IOC Report
WsiysHggF9.exe

loading gif

Files

File Path
Type
Category
Malicious
WsiysHggF9.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Installation_controller.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\audacity-win-3.2.0-64bit.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-BVVE5.tmp\audacity-win-3.2.0-64bit.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files\Audacity\Audacity.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\EffectsMenuDefaults.xml (copy)
exported SGML document, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\FLAC++.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\FLAC.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\FirstTime.ini
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\LICENSE.txt (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Languages\af\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 487 messages, Project-Id-Version: audacity 3.0.3 '"%s" bestaan nie.'
dropped
C:\Program Files\Audacity\Languages\af\is-HO62N.tmp
GNU message catalog (little endian), revision 0.0, 487 messages, Project-Id-Version: audacity 3.0.3 '"%s" bestaan nie.'
dropped
C:\Program Files\Audacity\Languages\ar\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 3170 messages, Project-Id-Version: audacity 3.0.3 '\330\247\331\204\331\205\331\204\331\201\330\247\330\252 \330\247\331\204\331\205\330\270\331\207\330\261\330\251 \331\203\331\205\331\201\331\202\331\210\330\257 \330\252\331\205 \331\206\331\202\331\204\331\207\330\247 \330\243\331\210 \330\255\330\260\331\201\330\252 \331\210 \331\204\330\247 \331\212\331\205\331\203\331\206 \331\206\330\263\330\256\331\207\330\247.'
dropped
C:\Program Files\Audacity\Languages\ar\is-T0H9J.tmp
GNU message catalog (little endian), revision 0.0, 3170 messages, Project-Id-Version: audacity 3.0.3 '\330\247\331\204\331\205\331\204\331\201\330\247\330\252 \330\247\331\204\331\205\330\270\331\207\330\261\330\251 \331\203\331\205\331\201\331\202\331\210\330\257 \330\252\331\205 \331\206\331\202\331\204\331\207\330\247 \330\243\331\210 \330\255\330\260\331\201\330\252 \331\210 \331\204\330\247 \331\212\331\205\331\203\331\206 \331\206\330\263\330\256\331\207\330\247.'
dropped
C:\Program Files\Audacity\Languages\be\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 996 messages, Project-Id-Version: audacity 3.0.3 '\320\232\320\260\320\273\321\226 \320\267\320\260\321\205\320\260\320\262\320\260\321\206\321\214, \321\203 \320\277\321\200\320\260\320\265\320\272\321\206\320\265 \320\275\320\265 \320\261\321\203\320\264\320\267\320\265'
dropped
C:\Program Files\Audacity\Languages\be\is-M4P44.tmp
GNU message catalog (little endian), revision 0.0, 996 messages, Project-Id-Version: audacity 3.0.3 '\320\232\320\260\320\273\321\226 \320\267\320\260\321\205\320\260\320\262\320\260\321\206\321\214, \321\203 \320\277\321\200\320\260\320\265\320\272\321\206\320\265 \320\275\320\265 \320\261\321\203\320\264\320\267\320\265'
dropped
C:\Program Files\Audacity\Languages\bg\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 1325 messages, Project-Id-Version: audacity 3.0.3 '\320\244\320\260\320\271\320\273\320\276\320\262\320\265\321\202\320\265, \320\277\320\276\320\272\320\260\320\267\320\260\320\275\320\270 \320\272\320\260\321\202\320\276 \342\200\236\320\273\320\270\320\277\321\201\320\262\320\260\321\211\320\270\342\200\234, \321\201\320\260 \320\277\321\200\320\265\320\274\320\265\321\201\321\202\320\265\320\275\320\270 \320\270\320\273\320\270 \320\270\320\267\321\202\321\200\320\270\321\202\320\270 \320\270 \320\275\320\265 \320'
dropped
C:\Program Files\Audacity\Languages\bg\is-3UN24.tmp
