRU
InitHits
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\International\CpMRU
Factor

Memdumps

Base Address
Regiontype
Protect
Malicious
A452000
trusted library allocation
page read and write
9CFE000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9D5A000
trusted library allocation
page read and write
28912930000
remote allocation
page read and write
27316C6C000
unkown
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
1090000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
9D68000
trusted library allocation
page read and write
9D5B000
trusted library allocation
page read and write
A36E000
trusted library allocation
page read and write
3E3C000
trusted library allocation
page read and write
A934000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
1D1B9561000
unkown
page read and write
1DA47C6D000
unkown
page read and write
A4A5000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
5B32000
unkown
page readonly
28912A02000
unkown
page read and write
A470000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9E76000
trusted library allocation
page read and write
4BF3000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B92D0000
remote allocation
page read and write
27316C57000
unkown
page read and write
28910E58000
unkown
page read and write
4D26000
trusted library allocation
page read and write
A473000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A81A000
trusted library allocation
page read and write
9CF7000
trusted library allocation
page read and write
3E3C000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
10D5000
trusted library allocation
page execute and read and write
A480000
trusted library allocation
page read and write
A473000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B957F000
unkown
page read and write
3EBF000
trusted library allocation
page read and write
A7F6000
trusted library allocation
page read and write
430000
heap
page read and write
A46B000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A924000
trusted library allocation
page read and write
52B8000
trusted library allocation
page read and write
27316C46000
unkown
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
24675252000
unkown
page read and write
1D1B9592000
unkown
page read and write
105E000
stack
page read and write
A46F000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
4AC6000
trusted library allocation
page read and write
A473000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
A92D000
trusted library allocation
page read and write
10DB000
trusted library allocation
page execute and read and write
2EC0000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A2EC000
trusted library allocation
page read and write
3C24000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
A478000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9D6B000
trusted library allocation
page read and write
47E8000
trusted library allocation
page read and write
A370000
trusted library allocation
page read and write
A81A000
trusted library allocation
page read and write
CB0000
unkown
page read and write
A46B000
trusted library allocation
page read and write
74A000
heap
page read and write
A480000
trusted library allocation
page read and write
8B3D000
trusted library allocation
page read and write
14560E81000
unkown
page read and write
75B000
heap
page read and write
A480000
trusted library allocation
page read and write
3EC1000
trusted library allocation
page read and write
92D000
unkown
page readonly
A480000
trusted library allocation
page read and write
A478000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9CF9000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
1D1B9597000
unkown
page read and write
A47D000
trusted library allocation
page read and write
76E000
heap
page read and write
9D59000
trusted library allocation
page read and write
3C8F000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A3A0000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
734000
heap
page read and write
A46B000
trusted library allocation
page read and write
A472000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9CF2000
trusted library allocation
page read and write
5323000
trusted library allocation
page read and write
A0CF000
trusted library allocation
page read and write
A234000
trusted library allocation
page read and write
92F000
unkown
page readonly
1D1B9A63000
unkown
page read and write
A46F000
trusted library allocation
page read and write
A7F3000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A2EF000
trusted library allocation
page read and write
2112CF60000
unkown
page read and write
A332000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
4816000
trusted library allocation
page read and write
4BAA000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9D02000
trusted library allocation
page read and write
6FF45000
unkown
page readonly
A480000
trusted library allocation
page read and write
A453000
trusted library allocation
page read and write
15E0000
trusted library allocation
page read and write
193B7869000
unkown
page read and write
27316C2D000
unkown
page read and write
A46B000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page read and write
9D5D000
trusted library allocation
page read and write
9D66000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
A81F000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9CFA000
trusted library allocation
page read and write
4BF0000
trusted library allocation
page read and write
A473000
trusted library allocation
page read and write
AE60000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A474000
trusted library allocation
page read and write
9D58000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A817000
trusted library allocation
page read and write
A452000
trusted library allocation
page read and write
1D1B8C3A000
unkown
page read and write
9CF3000
trusted library allocation
page read and write
3ED0000
trusted library allocation
page read and write
9D54000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9D62000
trusted library allocation
page read and write
1D1B9500000
unkown
page read and write
1D1B9590000
unkown
page read and write
1BB66060000
unkown
page read and write
A480000
trusted library allocation
page read and write
AE4B000
trusted library allocation
page read and write
A817000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9D04000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A81F000
trusted library allocation
page read and write
28910E02000
unkown
page read and write
1D1B8C5B000
unkown
page read and write
9D06000
trusted library allocation
page read and write
A817000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
3D61000
trusted library allocation
page read and write
A8AB000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A81A000
trusted library allocation
page read and write
A81A000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
57CE000
unkown
page read and write
A453000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
27316C42000
unkown
page read and write
A46B000
trusted library allocation
page read and write
1D1B8C00000
unkown
page read and write
9D07000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
6FF31000
unkown
page execute read
1D1B9A02000
unkown
page read and write
4C2D000
trusted library allocation
page read and write
2112D013000
unkown
page read and write
B00000
unkown
page readonly
A46F000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
1BB65A29000
unkown
page read and write
1D1B956D000
unkown
page read and write
A475000
trusted library allocation
page read and write
9E88000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A92F000
trusted library allocation
page read and write
4BF6000
trusted library allocation
page read and write
1D1B9592000
unkown
page read and write
A480000
trusted library allocation
page read and write
9CFC000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
38BB000
trusted library allocation
page read and write
1D1B9A02000
unkown
page read and write
14560E13000
unkown
page read and write
4B77000
trusted library allocation
page read and write
A4C8000
trusted library allocation
page read and write
CA0000
unkown
page readonly
2CF0000
heap
page read and write
A46B000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
A0D2000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
288BDFB000
stack
page read and write
1D1B95AD000
unkown
page read and write
E92D6FF000
stack
page read and write
A46B000
trusted library allocation
page read and write
A939000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
9E76000
trusted library allocation
page read and write
840000
trusted library allocation
page read and write
3E87000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1BB65B13000
unkown
page read and write
A46D000
trusted library allocation
page read and write
AE50000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A901000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
1D1B95D6000
unkown
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
4198000
trusted library allocation
page read and write
A93C000
trusted library allocation
page read and write
1D1B95BC000
unkown
page read and write
A46B000
trusted library allocation
page read and write
9D55000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D52000
trusted library allocation
page read and write
9D5E000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A81F000
trusted library allocation
page read and write
6785DFE000
stack
page read and write
A480000
trusted library allocation
page read and write
9D6A000
trusted library allocation
page read and write
9CFE000
trusted library allocation
page read and write
4B82000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
1D1B8C3C000
unkown
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
A452000
trusted library allocation
page read and write
A473000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
2FC2000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B9595000
unkown
page read and write
A480000
trusted library allocation
page read and write
1D1B9A02000
unkown
page read and write
2F40000
unkown
page readonly
A46B000
trusted library allocation
page read and write
14560C60000
heap
page read and write
27317402000
unkown
page read and write
94D000
unkown
page readonly
A473000
trusted library allocation
page read and write
1D1B8D13000
unkown
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A474000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
AFBE000
trusted library allocation
page read and write
A476000
trusted library allocation
page read and write
27316C58000
unkown
page read and write
A480000
trusted library allocation
page read and write
52B2000
trusted library allocation
page read and write
A8C9000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
4FE6000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
E92CFFB000
stack
page read and write
67859FE000
stack
page read and write
93E000
unkown
page readonly
B30000
heap
page read and write
1BB65A6E000
unkown
page read and write
A81A000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9CF7000
trusted library allocation
page read and write
52B3000
trusted library allocation
page read and write
8C1000
unkown
page execute read
A930000
trusted library allocation
page read and write
9D66000
trusted library allocation
page read and write
9D5E000
trusted library allocation
page read and write
9E4D000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
129B000
heap
page read and write
1DA47AF0000
heap
page read and write
A46B000
trusted library allocation
page read and write
1D1B9591000
unkown
page read and write
3C08000
trusted library allocation
page read and write
9CF6000
trusted library allocation
page read and write
1C98AE3C000
unkown
page read and write
15E0000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
CA5397F000
stack
page read and write
1D1B957F000
unkown
page read and write
A473000
trusted library allocation
page read and write
9D5E000
trusted library allocation
page read and write
27316C3D000
unkown
page read and write
A92E000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
408A000
trusted library allocation
page read and write
9D6F000
trusted library allocation
page read and write
3E9C000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
A0C4000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
1C98AE64000
unkown
page read and write
A480000
trusted library allocation