GNU message catalog (little endian), revision 0.0, 1325 messages, Project-Id-Version: audacity 3.0.3 '\320\244\320\260\320\271\320\273\320\276\320\262\320\265\321\202\320\265, \320\277\320\276\320\272\320\260\320\267\320\260\320\275\320\270 \320\272\320\260\321\202\320\276 \342\200\236\320\273\320\270\320\277\321\201\320\262\320\260\321\211\320\270\342\200\234, \321\201\320\260 \320\277\321\200\320\265\320\274\320\265\321\201\321\202\320\265\320\275\320\270 \320\270\320\273\320\270 \320\270\320\267\321\202\321\200\320\270\321\202\320\270 \320\270 \320\275\320\265 \320'
dropped
C:\Program Files\Audacity\Languages\bn\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 70 messages, Project-Id-Version: audacity 3.0.3 '%d \340\246\232\340\247\215\340\246\257\340\246\276\340\246\250\340\247\207\340\246\262'
dropped
C:\Program Files\Audacity\Languages\bn\is-TP6MB.tmp
GNU message catalog (little endian), revision 0.0, 70 messages, Project-Id-Version: audacity 3.0.3 '%d \340\246\232\340\247\215\340\246\257\340\246\276\340\246\250\340\247\207\340\246\262'
dropped
C:\Program Files\Audacity\Languages\bs\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 695 messages, Project-Id-Version: audacity 3.0.3 ' Nijemo uklju\304\215eno'
dropped
C:\Program Files\Audacity\Languages\bs\is-2VUIJ.tmp
GNU message catalog (little endian), revision 0.0, 695 messages, Project-Id-Version: audacity 3.0.3 ' Nijemo uklju\304\215eno'
dropped
C:\Program Files\Audacity\Languages\ca\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 2886 messages, Project-Id-Version: audacity 3.0.3 'Els fitxers etiquetats amb l'expressi\303\263 DESAPAREGUT han estat moguts o eliminats i no es poden copiar.'
dropped
C:\Program Files\Audacity\Languages\ca\is-6CEK5.tmp
GNU message catalog (little endian), revision 0.0, 2886 messages, Project-Id-Version: audacity 3.0.3 'Els fitxers etiquetats amb l'expressi\303\263 DESAPAREGUT han estat moguts o eliminats i no es poden copiar.'
dropped
C:\Program Files\Audacity\Languages\ca_ES@valencia\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 3382 messages, Project-Id-Version: audacity 3.0.3 'Els fitxers mostrats com DESAPAREGUTS s'han mogut o eliminat i no es poden copiar.'
dropped
C:\Program Files\Audacity\Languages\ca_ES@valencia\is-MT216.tmp
GNU message catalog (little endian), revision 0.0, 3382 messages, Project-Id-Version: audacity 3.0.3 'Els fitxers mostrats com DESAPAREGUTS s'han mogut o eliminat i no es poden copiar.'
dropped
C:\Program Files\Audacity\Languages\co\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: Audacity '\011 \303\250'
dropped
C:\Program Files\Audacity\Languages\co\is-3NQSM.tmp
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: Audacity '\011 \303\250'
dropped
C:\Program Files\Audacity\Languages\cs\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4032 messages, Project-Id-Version: audacity 3.0.3 '\011 a'
dropped
C:\Program Files\Audacity\Languages\cs\is-T6M9E.tmp
GNU message catalog (little endian), revision 0.0, 4032 messages, Project-Id-Version: audacity 3.0.3 '\011 a'
dropped
C:\Program Files\Audacity\Languages\cy\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 314 messages, Project-Id-Version: audacity 3.0.3 '%d Sianel'
dropped
C:\Program Files\Audacity\Languages\cy\is-H92PA.tmp
GNU message catalog (little endian), revision 0.0, 314 messages, Project-Id-Version: audacity 3.0.3 '%d Sianel'
dropped
C:\Program Files\Audacity\Languages\da\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: audacity 3.2.0 '\011 og'
dropped
C:\Program Files\Audacity\Languages\da\is-L5QPV.tmp
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: audacity 3.2.0 '\011 og'
dropped
C:\Program Files\Audacity\Languages\de\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: Audacity '\011 und'
dropped
C:\Program Files\Audacity\Languages\de\is-52QJJ.tmp
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: Audacity '\011 und'
dropped
C:\Program Files\Audacity\Languages\el\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4304 messages, Project-Id-Version: audacity 3.0.3 '\011 \316\272\316\261\316\271'
dropped
C:\Program Files\Audacity\Languages\el\is-4K82R.tmp
GNU message catalog (little endian), revision 0.0, 4304 messages, Project-Id-Version: audacity 3.0.3 '\011 \316\272\316\261\316\271'
dropped
C:\Program Files\Audacity\Languages\es\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: audacity 3.0.3 '\011 y'
dropped
C:\Program Files\Audacity\Languages\es\is-44RRB.tmp
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: audacity 3.0.3 '\011 y'
dropped
C:\Program Files\Audacity\Languages\eu\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 3831 messages, Project-Id-Version: audacity 3.0.3 '\011 eta'
dropped
C:\Program Files\Audacity\Languages\eu\is-BBOJ7.tmp
GNU message catalog (little endian), revision 0.0, 3831 messages, Project-Id-Version: audacity 3.0.3 '\011 eta'
dropped
C:\Program Files\Audacity\Languages\eu_ES\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4086 messages, Project-Id-Version: audacity 3.0.3 '\011 eta'
dropped
C:\Program Files\Audacity\Languages\eu_ES\is-AMHSN.tmp
GNU message catalog (little endian), revision 0.0, 4086 messages, Project-Id-Version: audacity 3.0.3 '\011 eta'
dropped
C:\Program Files\Audacity\Languages\fa\audacity.mo (copy)
GNU message catalog (little endian), revision 1.1, 567 messages, 17 sysdep messages, Project-Id-Version: audacity 3.0.3 ' \330\255\330\247\331\204\330\252 \330\250\333\214\342\200\214\330\265\330\257\330\247 \330\261\331\210\330\264\331\206'
dropped
C:\Program Files\Audacity\Languages\fa\is-FG87I.tmp
GNU message catalog (little endian), revision 1.1, 567 messages, 17 sysdep messages, Project-Id-Version: audacity 3.0.3 ' \330\255\330\247\331\204\330\252 \330\250\333\214\342\200\214\330\265\330\257\330\247 \330\261\331\210\330\264\331\206'
dropped
C:\Program Files\Audacity\Languages\fi\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4086 messages, Project-Id-Version: audacity 3.0.3 '\011 ja'
dropped
C:\Program Files\Audacity\Languages\fi\is-N6N61.tmp
GNU message catalog (little endian), revision 0.0, 4086 messages, Project-Id-Version: audacity 3.0.3 '\011 ja'
dropped
C:\Program Files\Audacity\Languages\fr\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 3974 messages, Project-Id-Version: audacity 3.0.3 '\011 et'
dropped
C:\Program Files\Audacity\Languages\fr\is-NL67K.tmp
GNU message catalog (little endian), revision 0.0, 3974 messages, Project-Id-Version: audacity 3.0.3 '\011 et'
dropped
C:\Program Files\Audacity\Languages\ga\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 2001 messages, Project-Id-Version: audacity 3.0.3 '\011 agus'
dropped
C:\Program Files\Audacity\Languages\ga\is-T5ETS.tmp
GNU message catalog (little endian), revision 0.0, 2001 messages, Project-Id-Version: audacity 3.0.3 '\011 agus'
dropped
C:\Program Files\Audacity\Languages\gl\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 1695 messages, Project-Id-Version: audacity 3.0.3 'Os ficheiros amosados como PERDIDOS foron movidos ou eliminados e non \303\251 pos\303\255bel copialos.'
dropped
C:\Program Files\Audacity\Languages\gl\is-OKLKC.tmp
GNU message catalog (little endian), revision 0.0, 1695 messages, Project-Id-Version: audacity 3.0.3 'Os ficheiros amosados como PERDIDOS foron movidos ou eliminados e non \303\251 pos\303\255bel copialos.'