page read and write
2F34000
unkown
page readonly
1C98AF00000
unkown
page read and write
8B28000
trusted library allocation
page read and write
27316C5F000
unkown
page read and write
A480000
trusted library allocation
page read and write
CE567DA000
stack
page read and write
4C65000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
28912870000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
92F000
unkown
page readonly
A98C000
trusted library allocation
page read and write
4DD2000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D5C000
trusted library allocation
page read and write
9D6E000
trusted library allocation
page read and write
28910E66000
unkown
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
2E1F000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
A812000
trusted library allocation
page read and write
193B7840000
unkown
page read and write
A480000
trusted library allocation
page read and write
A474000
trusted library allocation
page read and write
1D1B8C29000
unkown
page read and write
9D59000
trusted library allocation
page read and write
A931000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
4DB9000
trusted library allocation
page read and write
1C98AE5E000
unkown
page read and write
A81F000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A817000
trusted library allocation
page read and write
CE56C7E000
stack
page read and write
1500000
heap
page read and write
A480000
trusted library allocation
page read and write
3DE5000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
3CF6000
trusted library allocation
page read and write
A370000
trusted library allocation
page read and write
9F4E000
trusted library allocation
page read and write
A2E0000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9CFA000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9CFD000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
CD1B27E000
stack
page read and write
9D6D000
trusted library allocation
page read and write
1D1B958E000
unkown
page read and write
A81A000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
3FA1000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A939000
trusted library allocation
page read and write
8B35000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A475000
trusted library allocation
page read and write
A478000
trusted library allocation
page read and write
27316C70000
unkown
page read and write
A46B000
trusted library allocation
page read and write
47F6000
trusted library allocation
page read and write
9D51000
trusted library allocation
page read and write
9D6C000
trusted library allocation
page read and write
B37000
heap
page read and write
1D1B9579000
unkown
page read and write
A480000
trusted library allocation
page read and write
A453000
trusted library allocation
page read and write
14560F02000
unkown
page read and write
A46B000
trusted library allocation
page read and write
A8CF000
trusted library allocation
page read and write
1D1B9402000
unkown
page read and write
4C8A000
trusted library allocation
page read and write
A0D3000
trusted library allocation
page read and write
A474000
trusted library allocation
page read and write
A80E000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
28910E13000
unkown
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B958C000
unkown
page read and write
6785A7C000
stack
page read and write
A812000
trusted library allocation
page read and write
B89000
heap
page read and write
A46F000
trusted library allocation
page read and write
AFBE000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
128C000
trusted library allocation
page read and write
A478000
trusted library allocation
page read and write
9CF8000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
1C98B602000
unkown
page read and write
1D1B8CFB000
unkown
page read and write
2ED0000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
1D1B9597000
unkown
page read and write
A93B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
3446000
heap
page read and write
4B07000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
E30000
heap
page read and write
A463000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
3BC1000
trusted library allocation
page read and write
9F41000
trusted library allocation
page read and write
75D000
heap
page read and write
A46B000
trusted library allocation
page read and write
1D0D3C20000
heap
page read and write
4BF1000
trusted library allocation
page read and write
28910DD0000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A474000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A452000
trusted library allocation
page read and write
A452000
trusted library allocation
page read and write
4D26000
trusted library allocation
page read and write
A90B000
trusted library allocation
page read and write
A2B6000
trusted library allocation
page read and write
ABE6000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A81F000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D60000
trusted library allocation
page read and write
A47B000
trusted library allocation
page read and write
A812000
trusted library allocation
page read and write
9CFC000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
2112D055000
unkown
page read and write
A2EC000
trusted library allocation
page read and write
A931000
trusted library allocation
page read and write
4BAE000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
10D2000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9E76000
trusted library allocation
page read and write
A929000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D62000
trusted library allocation
page read and write
3C92000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
1DA47C00000
unkown
page read and write
A46F000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
FD0000
trusted library allocation
page read and write
9D69000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B958E000
unkown
page read and write
A46B000
trusted library allocation
page read and write
9881000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9D08000
trusted library allocation
page read and write
289128B0000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A81F000
trusted library allocation
page read and write
A474000
trusted library allocation
page read and write
2FC4000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D5F000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
4B59000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B956D000
unkown
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9CF2000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
1D1B9579000
unkown
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A812000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
3ED0000
trusted library allocation
page read and write
B89000
heap
page read and write
9D0D000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
2E0D000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
3CF4000
trusted library allocation
page read and write
482C000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
ABE6000
trusted library allocation
page read and write
93E000
unkown
page readonly
9D67000
trusted library allocation
page read and write
15DC000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
52AA000
trusted library allocation
page read and write
3EBF000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
1BB65A3C000
unkown
page read and write
A46B000
trusted library allocation
page read and write
A93E000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
38B0000
trusted library allocation
page read and write
1D1B95B6000
unkown
page read and write
A463000
trusted library allocation
page read and write
1D1B9597000
unkown
page read and write
9D02000
trusted library allocation
page read and write
A8C9000
trusted library allocation
page read and write
A475000
trusted library allocation
page read and write
1D1B9590000
unkown
page read and write
70363FB000
stack
page read and write
4C02000
trusted library allocation
page read and write
A452000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
193B7780000
heap
page read and write
A480000
trusted library allocation
page read and write
27316C44000
unkown
page read and write
A480000
trusted library allocation
page read and write
1D1B95B6000
unkown
page read and write
9D03000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9D07000
trusted library allocation
page read and write
ABDA000
trusted library allocation
page read and write
A3C6000
trusted library allocation
page read and write
9CFF000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
723000
heap
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
AB7E000
trusted library allocation
page read and write
A817000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B958E000
unkown
page read and write
9D59000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
90B000
unkown
page readonly
9D05000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
288B9DE000
stack
page read and write
A46B000
trusted library allocation
page read and write
E92D3FD000
stack
page read and write
3085000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1DA47CC1000
unkown
page read and write
A480000
trusted library allocation
page read and write
AFC0000
trusted library allocation
page read and write
1D1B956A000
unkown
page read and write
B9C000
stack
page read and write
4B90000
trusted library allocation
page read and write
1D1B95A1000
unkown
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
246751F0000
unkown
page read and write
A92B000
trusted library allocation
page read and write
1D1B8A50000
heap
page read and write
2A176FD000
stack
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
27316A50000
heap
page read and write
3C23000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
3EC9000
trusted library allocation
page read and write
9D5B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
288B8DB000
stack
page read and write
288B95E000
stack
page read and write
9D5A000
trusted library allocation
page read and write
A7F6000
trusted library allocation
page read and write
3D60000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A80E000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A47B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
AFC0000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
CE56BF9000
stack
page read and write
14560CD0000
heap
page read and write
27316C62000
unkown
page read and write
2112D002000
unkown
page read and write
1D1B8D02000
unkown
page read and write
1C98AF13000
unkown
page read and write
3CE5000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D5E000
trusted library allocation
page read and write
A472000
trusted library allocation
page read and write
1D1B92D0000
remote allocation
page read and write
A920000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9CF2000
trusted library allocation
page read and write
3CAE000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
9D0B000
trusted library allocation
page read and write
9CF7000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A474000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1C98AE7F000
unkown
page read and write
A817000
trusted library allocation
page read and write
193B7900000
unkown
page read and write
A480000
trusted library allocation
page read and write
3E41000
trusted library allocation
page read and write
3CB1000
trusted library allocation
page read and write
A926000
trusted library allocation
page read and write
9D6F000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
9D0C000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
3C8F000
trusted library allocation
page read and write
3DE1000
trusted library allocation
page read and write
38BB000
trusted library allocation
page read and write
3E3C000
trusted library allocation
page read and write
1C98AE7F000
unkown
page read and write
A46B000
trusted library allocation
page read and write
CB0000
unkown
page read and write
5590000
unkown
page readonly
41BC000
trusted library allocation
page read and write
3EB1000
trusted library allocation
page read and write
2E0E000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
ABB8000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9881000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
1C98AE8A000
unkown
page read and write
A46B000
trusted library allocation
page read and write
A98C000
trusted library allocation