dropped
C:\Program Files\Audacity\Languages\he\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 736 messages, Project-Id-Version: audacity 3.0.3 '\327\224\327\247\327\221\327\246\327\231\327\235 \327\251\327\236\327\225\327\246\327\222\327\231\327\235 \327\233\327\227\327\241\327\250\327\231\327\235 \327\224\327\225\327\242\327\221\327\250\327\225 \327\220\327\225 \327\240\327\236\327\227\327\247\327\225 \327\225\327\234\327\220 \327\240\327\231\327\252\327\240\327\231\327\235 \327\234\327\224\327\242\327\252\327\247\327\224.'
dropped
C:\Program Files\Audacity\Languages\he\is-O5794.tmp
GNU message catalog (little endian), revision 0.0, 736 messages, Project-Id-Version: audacity 3.0.3 '\327\224\327\247\327\221\327\246\327\231\327\235 \327\251\327\236\327\225\327\246\327\222\327\231\327\235 \327\233\327\227\327\241\327\250\327\231\327\235 \327\224\327\225\327\242\327\221\327\250\327\225 \327\220\327\225 \327\240\327\236\327\227\327\247\327\225 \327\225\327\234\327\220 \327\240\327\231\327\252\327\240\327\231\327\235 \327\234\327\224\327\242\327\252\327\247\327\224.'
dropped
C:\Program Files\Audacity\Languages\hi\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: Audacity '\011 \340\244\224\340\244\260'
dropped
C:\Program Files\Audacity\Languages\hi\is-SQO61.tmp
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: Audacity '\011 \340\244\224\340\244\260'
dropped
C:\Program Files\Audacity\Languages\hr\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 1395 messages, Project-Id-Version: audacity 3.0.3 'Datoteke s pridjevom NEDOSTAJE premje\305\241tene su ili izbrisane i ne mogu se kopirati.'
dropped
C:\Program Files\Audacity\Languages\hr\is-PHG0Q.tmp
GNU message catalog (little endian), revision 0.0, 1395 messages, Project-Id-Version: audacity 3.0.3 'Datoteke s pridjevom NEDOSTAJE premje\305\241tene su ili izbrisane i ne mogu se kopirati.'
dropped
C:\Program Files\Audacity\Languages\hu\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 3791 messages, Project-Id-Version: audacity 3.0.3 '\011 \303\251s'
dropped
C:\Program Files\Audacity\Languages\hu\is-LCVQ1.tmp
GNU message catalog (little endian), revision 0.0, 3791 messages, Project-Id-Version: audacity 3.0.3 '\011 \303\251s'
dropped
C:\Program Files\Audacity\Languages\hy\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 1485 messages, Project-Id-Version: audacity 3.0.3 '\325\226\325\241\325\265\325\254\325\245\326\200\325\250 \325\270\326\200\325\272\325\245\325\275 \324\262\324\261\325\221\324\261\324\277\324\261 \325\277\325\245\325\262\325\241\326\203\325\270\325\255\325\276\325\245\325\254 \325\257\325\241\325\264 \325\273\325\266\325\273\325\276\325\245\325\254 \325\245\325\266 \326\207 \325\271\325\245\325\266 \325\257\325\241\326\200\325\270\325\262 \325\272\325\241\325\277\325\263\325\245\325\266\325\276\325\245\325\254:'
dropped
C:\Program Files\Audacity\Languages\hy\is-U2HOB.tmp
GNU message catalog (little endian), revision 0.0, 1485 messages, Project-Id-Version: audacity 3.0.3 '\325\226\325\241\325\265\325\254\325\245\326\200\325\250 \325\270\326\200\325\272\325\245\325\275 \324\262\324\261\325\221\324\261\324\277\324\261 \325\277\325\245\325\262\325\241\326\203\325\270\325\255\325\276\325\245\325\254 \325\257\325\241\325\264 \325\273\325\266\325\273\325\276\325\245\325\254 \325\245\325\266 \326\207 \325\271\325\245\325\266 \325\257\325\241\326\200\325\270\325\262 \325\272\325\241\325\277\325\263\325\245\325\266\325\276\325\245\325\254:'
dropped
C:\Program Files\Audacity\Languages\id\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 1130 messages, Project-Id-Version: audacity 3.0.3 'Jika disimpan, proyek tidak akan punya trek.'
dropped
C:\Program Files\Audacity\Languages\id\is-3J2H4.tmp
GNU message catalog (little endian), revision 0.0, 1130 messages, Project-Id-Version: audacity 3.0.3 'Jika disimpan, proyek tidak akan punya trek.'
dropped
C:\Program Files\Audacity\Languages\it\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: audacity 3.0.3 '\011 e'
dropped
C:\Program Files\Audacity\Languages\it\is-E6HJ8.tmp
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: audacity 3.0.3 '\011 e'
dropped
C:\Program Files\Audacity\Languages\ja\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4113 messages, Project-Id-Version: audacity 3.0.3 '\011'
dropped
C:\Program Files\Audacity\Languages\ja\is-JQCT8.tmp
GNU message catalog (little endian), revision 0.0, 4113 messages, Project-Id-Version: audacity 3.0.3 '\011'
dropped
C:\Program Files\Audacity\Languages\ka\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 3520 messages, Project-Id-Version: audacity 3.0.3 '\011 \341\203\223\341\203\220'
dropped
C:\Program Files\Audacity\Languages\ka\is-61DBE.tmp
GNU message catalog (little endian), revision 0.0, 3520 messages, Project-Id-Version: audacity 3.0.3 '\011 \341\203\223\341\203\220'
dropped
C:\Program Files\Audacity\Languages\km\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 688 messages, Project-Id-Version: audacity 3.0.3 '\341\236\237\341\237\222\341\236\204\341\236\266\341\236\217\341\237\213'
dropped
C:\Program Files\Audacity\Languages\km\is-7REVL.tmp
GNU message catalog (little endian), revision 0.0, 688 messages, Project-Id-Version: audacity 3.0.3 '\341\236\237\341\237\222\341\236\204\341\236\266\341\236\217\341\237\213'
dropped
C:\Program Files\Audacity\Languages\ko\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4352 messages, Project-Id-Version: audacity 3.0.3 '\011 \352\267\270\353\246\254\352\263\240'
dropped
C:\Program Files\Audacity\Languages\ko\is-J5S6V.tmp
GNU message catalog (little endian), revision 0.0, 4352 messages, Project-Id-Version: audacity 3.0.3 '\011 \352\267\270\353\246\254\352\263\240'
dropped
C:\Program Files\Audacity\Languages\lt\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 1510 messages, Project-Id-Version: audacity 3.0.3 'Failas rodomas kaip MISSING buvo perkeltas arba i\305\241trintas ir negali b\305\253ti nukopijuotas.'
dropped
C:\Program Files\Audacity\Languages\lt\is-2CVMQ.tmp
GNU message catalog (little endian), revision 0.0, 1510 messages, Project-Id-Version: audacity 3.0.3 'Failas rodomas kaip MISSING buvo perkeltas arba i\305\241trintas ir negali b\305\253ti nukopijuotas.'
dropped
C:\Program Files\Audacity\Languages\mk\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 242 messages, Project-Id-Version: audacity 3.0.3 '\320\227&\320\260 Audacity...'
dropped
C:\Program Files\Audacity\Languages\mk\is-02VU6.tmp
GNU message catalog (little endian), revision 0.0, 242 messages, Project-Id-Version: audacity 3.0.3 '\320\227&\320\260 Audacity...'