page read and write
273169E0000
heap
page read and write
9CFF000
trusted library allocation
page read and write
A92C000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
52B3000
trusted library allocation
page read and write
193B7800000
unkown
page read and write
94F000
unkown
page readonly
24675A02000
unkown
page read and write
A46B000
trusted library allocation
page read and write
1C98AD50000
heap
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D0D3C18000
heap
page read and write
10A3000
trusted library allocation
page execute and read and write
A480000
trusted library allocation
page read and write
1DA47CCA000
unkown
page read and write
1BB65B08000
unkown
page read and write
A615000
trusted library allocation
page read and write
9CF8000
trusted library allocation
page read and write
A2F0000
trusted library allocation
page read and write
EFD8F7F000
stack
page read and write
9D0E000
trusted library allocation
page read and write
5FD6000
unkown
page readonly
A8CF000
trusted library allocation
page read and write
A472000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
1D1B9594000
unkown
page read and write
A480000
trusted library allocation
page read and write
1C98ACE0000
heap
page read and write
2B60000
heap
page read and write
9D6A000
trusted library allocation
page read and write
9D6C000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
1D1B9A02000
unkown
page read and write
A46B000
trusted library allocation
page read and write
8B37000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1DA47D02000
unkown
page read and write
A46B000
trusted library allocation
page read and write
2E11000
trusted library allocation
page read and write
2112D802000
unkown
page read and write
15E0000
trusted library allocation
page read and write
3CF4000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A47B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
3EC9000
trusted library allocation
page read and write
A80E000
trusted library allocation
page read and write
14DB000
trusted library allocation
page read and write
1D1B8C4D000
unkown
page read and write
A817000
trusted library allocation
page read and write
9E88000
trusted library allocation
page read and write
4C65000
trusted library allocation
page read and write
52B2000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
A93A000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
1D1B9593000
unkown
page read and write
14560E76000
unkown
page read and write
49C000
stack
page read and write
CA53877000
stack
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
EFD907D000
stack
page read and write
A46B000
trusted library allocation
page read and write
3CF6000
trusted library allocation
page read and write
A473000
trusted library allocation
page read and write
A81A000
trusted library allocation
page read and write
E92D8FE000
stack
page read and write
47E8000
trusted library allocation
page read and write
1D1B9590000
unkown
page read and write
2EC7000
trusted library allocation
page read and write
A92E000
trusted library allocation
page read and write
3D62000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
961000
unkown
page readonly
A480000
trusted library allocation
page read and write
A93D000
trusted library allocation
page read and write
1D1B95C8000
unkown
page read and write
A480000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
193B7902000
unkown
page read and write
3CB8000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
3EB1000
trusted library allocation
page read and write
2467523D000
unkown
page read and write
3EAA000
trusted library allocation
page read and write
A2F0000
trusted library allocation
page read and write
1D1B95A5000
unkown
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
2E0A000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
1D1B95A4000
unkown
page read and write
9CFA000
trusted library allocation
page read and write
A8CF000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
2E08000
trusted library allocation
page read and write
1260000
heap
page read and write
1D1B8C47000
unkown
page read and write
A46B000
trusted library allocation
page read and write
14560E64000
unkown
page read and write
A46B000
trusted library allocation
page read and write
1D1B95A5000
unkown
page read and write
A480000
trusted library allocation
page read and write
67858FE000
stack
page read and write
1D1B95B3000
unkown
page read and write
A480000
trusted library allocation
page read and write
A2D1000
trusted library allocation
page read and write
10CA000
trusted library allocation
page execute and read and write
2EA0000
trusted library allocation
page read and write
A0B1000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
AB80000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
678535C000
stack
page read and write
7F8000
heap
page read and write
9CFC000
trusted library allocation
page read and write
288BE7E000
stack
page read and write
A46B000
trusted library allocation
page read and write
28910F18000
unkown
page read and write
41B2000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
14F0000
trusted library allocation
page read and write
193B7863000
unkown
page read and write
2A179FF000
stack
page read and write
1D1B95B3000
unkown
page read and write
2112D000000
unkown
page read and write
A473000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D06000
trusted library allocation
page read and write
4B9F000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A8C9000
trusted library allocation
page read and write
27316C2F000
unkown
page read and write
1D1B8CAF000
unkown
page read and write
AE50000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A81F000
trusted library allocation
page read and write
FCA9BFC000
stack
page read and write
9D61000
trusted library allocation
page read and write
38B0000
trusted library allocation
page read and write
A475000
trusted library allocation
page read and write
9A90000
trusted library allocation
page read and write
1BB65A77000
unkown
page read and write
A370000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B958C000
unkown
page read and write
50B3000
trusted library allocation
page read and write
8B3A000
trusted library allocation
page read and write
A86A000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
2E07000
trusted library allocation
page read and write
CE56AFE000
stack
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A475000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A80E000
trusted library allocation
page read and write
9CF8000
trusted library allocation
page read and write
2F00000
trusted library allocation
page read and write
9D60000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1200000
trusted library allocation
page read and write
9D67000
trusted library allocation
page read and write
9D50000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A80E000
trusted library allocation
page read and write
9E0E000
trusted library allocation
page read and write
27316C5C000
unkown
page read and write
A3C6000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D0D3F60000
heap
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
745000
heap
page read and write
2F42000
unkown
page readonly
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
678577C000
stack
page read and write
9D59000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
DB0000
heap
page read and write
3CF4000
trusted library allocation
page read and write
CD1B07E000
stack
page read and write
A480000
trusted library allocation
page read and write
B72000
heap
page read and write
9D6F000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9D00000
trusted library allocation
page read and write
A14F000
trusted library allocation
page read and write
28910E00000
unkown
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
32E1000
trusted library allocation
page read and write
A81A000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A474000
trusted library allocation
page read and write
1F2D49B000
stack
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
2A1747B000
stack
page read and write
A480000
trusted library allocation
page read and write
9D6E000
trusted library allocation
page read and write
5B2E000
unkown
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A80E000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
A8D8000
trusted library allocation
page read and write
3EC4000
trusted library allocation
page read and write
3EB5000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
28910E48000
unkown
page read and write
A46B000
trusted library allocation
page read and write
A47B000
trusted library allocation
page read and write
A2D8000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A153000
trusted library allocation
page read and write
14560F00000
unkown
page read and write
9D59000
trusted library allocation
page read and write
A938000
trusted library allocation
page read and write
A929000
trusted library allocation
page read and write
90B000
unkown
page readonly
9D5D000
trusted library allocation
page read and write
6785BFB000
stack
page read and write
A46F000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A90D000
trusted library allocation
page read and write
A812000
trusted library allocation
page read and write
A927000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9D5C000
trusted library allocation
page read and write
4CA9000
trusted library allocation
page read and write
8B3A000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
1C98AE13000
unkown
page read and write
52B2000
trusted library allocation
page read and write
1D1B9A02000
unkown
page read and write
A46B000
trusted library allocation
page read and write
EFD927E000
stack
page read and write
A474000
trusted library allocation
page read and write
15D0000
trusted library allocation
page read and write
148E000
stack
page read and write
A46B000
trusted library allocation
page read and write
7E3000
heap
page read and write
15E0000
trusted library allocation
page read and write
509E000
stack
page read and write
3040000
heap
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9CF9000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
4C90000
trusted library allocation
page read and write
B52000
heap
page read and write
A0C4000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
3EDA000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9CF1000
trusted library allocation
page read and write
A0CF000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A475000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
1D1B9579000
unkown
page read and write
A480000
trusted library allocation
page read and write
27316C5A000
unkown
page read and write
27316C3B000
unkown
page read and write
CD1AE7E000
stack
page read and write
A322000
trusted library allocation
page read and write
31EA000
heap
page read and write
9E88000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
3EB1000
trusted library allocation
page read and write
8E1000
unkown
page execute read
AE60000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9CFB000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
4DDB000
trusted library allocation
page read and write
9D6C000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
10C2000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
2112D068000
unkown
page read and write
A0B1000
trusted library allocation
page read and write
A93D000
trusted library allocation
page read and write
52B8000
trusted library allocation
page read and write
1DA47C64000
unkown
page read and write
A40000
trusted library allocation
page read and write
1D1B8C49000
unkown
page read and write
A463000
trusted library allocation
page read and write
15E0000
trusted library allocation
page read and write
A817000
trusted library allocation
page read and write
9D66000
trusted library allocation
page read and write
1DA47D13000
unkown
page read and write
9D59000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
543E000
stack
page read and write
A480000
trusted library allocation
page read and write
ABA1000
trusted library allocation
page read and write
9D69000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
98B7000
trusted library allocation
page read and write
9CFD000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
AF74000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9CF5000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
7036AFB000
stack
page read and write