dropped
C:\Program Files\Audacity\Languages\mr\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 3819 messages, Project-Id-Version: audacity 3.0.3 '\011 \340\244\206\340\244\243\340\244\277'
dropped
C:\Program Files\Audacity\Languages\mr\is-NDISD.tmp
GNU message catalog (little endian), revision 0.0, 3819 messages, Project-Id-Version: audacity 3.0.3 '\011 \340\244\206\340\244\243\340\244\277'
dropped
C:\Program Files\Audacity\Languages\my\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 1012 messages, Project-Id-Version: audacity 3.0.3 '\341\200\236\341\200\255\341\200\231\341\200\272\341\200\270\341\200\206\341\200\212\341\200\272\341\200\270\341\200\201\341\200\262\341\200\267\341\200\233\341\200\204\341\200\272\341\201\212 \341\200\205\341\200\256\341\200\231\341\200\266\341\200\201\341\200\273\341\200\200\341\200\272\341\200\231\341\200\276\341\200\254 \341\200\241\341\200\236\341\200\266\341\200\234\341\200\231\341\200\272\341\200\270\341\200\200\341\200\274\341\200\261\341\200\254 \341\200\233\341\200\276\341\200\255\341'
dropped
C:\Program Files\Audacity\Languages\my\is-PIIHM.tmp
GNU message catalog (little endian), revision 0.0, 1012 messages, Project-Id-Version: audacity 3.0.3 '\341\200\236\341\200\255\341\200\231\341\200\272\341\200\270\341\200\206\341\200\212\341\200\272\341\200\270\341\200\201\341\200\262\341\200\267\341\200\233\341\200\204\341\200\272\341\201\212 \341\200\205\341\200\256\341\200\231\341\200\266\341\200\201\341\200\273\341\200\200\341\200\272\341\200\231\341\200\276\341\200\254 \341\200\241\341\200\236\341\200\266\341\200\234\341\200\231\341\200\272\341\200\270\341\200\200\341\200\274\341\200\261\341\200\254 \341\200\233\341\200\276\341\200\255\341'
dropped
C:\Program Files\Audacity\Languages\nb\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4325 messages, Project-Id-Version: audacity 3.2 '\011 og'
dropped
C:\Program Files\Audacity\Languages\nb\is-B1TJE.tmp
GNU message catalog (little endian), revision 0.0, 4325 messages, Project-Id-Version: audacity 3.2 '\011 og'
dropped
C:\Program Files\Audacity\Languages\nl\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: audacity 3.0.3 '\011 en'
dropped
C:\Program Files\Audacity\Languages\nl\is-RTSGB.tmp
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: audacity 3.0.3 '\011 en'
dropped
C:\Program Files\Audacity\Languages\oc\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 571 messages, Project-Id-Version: audacity 3.0.3 '%d Canals'
dropped
C:\Program Files\Audacity\Languages\oc\is-FI563.tmp
GNU message catalog (little endian), revision 0.0, 571 messages, Project-Id-Version: audacity 3.0.3 '%d Canals'
dropped
C:\Program Files\Audacity\Languages\pl\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: audacity 3.2.0 '\011 i'
dropped
C:\Program Files\Audacity\Languages\pl\is-LEVD6.tmp
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: audacity 3.2.0 '\011 i'
dropped
C:\Program Files\Audacity\Languages\pt_BR\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: Audacity '\011 e'
dropped
C:\Program Files\Audacity\Languages\pt_BR\is-IMKJS.tmp
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: Audacity '\011 e'
dropped
C:\Program Files\Audacity\Languages\pt_PT\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: audacity 3.2.0 '\011 e'
dropped
C:\Program Files\Audacity\Languages\pt_PT\is-CU15K.tmp
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: audacity 3.2.0 '\011 e'
dropped
C:\Program Files\Audacity\Languages\ro\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 642 messages, Project-Id-Version: audacity 3.0.3 ' Monitorizare '
dropped
C:\Program Files\Audacity\Languages\ro\is-F0KFG.tmp
GNU message catalog (little endian), revision 0.0, 642 messages, Project-Id-Version: audacity 3.0.3 ' Monitorizare '
dropped
C:\Program Files\Audacity\Languages\ru\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4304 messages, Project-Id-Version: audacity 3.2.0 '\011 \320\270'
dropped
C:\Program Files\Audacity\Languages\ru\is-DR3N6.tmp
GNU message catalog (little endian), revision 0.0, 4304 messages, Project-Id-Version: audacity 3.2.0 '\011 \320\270'
dropped
C:\Program Files\Audacity\Languages\sk\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4036 messages, Project-Id-Version: audacity 3.0.3 '\011 a'
dropped
C:\Program Files\Audacity\Languages\sk\is-N11CT.tmp
GNU message catalog (little endian), revision 0.0, 4036 messages, Project-Id-Version: audacity 3.0.3 '\011 a'
dropped
C:\Program Files\Audacity\Languages\sl\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: audacity 3.0.3 '\011 in'
dropped
C:\Program Files\Audacity\Languages\sl\is-4TL5P.tmp
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: audacity 3.0.3 '\011 in'
dropped
C:\Program Files\Audacity\Languages\sr_RS@latin\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 1498 messages, Project-Id-Version: audacity 3.0.3 'Datoteke prikazane kao NEDOSTAJU\304\206E su preme\305\241tene ili obrisane i ne mogu biti umno\305\276ene.'