AB98000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
A8C9000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A902000
trusted library allocation
page read and write
9CFE000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D05000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B8C13000
unkown
page read and write
4AA9000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A929000
trusted library allocation
page read and write
FCAA47D000
stack
page read and write
A474000
trusted library allocation
page read and write
27316C7F000
unkown
page read and write
9D59000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
D90000
heap
page read and write
28910F02000
unkown
page read and write
A475000
trusted library allocation
page read and write
A81A000
trusted library allocation
page read and write
AE50000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
24675950000
remote allocation
page read and write
2112D078000
unkown
page read and write
A81F000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B9588000
unkown
page read and write
A330000
trusted library allocation
page read and write
A81F000
trusted library allocation
page read and write
A929000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A0D2000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
1D1B95A1000
unkown
page read and write
14560DD0000
unkown
page read and write
9D5D000
trusted library allocation
page read and write
94A000
unkown
page write copy
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
B02000
unkown
page readonly
9D59000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
1D1B958A000
unkown
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B959F000
unkown
page read and write
9CFB000
trusted library allocation
page read and write
A153000
trusted library allocation
page read and write
27316C68000
unkown
page read and write
A46B000
trusted library allocation
page read and write
1D0D3BFB000
heap
page read and write
2E13000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
9CF5000
trusted library allocation
page read and write
9D5E000
trusted library allocation
page read and write
9EC5000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
27316C13000
unkown
page read and write
3C0E000
trusted library allocation
page read and write
1D1B956C000
unkown
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9D61000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
2F62000
unkown
page readonly
2FBA000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
2112D08B000
unkown
page read and write
A480000
trusted library allocation
page read and write
70369FE000
stack
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
3DBC000
trusted library allocation
page read and write
1C98AF08000
unkown
page read and write
A81F000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
A14F000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A332000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A475000
trusted library allocation
page read and write
A812000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
14560E75000
unkown
page read and write
24675150000
heap
page read and write
A480000
trusted library allocation
page read and write
A474000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
27316C6E000
unkown
page read and write
9CF6000
trusted library allocation
page read and write
74A000
heap
page read and write
A46B000
trusted library allocation
page read and write
2F60000
unkown
page readonly
3DB2000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
1D0D3C06000
heap
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
EFD8BFF000
stack
page read and write
9D59000
trusted library allocation
page read and write
92A000
unkown
page read and write
A46B000
trusted library allocation
page read and write
A936000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
1D1B8C4A000
unkown
page read and write
5470000
unkown
page readonly
9EC6000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
9D5B000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
A472000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1C98AE02000
unkown
page read and write
A47F000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B95BC000
unkown
page read and write
2EA0000
unkown
page readonly
A470000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9D5B000
trusted library allocation
page read and write
CA534FC000
stack
page read and write
4C81000
trusted library allocation
page read and write
9CF5000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
1DA47C13000
unkown
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A478000
trusted library allocation
page read and write
9D6C000
trusted library allocation
page read and write
1D1B95D6000
unkown
page read and write
A480000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
484E000
trusted library allocation
page read and write
CA5313E000
stack
page read and write
A46B000
trusted library allocation
page read and write
1D1B95C2000
unkown
page read and write
BC0000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A93E000
trusted library allocation
page read and write
A93C000
trusted library allocation
page read and write
2112D041000
unkown
page read and write
2112D06A000
unkown
page read and write
9CF4000
trusted library allocation
page read and write
A471000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
4C90000
trusted library allocation
page read and write
A8D8000
trusted library allocation
page read and write
9D02000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A3B0000
trusted library allocation
page read and write
A93F000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
27316C59000
unkown
page read and write
5740000
unkown
page readonly
A480000
trusted library allocation
page read and write
2B10000
heap
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
1D1B95A5000
unkown
page read and write
A46B000
trusted library allocation
page read and write
1D1B9A02000
unkown
page read and write
6FF30000
unkown
page readonly
4B59000
trusted library allocation
page read and write
3BC9000
trusted library allocation
page read and write
A472000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
1D1B8A40000
heap
page read and write
A474000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
9CF8000
trusted library allocation
page read and write
3D60000
trusted library allocation
page read and write
193B7828000
unkown
page read and write
9D59000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
24675213000
unkown
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
4CFC000
trusted library allocation
page read and write
1D1B95A1000
unkown
page read and write
9D00000
trusted library allocation
page read and write
B30000
heap
page read and write
A480000
trusted library allocation
page read and write
2EA2000
unkown
page readonly
A2D1000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A935000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
28910E42000
unkown
page read and write
A45A000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
A93A000
trusted library allocation
page read and write
A473000
trusted library allocation
page read and write
A473000
trusted library allocation
page read and write
A8CF000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
1DA47CB9000
unkown
page read and write
A46D000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A453000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B956B000
unkown
page read and write
A46B000
trusted library allocation
page read and write
1C98AD80000
unkown
page read and write
A480000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
1342000
heap
page read and write
14560E3C000
unkown
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D5C000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
2F22000
unkown
page readonly
9D50000
trusted library allocation
page read and write
A0B1000
trusted library allocation
page read and write
9D61000
trusted library allocation
page read and write
A937000
trusted library allocation
page read and write
9D51000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
2F20000
unkown
page readonly
2E0B000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
5530000
unkown
page readonly
A8D8000
trusted library allocation
page read and write
1D1B8CA5000
unkown
page read and write
EFD87BB000
stack
page read and write
A46D000
trusted library allocation
page read and write
A8D8000
trusted library allocation
page read and write
8B3A000
trusted library allocation
page read and write
53E0000
unkown
page readonly
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
4AA2000
trusted library allocation
page read and write
92B000
unkown
page readonly
A46B000
trusted library allocation
page read and write
2112CDF0000
heap
page read and write
A46B000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9D5F000
trusted library allocation
page read and write
DC0000
trusted library allocation
page read and write
9D03000
trusted library allocation
page read and write
A92F000
trusted library allocation
page read and write
1C98AE29000
unkown
page read and write
1D1B959F000
unkown
page read and write
A46F000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9CF3000
trusted library allocation
page read and write
1F2DA7E000
stack
page read and write
4BE7000
trusted library allocation
page read and write
B72000
heap
page read and write
1D1B8D16000
unkown
page read and write
A480000
trusted library allocation
page read and write
9D01000
trusted library allocation
page read and write
1D1B95C7000
unkown
page read and write
1D1B8C5A000
unkown
page read and write
A46B000
trusted library allocation
page read and write
28912930000
remote allocation
page read and write
92D000
unkown
page readonly
27316C6A000
unkown
page read and write
AFBC000
trusted library allocation
page read and write
CA5357E000
stack
page read and write
3C52000
trusted library allocation
page read and write
2FCE000
trusted library allocation
page read and write
A148000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A478000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A900000
trusted library allocation
page read and write
9CFF000
trusted library allocation
page read and write
4B59000
trusted library allocation
page read and write
A81A000
trusted library allocation
page read and write
A817000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9F49000
trusted library allocation
page read and write
193B7813000
unkown
page read and write
A8CF000
trusted library allocation
page read and write
A2EF000
trusted library allocation
page read and write
1D1B958E000
unkown
page read and write
A473000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A4BD000
trusted library allocation
page read and write
A80E000
trusted library allocation
page read and write
5A2F000
stack
page read and write
9CFB000
trusted library allocation
page read and write
1D1B9571000
unkown
page read and write
A480000
trusted library allocation
page read and write
A478000
trusted library allocation
page read and write
4BDC000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
2EC9000
trusted library allocation
page read and write
CE56CFD000
stack
page read and write
1D1B956B000
unkown
page read and write
10A0000
trusted library allocation
page read and write
9D09000
trusted library allocation
page read and write
9D09000
trusted library allocation
page read and write
3EBF000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
1D1B95B1000
unkown
page read and write
2A1757E000
stack
page read and write
4BA3000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
4803000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
31E9000
heap
page read and write
9D5C000
trusted library allocation
page read and write
4B7E000
trusted library allocation
page read and write
A452000
trusted library allocation
page read and write
CA0000
unkown
page readonly
9D65000
trusted library allocation
page read and write
52D1000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
8C0000
unkown
page readonly
5ED2000
unkown
page readonly
6FF4E000
unkown
page readonly
9CF7000
trusted library allocation
page read and write
551E000
unkown
page read and write
A46B000
trusted library allocation
page read and write
A3C9000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
24675200000
unkown
page read and write
4848000
trusted library allocation
page read and write
1D1B8C55000
unkown
page read and write
1D1B92D0000
remote allocation
page read and write
A0D2000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
ABA8000
trusted library allocation
page read and write
1F2D59E000
stack
page read and write
A46E000
trusted library allocation
page read and write
9CF4000
trusted library allocation
page read and write
A81A000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A0CD000
trusted library allocation
page read and write
507C000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
28910E59000
unkown
page read and write
1D1B9A02000
unkown
page read and write
A480000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
C20000
heap
page read and write
A46C000
trusted library allocation
page read and write
1D1B95A5000
unkown
page read and write
31F0000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
27316C76000
unkown
page read and write
9CF6000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
1BB65A4D000
unkown
page read and write
4848000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
5127000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
4808000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
3CB7000
trusted library allocation
page read and write
3CE8000
trusted library allocation
page read and write
51E1000
trusted library allocation
page read and write
1D1B95A8000
unkown
page read and write
A480000
trusted library allocation
page read and write
3E3C000
trusted library allocation
page read and write
A474000
trusted library allocation
page read and write
14CE000
stack
page read and write
A46B000
trusted library allocation
page read and write
2112D06E000
unkown
page read and write
A2D8000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
2E1C000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A0B1000
trusted library allocation
page read and write
CA53AFF000
stack
page read and write
10B3000
trusted library allocation
page read and write
A878000
trusted library allocation
page read and write
2E9F000
stack
page read and write
A332000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D05000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A923000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A453000
trusted library allocation
page read and write
A929000
trusted library allocation
page read and write
12C0000
heap
page read and write
1D1B8CA6000
unkown
page read and write
A463000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
98BA000
trusted library allocation
page read and write
1D0D3B20000
heap
page read and write
A46B000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
2A17AFC000
stack
page read and write
3CF6000
trusted library allocation
page read and write
1D1B8CE3000
unkown
page read and write
5742000
unkown
page readonly
A46B000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D03000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
EFD937C000
stack
page read and write
A480000
trusted library allocation
page read and write
A92D000
trusted library allocation
page read and write
A98C000
trusted library allocation
page read and write
A474000
trusted library allocation
page read and write
5323000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A473000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D04000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
3DE1000
trusted library allocation
page read and write
5B30000
unkown
page readonly
A45A000
trusted library allocation
page read and write
5520000
heap
page execute and read and write
406B000
trusted library allocation
page read and write
A817000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
CA53778000
stack
page read and write
A46D000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
9F71000
trusted library allocation
page read and write
14E0000
trusted library allocation
page execute and read and write
A480000
trusted library allocation
page read and write
A817000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A870000
trusted library allocation
page read and write
10C7000
trusted library allocation
page execute and read and write
B00000
unkown
page readonly
3CF6000
trusted library allocation
page read and write
E92D4FF000
stack
page read and write
A14F000
trusted library allocation
page read and write
4808000
trusted library allocation
page read and write
9D6B000
trusted library allocation
page read and write
9D64000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
3EDA000
trusted library allocation
page read and write
4840000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A938000
trusted library allocation
page read and write
9D5D000
trusted library allocation
page read and write
4C7E000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
A81F000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
A474000
trusted library allocation
page read and write
9D6B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9CF6000
trusted library allocation
page read and write
3C9F000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A47D000
trusted library allocation
page read and write
A476000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
24675225000
unkown
page read and write
A480000
trusted library allocation
page read and write
A93F000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A479000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
1DA47C66000
unkown
page read and write
A46D000
trusted library allocation
page read and write
A475000
trusted library allocation
page read and write
193B77B0000
unkown
page read and write
9D06000
trusted library allocation
page read and write
1C98AF02000
unkown
page read and write
4C3E000
trusted library allocation
page read and write
9D6B000
trusted library allocation
page read and write
1BB65900000
heap
page read and write
5323000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
14560E5C000
unkown
page read and write
ABE6000
trusted library allocation
page read and write
A452000
trusted library allocation
page read and write
CA53CFF000
stack
page read and write
A480000
trusted library allocation
page read and write
A153000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
27316C00000
unkown
page read and write
5298000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9CF2000
trusted library allocation
page read and write
4C49000
trusted library allocation
page read and write
2FBD000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
E92CBFC000
stack
page read and write
A474000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
2E12000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9881000
trusted library allocation
page read and write
9D02000
trusted library allocation
page read and write
10E0000
heap
page read and write
EF8000
stack
page read and write
4B9F000
trusted library allocation
page read and write
9CF4000
trusted library allocation
page read and write
A8D8000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
3EC9000
trusted library allocation
page read and write
2A1767B000
stack
page read and write
9D64000
trusted library allocation
page read and write
1D1B9A00000
unkown
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
1F2DD7E000
stack
page read and write
9CF1000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
2EDD000
stack
page read and write
A46B000
trusted library allocation
page read and write
52B6000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
6785B7D000
stack
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
101D000
stack
page read and write
3CB7000
trusted library allocation
page read and write
9CF1000
trusted library allocation
page read and write
27316C7E000
unkown
page read and write
14560F13000
unkown
page read and write
4AA6000
trusted library allocation
page read and write
1D1B8C89000
unkown
page read and write
A47F000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
4B82000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
52B2000
trusted library allocation
page read and write
9D0A000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
2C20000
heap
page read and write
FCAA5FE000
stack
page read and write
9D51000
trusted library allocation
page read and write
B78000
heap
page read and write
A480000
trusted library allocation
page read and write
9D0C000
trusted library allocation
page read and write
A87A000
trusted library allocation
page read and write
2FA1000
trusted library allocation
page read and write
AB8E000
trusted library allocation
page read and write
3E9B000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
A2D1000
trusted library allocation
page read and write
1D0D3C01000
heap
page read and write
A3C9000
trusted library allocation
page read and write
A81F000
trusted library allocation
page read and write
A812000
trusted library allocation
page read and write
1D1B8C84000
unkown
page read and write
A45A000
trusted library allocation
page read and write
A2B6000
trusted library allocation
page read and write
60DF000
unkown
page read and write
AFBC000
trusted library allocation
page read and write
2A178F7000
stack
page read and write
27316C61000
unkown
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
6785FFE000
stack
page read and write
A46B000
trusted library allocation
page read and write
CA0000
unkown
page readonly
9D00000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B95A9000
unkown
page read and write
8C0000
unkown
page readonly
A46B000
trusted library allocation
page read and write
1287000
trusted library allocation
page read and write
9D0F000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9D65000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B956D000
unkown
page read and write
9D68000
trusted library allocation
page read and write
4C05000
trusted library allocation
page read and write
27316C40000
unkown
page read and write
A906000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A80E000
trusted library allocation
page read and write
4ACC000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
246751C0000
heap
page read and write
B61000
heap
page read and write
A45A000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
3DAC000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
FCAA37F000
stack
page read and write
A96B000
trusted library allocation
page read and write
A472000
trusted library allocation
page read and write
A474000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
14560E75000
unkown
page read and write
A46B000
trusted library allocation
page read and write
FCAA0FE000
stack
page read and write
A46B000
trusted library allocation
page read and write
9D53000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
52B6000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A930000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
38B3000
trusted library allocation
page read and write
5177000
trusted library allocation
page read and write
1D1B95D2000
unkown
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
4C29000
trusted library allocation
page read and write
1D1B958C000
unkown
page read and write
A470000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A81A000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
2112D029000
unkown
page read and write
A812000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
1D1B8BB0000
unkown
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
CE56A7E000
stack
page read and write
A45A000
trusted library allocation
page read and write
3D5F000
trusted library allocation
page read and write
A87F000
trusted library allocation
page read and write
4BFE000
trusted library allocation
page read and write
B78000
heap
page read and write
1D1B8C4B000
unkown
page read and write
A46B000
trusted library allocation
page read and write
A8C9000
trusted library allocation
page read and write
A80E000
trusted library allocation
page read and write
1D1B95B2000
unkown
page read and write
A87D000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
3E41000
trusted library allocation
page read and write
A87C000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9D60000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
31D0000
heap
page read and write
2DF0000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9D66000
trusted library allocation
page read and write
A8CF000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
5592000
unkown
page readonly
A46D000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
C90000
unkown
page readonly
A452000
trusted library allocation
page read and write
9CF7000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
3D60000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D51000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
1D1B9530000
unkown
page read and write
2EE0000
trusted library allocation
page read and write
9D68000
trusted library allocation
page read and write
A4AF000
trusted library allocation
page read and write
4AF2000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
A452000
trusted library allocation
page read and write
1D1B9572000
unkown
page read and write
A46E000
trusted library allocation
page read and write
1D0D3C2F000
heap
page read and write
A929000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B8D08000
unkown
page read and write
A46B000
trusted library allocation
page read and write
2FB7000
trusted library allocation
page read and write
A2D1000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A240000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9CF1000
trusted library allocation
page read and write
A452000
trusted library allocation
page read and write
AE50000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
75B000
heap
page read and write
A80E000
trusted library allocation
page read and write
2112CE60000
heap
page read and write
B78000
heap
page read and write
A480000
trusted library allocation
page read and write
A0C4000
trusted library allocation
page read and write
9D51000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
28910E59000
unkown
page read and write
A81A000
trusted library allocation
page read and write
15E0000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1DA48402000
unkown
page read and write
A46B000
trusted library allocation
page read and write
4C10000
trusted library allocation
page read and write
A8C9000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
52AF000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D6F000
trusted library allocation
page read and write
9CFB000
trusted library allocation
page read and write
1C98AE00000
unkown
page read and write
A46E000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B95B6000
unkown
page read and write
9CFD000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A36E000
trusted library allocation
page read and write
1DA47AE0000
heap
page read and write
3EB5000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1DA48500000
unkown
page read and write
A905000
trusted library allocation
page read and write
A2EC000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A98C000
trusted library allocation
page read and write
41B8000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A812000
trusted library allocation
page read and write
5008000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
C90000
unkown
page readonly
A480000
trusted library allocation
page read and write
27316C64000
unkown
page read and write
A480000
trusted library allocation
page read and write
27316C85000
unkown
page read and write
A480000
trusted library allocation
page read and write
1D1B9590000
unkown
page read and write
288C17E000
stack
page read and write
CA531BE000
stack
page read and write
1D0D3F65000
heap
page read and write
9D62000
trusted library allocation
page read and write
27316D02000
unkown
page read and write
3E00000
trusted library allocation
page read and write
2112D05C000
unkown
page read and write
A928000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
27316C7C000
unkown
page read and write
9E76000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9D04000
trusted library allocation
page read and write
4DDB000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A8CF000
trusted library allocation
page read and write
9D67000
trusted library allocation
page read and write
5532000
unkown
page readonly
A380000
trusted library allocation
page read and write
9CF1000
trusted library allocation
page read and write
1F2D51D000
stack
page read and write
3EC1000
trusted library allocation
page read and write
A98C000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
193B7913000
unkown
page read and write
1BB65B00000
unkown
page read and write
E92D0FF000
stack
page read and write
CE56B7A000
stack
page read and write
A47A000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
8B3E000
trusted library allocation
page read and write
3C0B000
trusted library allocation
page read and write
4804000
trusted library allocation
page read and write
3ED5000
trusted library allocation
page read and write
3EB5000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
E92D5FF000
stack
page read and write
B8B000
heap
page read and write
A46B000
trusted library allocation
page read and write
A812000
trusted library allocation
page read and write
A817000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
1D1B9522000
unkown
page read and write
A920000
trusted library allocation
page read and write
9D64000
trusted library allocation
page read and write
9D9B000
trusted library allocation
page read and write
24675202000
unkown
page read and write
9D6A000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
2FBF000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
9E0E000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
4AA6000
trusted library allocation
page read and write
A7EA000
trusted library allocation
page read and write
5323000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
4C29000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
3E99000
trusted library allocation
page read and write
125E000
stack
page read and write
ABDA000
trusted library allocation
page read and write
9D5F000
trusted library allocation
page read and write
4BA2000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
52B6000
trusted library allocation
page read and write
4B9D000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
3DAD000
trusted library allocation
page read and write
5323000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9CF4000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
15F0000
heap
page read and write
14560F08000
unkown
page read and write
A4AB000
trusted library allocation
page read and write
1D1B9579000
unkown
page read and write
27316C67000
unkown
page read and write
A480000
trusted library allocation
page read and write
1DA47C88000
unkown
page read and write
52B2000
trusted library allocation
page read and write
A474000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
70368FB000
stack
page read and write
A480000
trusted library allocation
page read and write
24675160000
heap
page read and write
A474000
trusted library allocation
page read and write
1D0D3C20000
heap
page read and write
A98C000
trusted library allocation
page read and write
9AA6000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9A90000
trusted library allocation
page read and write
1D1B956D000
unkown
page read and write
3DF1000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
5294000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
24675950000
remote allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B9579000
unkown
page read and write
A46B000
trusted library allocation
page read and write
3446000
heap
page read and write
A46D000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
1D1B9584000
unkown
page read and write
A46D000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A80E000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
2112D102000
unkown
page read and write
A480000
trusted library allocation
page read and write
A613000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9CF5000
trusted library allocation
page read and write
4BF0000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
27316C60000
unkown
page read and write
A452000
trusted library allocation
page read and write
A935000
trusted library allocation
page read and write
A0CF000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D62000
trusted library allocation
page read and write
52B3000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
5096000
trusted library allocation
page read and write
2FB8000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
A860000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A474000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
A925000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
9D0D000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
A817000
trusted library allocation
page read and write
52E1000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B95A5000
unkown
page read and write
A480000
trusted library allocation
page read and write
A81F000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A98C000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
288BF77000
stack
page read and write
4DD8000
trusted library allocation
page read and write
193B7802000
unkown
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
2112CE00000
heap
page read and write
A46B000
trusted library allocation
page read and write
3EDA000
trusted library allocation
page read and write
EFD917C000
stack
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1BB65A81000
unkown
page read and write
1290000
heap
page read and write
5323000
trusted library allocation
page read and write
4C5A000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A47B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
27316C65000
unkown
page read and write
A0CD000
trusted library allocation
page read and write
27316C41000
unkown
page read and write
193B787A000
unkown
page read and write
1D1B958A000
unkown
page read and write
3D60000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9CF9000
trusted library allocation
page read and write
A929000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
C90000
unkown
page readonly
9D0E000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
3E83000
trusted library allocation
page read and write
2EE0000
trusted library allocation
page read and write
A80E000
trusted library allocation
page read and write
A223000
trusted library allocation
page read and write
4C13000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B8C39000
unkown
page read and write
4C0D000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
9D5A000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B9592000
unkown
page read and write
2ED0000
trusted library allocation
page read and write
B89000
heap
page read and write
A81A000
trusted library allocation
page read and write
9CF1000
trusted library allocation
page read and write
A98C000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
1D1B95A5000
unkown
page read and write
8B0000
heap
page read and write
1D1B958E000
unkown
page read and write
A480000
trusted library allocation
page read and write
8B3A000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
52C1000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
1BB66202000
unkown
page read and write
1D1B95A4000
unkown
page read and write
1DA47CE2000
unkown
page read and write
A480000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
2E1D000
trusted library allocation
page read and write
14560E29000
unkown
page read and write
A2D4000
trusted library allocation
page read and write
A0CF000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
4DD8000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
A369000
trusted library allocation
page read and write
AFB0000
trusted library allocation
page read and write
A453000
trusted library allocation
page read and write
1DA48532000
unkown
page read and write
4C81000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
27316C63000
unkown
page read and write
A480000
trusted library allocation
page read and write
52B6000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
1210000
heap
page read and write
9D50000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
4C7F000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
A475000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A92B000
trusted library allocation
page read and write
10C0000
trusted library allocation
page read and write
1D1B957E000
unkown
page read and write
4B5E000
trusted library allocation
page read and write
9D01000
trusted library allocation
page read and write
28910F00000
unkown
page read and write
AFD0000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
15E0000
trusted library allocation
page read and write
A933000
trusted library allocation
page read and write
9CFB000
trusted library allocation
page read and write
A929000
trusted library allocation
page read and write
4CB1000
trusted library allocation
page read and write
193B7720000
heap
page read and write
2A177FB000
stack
page read and write
A480000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A67E000
trusted library allocation
page read and write
CB0000
unkown
page read and write
14560E59000
unkown
page read and write
A463000
trusted library allocation
page read and write
A472000
trusted library allocation
page read and write
9D6A000
trusted library allocation
page read and write
3CB8000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A472000
trusted library allocation
page read and write
9D61000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9D5C000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A937000
trusted library allocation
page read and write
A8C9000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A92A000
trusted library allocation
page read and write
1D1B95C7000
unkown
page read and write
2FCC000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
9D6E000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
9D50000
trusted library allocation
page read and write
A8D8000
trusted library allocation
page read and write
28910E60000
unkown
page read and write
A46D000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A473000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
3AB4000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
AE50000
trusted library allocation
page read and write
9CFA000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
2E1E000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
8B33000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
3EC4000
trusted library allocation
page read and write
4C09000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9CF5000
trusted library allocation
page read and write
1D1B958A000
unkown
page read and write
A480000
trusted library allocation
page read and write
A817000
trusted library allocation
page read and write
9CF3000
trusted library allocation
page read and write
2E0C000
trusted library allocation
page read and write
1D1B9A02000
unkown
page read and write
28910E2A000
unkown
page read and write
A480000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
4B85000
trusted library allocation
page read and write
412A000
trusted library allocation
page read and write
193B7710000
heap
page read and write
A921000
trusted library allocation
page read and write
A476000
trusted library allocation
page read and write
3AB4000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
9D5F000
trusted library allocation
page read and write
A81A000
trusted library allocation
page read and write
A92A000
trusted library allocation
page read and write
AE30000
trusted library allocation
page read and write
9E88000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A0CD000
trusted library allocation
page read and write
A817000
trusted library allocation
page read and write
9D08000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
5ED0000
unkown
page readonly
27316C75000
unkown
page read and write
A480000
trusted library allocation
page read and write
2112D113000
unkown
page read and write
CD1AB8B000
stack
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
3E00000
trusted library allocation
page read and write
A452000
trusted library allocation
page read and write
A474000
trusted library allocation
page read and write
2A90000
heap
page read and write
3CAE000
trusted library allocation
page read and write
417F000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
28910E49000
unkown
page read and write
1D0D3BF0000
heap
page read and write
9F8D000
trusted library allocation
page read and write
FCAA07C000
stack
page read and write
A46D000
trusted library allocation
page read and write
24675302000
unkown
page read and write
9D59000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
A4B6000
trusted library allocation
page read and write
52BA000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
51E1000
trusted library allocation
page read and write
10B0000
trusted library allocation
page read and write
1D1B8CBF000
unkown
page read and write
9CF9000
trusted library allocation
page read and write
CA530BB000
stack
page read and write
A480000
trusted library allocation
page read and write
A452000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
ABB8000
trusted library allocation
page read and write
1D1B8AB0000
heap
page read and write
CA53A77000
stack
page read and write
A812000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
9CF6000
trusted library allocation
page read and write
1D1B9573000
unkown
page read and write
A812000
trusted library allocation
page read and write
50C7000
trusted library allocation
page read and write
A0D2000
trusted library allocation
page read and write
2F90000
heap
page execute and read and write
CA5367B000
stack
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
10E6000
heap
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
14560E54000
unkown
page read and write
A903000
trusted library allocation
page read and write
A74E000
trusted library allocation
page read and write
A472000
trusted library allocation
page read and write
9CF2000
trusted library allocation
page read and write
2FBC000
trusted library allocation
page read and write
1F2DB77000
stack
page read and write
2FC1000
trusted library allocation
page read and write
27316C49000
unkown
page read and write
52BA000
trusted library allocation
page read and write
AB98000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A330000
trusted library allocation
page read and write
9D01000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
EFD8E7E000
stack
page read and write
A480000
trusted library allocation
page read and write
9D6E000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B9590000
unkown
page read and write
A480000
trusted library allocation
page read and write
10D0000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
B68000
heap
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
1D1B958C000
unkown
page read and write
A46B000
trusted library allocation
page read and write
2EF2000
unkown
page readonly
15D0000
trusted library allocation
page read and write
9D6D000
trusted library allocation
page read and write
A8D8000
trusted library allocation
page read and write
B02000
unkown
page readonly
1D1B8CC6000
unkown
page read and write
3CF4000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
52B6000
trusted library allocation
page read and write
9E88000
trusted library allocation
page read and write
9E0E000
trusted library allocation
page read and write
273169F0000
heap
page read and write
A0D2000
trusted library allocation
page read and write
9D05000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A879000
trusted library allocation
page read and write
9E76000
trusted library allocation
page read and write
9D0A000
trusted library allocation
page read and write
1C98AE54000
unkown
page read and write
A47B000
trusted library allocation
page read and write
A22D000
trusted library allocation
page read and write
14561602000
unkown
page read and write
8B3D000
trusted library allocation
page read and write
38B3000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9DF0000
trusted library allocation
page read and write
D30000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
2FB9000
trusted library allocation
page read and write
9D64000
trusted library allocation
page read and write
2EF0000
unkown
page readonly
1BB65B02000
unkown
page read and write
193B7853000
unkown
page read and write
288C07E000
stack
page read and write
4B90000
trusted library allocation
page read and write
A3C9000
trusted library allocation
page read and write
A474000
trusted library allocation
page read and write
9F99000
trusted library allocation
page read and write
A90A000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
8E0000
unkown
page readonly
A480000
trusted library allocation
page read and write
A452000
trusted library allocation
page read and write
A0CF000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A81F000
trusted library allocation
page read and write
1D1B958C000
unkown
page read and write
3C9A000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
28910D80000
heap
page read and write
7036BFE000
stack
page read and write
9D59000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B9590000
unkown
page read and write
A369000
trusted library allocation
page read and write
9F77000
trusted library allocation
page read and write
A8CF000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9E88000
trusted library allocation
page read and write
1D1B956D000
unkown
page read and write
4DD8000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A81A000
trusted library allocation
page read and write
9D50000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
3D60000
trusted library allocation
page read and write
5096000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D5A000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
95E000
unkown
page readonly
7F1000
heap
page read and write
A7F3000
trusted library allocation
page read and write
28910F13000
unkown
page read and write
A46B000
trusted library allocation
page read and write
41B2000
trusted library allocation
page read and write
28910E49000
unkown
page read and write
9CFC000
trusted library allocation
page read and write
1D1B9590000
unkown
page read and write
10D7000
trusted library allocation
page execute and read and write
3CA4000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
59B000
stack
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A473000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
AFD0000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
11EE000
stack
page read and write
A480000
trusted library allocation
page read and write
A260000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9CF9000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1C98AE80000
unkown
page read and write
52AF000
trusted library allocation
page read and write
CC0000
trusted library allocation
page read and write
3C9D000
trusted library allocation
page read and write
1BB65A00000
unkown
page read and write
A812000
trusted library allocation
page read and write
A81A000
trusted library allocation
page read and write
A81F000
trusted library allocation
page read and write
2F0E000
unkown
page readonly
573C000
unkown
page readonly
1D1B8C57000
unkown
page read and write
1D1B8C48000
unkown
page read and write
529F000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
135D000
heap
page read and write
482E000
trusted library allocation
page read and write
9AAC000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A472000
trusted library allocation
page read and write
1BB65A13000
unkown
page read and write
1D1B9594000
unkown
page read and write
3CB9000
trusted library allocation
page read and write
52B2000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
2A174FE000
stack
page read and write
A46F000
trusted library allocation
page read and write
1D1B9593000
unkown
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B9562000
unkown
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9D69000
trusted library allocation
page read and write
1D1B956D000
unkown
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
4AA2000
trusted library allocation
page read and write
B060000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
EFD8D7F000
stack
page read and write
A46B000
trusted library allocation
page read and write
9D5F000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A936000
trusted library allocation
page read and write
FCAA2FD000
stack
page read and write
14560C70000
heap
page read and write
9D03000
trusted library allocation
page read and write
9D69000
trusted library allocation
page read and write
3CB9000
trusted library allocation
page read and write
1D1B957D000
unkown
page read and write
1F2DC7F000
stack
page read and write
A921000
trusted library allocation
page read and write
A922000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
A8D8000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A929000
trusted library allocation
page read and write
410A000
trusted library allocation
page read and write
A3C9000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
3EC4000
trusted library allocation
page read and write
FCAA1FF000
stack
page read and write
9A90000
trusted library allocation
page execute
4C9D000
trusted library allocation
page read and write
A474000
trusted library allocation
page read and write
A0D2000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A80E000
trusted library allocation
page read and write
32F2000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
2FC3000
trusted library allocation
page read and write
15D0000
trusted library allocation
page read and write
CA53BFE000
stack
page read and write
A471000
trusted library allocation
page read and write
A474000
trusted library allocation
page read and write
5430000
trusted library allocation
page read and write
4835000
trusted library allocation
page read and write
4C31000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
3AB4000
trusted library allocation
page read and write
E92D1FC000
stack
page read and write
A46D000
trusted library allocation
page read and write
41B8000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
8C1000
unkown
page execute read
CD1AEFE000
stack
page read and write
A470000
trusted library allocation
page read and write
4BF0000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
4AA6000
trusted library allocation
page read and write
3C16000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A812000
trusted library allocation
page read and write
A0C4000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
28910D20000
heap
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A7F6000
trusted library allocation
page read and write
A817000
trusted library allocation
page read and write
4BFC000
trusted library allocation
page read and write
1D1B9A02000
unkown
page read and write
9D5D000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
28910E8A000
unkown
page read and write
1D1B9559000
unkown
page read and write
1D0D3BA0000
heap
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A8C9000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
416C000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B95A5000
unkown
page read and write
A46B000
trusted library allocation
page read and write
1F2D9FB000
stack
page read and write
A480000
trusted library allocation
page read and write
76E000
heap
page read and write
9D59000
trusted library allocation
page read and write
4C91000
trusted library allocation
page read and write
9D0B000
trusted library allocation
page read and write
A81F000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
1DA47C29000
unkown
page read and write
1DA47B80000
unkown
page read and write
A480000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
1D1B95B1000
unkown
page read and write
A480000
trusted library allocation
page read and write
CD1B17E000
stack
page read and write
A480000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D6D000
trusted library allocation
page read and write
9CF4000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
15E0000
trusted library allocation
page read and write
9ECE000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
C8D000
stack
page read and write
986F000
trusted library allocation
page read and write
14560E00000
unkown
page read and write
A480000
trusted library allocation
page read and write
A3C9000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
8B3D000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
A2F0000
trusted library allocation
page read and write
A90C000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
6785EFD000
stack
page read and write
A480000
trusted library allocation
page read and write
1D1B9579000
unkown
page read and write
9D59000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
2E0F000
trusted library allocation
page read and write
2FBE000
trusted library allocation
page read and write
A3C6000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A2D1000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
9D06000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
A929000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A2EC000
trusted library allocation
page read and write
1D0D3C20000
heap
page read and write
52AA000
trusted library allocation
page read and write
4C0D000
trusted library allocation
page read and write
9CF3000
trusted library allocation
page read and write
A876000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
A812000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
B080000
trusted library allocation
page read and write
9D5B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D04000
trusted library allocation
page read and write
15E0000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
52B8000
trusted library allocation
page read and write
2E14000
trusted library allocation
page read and write
A81A000
trusted library allocation
page read and write
A934000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
193B8002000
unkown
page read and write
A0B1000
trusted library allocation
page read and write
3CF4000
trusted library allocation
page read and write
1BB65A53000
unkown
page read and write
A46B000
trusted library allocation
page read and write
4172000
trusted library allocation
page read and write
9D01000
trusted library allocation
page read and write
AE70000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
9980000
trusted library allocation
page read and write
1334000
heap
page read and write
52B2000
trusted library allocation
page read and write
27316C32000
unkown
page read and write
1D1B95B6000
unkown
page read and write
A473000
trusted library allocation
page read and write
9CFD000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B95A1000
unkown
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
4C8A000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9E76000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9D00000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
3CE5000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
A615000
trusted library allocation
page read and write
92A000
unkown
page write copy
9D56000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
5860000
unkown
page readonly
A480000
trusted library allocation
page read and write
3C9B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
28910DB0000
unkown
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D0D3C17000
heap
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D6D000
trusted library allocation
page read and write
A479000
trusted library allocation
page read and write
2FBB000
trusted library allocation
page read and write
12CF000
heap
page read and write
2E09000
trusted library allocation
page read and write
1D1B95B6000
unkown
page read and write
A463000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
24675950000
remote allocation
page read and write
A463000
trusted library allocation
page read and write
4AEA000
trusted library allocation
page read and write
1DA47C51000
unkown
page read and write
53E2000
unkown
page readonly
A480000
trusted library allocation
page read and write
A81F000
trusted library allocation
page read and write
3DA8000
trusted library allocation
page read and write
941000
unkown
page readonly
9CF8000
trusted library allocation
page read and write
9CFF000
trusted library allocation
page read and write
9D50000
trusted library allocation
page read and write
A45A000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1BB65890000
heap
page read and write
9DFC000
trusted library allocation
page read and write
5472000
unkown
page readonly
1DA47B50000
heap
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
8B3D000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9F4B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
3EC1000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A933000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
3C22000
trusted library allocation
page read and write
9D60000
trusted library allocation
page read and write
1D1B958E000
unkown
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
27316C4E000
unkown
page read and write
A480000
trusted library allocation
page read and write
9FA8000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A874000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
A81F000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
52BA000
trusted library allocation
page read and write
1D1B955F000
unkown
page read and write
A480000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
E92D7FF000
stack
page read and write
27316C45000
unkown
page read and write
1D0D3C06000
heap
page read and write
9CFA000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
4BEC000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D67000
trusted library allocation
page read and write
A93B000
trusted library allocation
page read and write
9E0E000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9CF3000
trusted library allocation
page read and write
A81F000
trusted library allocation
page read and write
1D1B9580000
unkown
page read and write
A480000
trusted library allocation
page read and write
A929000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
5128000
trusted library allocation
page read and write
9CF2000
trusted library allocation
page read and write
28910D10000
heap
page read and write
A46B000
trusted library allocation
page read and write
A46D000
trusted library allocation
page read and write
A46F000
trusted library allocation
page read and write
B80000
trusted library allocation
page read and write
41BC000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
9D5A000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
24675229000
unkown
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1BB658A0000
heap
page read and write
9D59000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A474000
trusted library allocation
page read and write
9CFE000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
4DDB000
trusted library allocation
page read and write
1D0D3B80000
heap
page read and write
941000
unkown
page readonly
1C98ACF0000
heap
page read and write
410B000
trusted library allocation
page read and write
3EAB000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A908000
trusted library allocation
page read and write
4BF9000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
484E000
trusted library allocation
page read and write
A472000
trusted library allocation
page read and write
A0CD000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
14560E5F000
unkown
page read and write
9D59000
trusted library allocation
page read and write
10A4000
trusted library allocation
page read and write
A861000
trusted library allocation
page read and write
3EAA000
trusted library allocation
page read and write
3ED0000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
3CE8000
trusted library allocation
page read and write
5862000
unkown
page readonly
6785CFC000
stack
page read and write
A46B000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A817000
trusted library allocation
page read and write
4835000
trusted library allocation
page read and write
6FF4C000
unkown
page read and write
1D1B9592000
unkown
page read and write
10AD000
trusted library allocation
page execute and read and write
8B3D000
trusted library allocation
page read and write
1D1B959F000
unkown
page read and write
A45A000
trusted library allocation
page read and write
27316B50000
unkown
page read and write
3440000
heap
page read and write
3CA5000
trusted library allocation
page read and write
A80E000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
A474000
trusted library allocation
page read and write
28912930000
remote allocation
page read and write
9D57000
trusted library allocation
page read and write
41AE000
trusted library allocation
page read and write
9D68000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
1D1B8C70000
unkown
page read and write
27316C29000
unkown
page read and write
A46B000
trusted library allocation
page read and write
CD1B37E000
stack
page read and write
7AF000
heap
page read and write
3CF6000
trusted library allocation
page read and write
A92C000
trusted library allocation
page read and write
1D1B95C7000
unkown
page read and write
A46B000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
A3C9000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
1D0D3C30000
heap
page read and write
A480000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A46E000
trusted library allocation
page read and write
A46B000
trusted library allocation
page read and write
9D59000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
2E15000
trusted library allocation
page read and write
14D0000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
There are 2836 hidden memdumps, click here to show them.