dropped
C:\Program Files\Audacity\Languages\sr_RS@latin\is-644HF.tmp
GNU message catalog (little endian), revision 0.0, 1498 messages, Project-Id-Version: audacity 3.0.3 'Datoteke prikazane kao NEDOSTAJU\304\206E su preme\305\241tene ili obrisane i ne mogu biti umno\305\276ene.'
dropped
C:\Program Files\Audacity\Languages\sr_RS\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4029 messages, Project-Id-Version: audacity 3.0.3 '\011 \320\270'
dropped
C:\Program Files\Audacity\Languages\sr_RS\is-PRSVB.tmp
GNU message catalog (little endian), revision 0.0, 4029 messages, Project-Id-Version: audacity 3.0.3 '\011 \320\270'
dropped
C:\Program Files\Audacity\Languages\sv\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: audacity 3.0.3 '\011 och'
dropped
C:\Program Files\Audacity\Languages\sv\is-BSL79.tmp
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: audacity 3.0.3 '\011 och'
dropped
C:\Program Files\Audacity\Languages\ta\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 1119 messages, Project-Id-Version: audacity 3.0.3 '\340\256\244\340\256\265\340\256\261\340\256\265\340\256\277\340\256\237\340\256\252\340\257\215\340\256\252\340\256\237\340\257\215\340\256\237\340\256\265\340\257\210 \340\256\216\340\256\251\340\256\225\340\257\215 \340\256\225\340\256\276\340\256\237\340\257\215\340\256\237\340\256\252\340\257\215\340\256\252\340\256\237\340\257\201\340\256\256\340\257\215 \340\256\225\340\257\213\340\256\252\340\257\215\340\256\252\340\257\201\340\256\225\340\256\263\340\257\215 \340\256\250\340\256\225'
dropped
C:\Program Files\Audacity\Languages\ta\is-D76SJ.tmp
GNU message catalog (little endian), revision 0.0, 1119 messages, Project-Id-Version: audacity 3.0.3 '\340\256\244\340\256\265\340\256\261\340\256\265\340\256\277\340\256\237\340\256\252\340\257\215\340\256\252\340\256\237\340\257\215\340\256\237\340\256\265\340\257\210 \340\256\216\340\256\251\340\256\225\340\257\215 \340\256\225\340\256\276\340\256\237\340\257\215\340\256\237\340\256\252\340\257\215\340\256\252\340\256\237\340\257\201\340\256\256\340\257\215 \340\256\225\340\257\213\340\256\252\340\257\215\340\256\252\340\257\201\340\256\225\340\256\263\340\257\215 \340\256\250\340\256\225'
dropped
C:\Program Files\Audacity\Languages\tg\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 629 messages, Project-Id-Version: audacity 3.0.3 '\320\221\320\265\321\201\320\260\320\264\320\276'
dropped
C:\Program Files\Audacity\Languages\tg\is-KRUGD.tmp
GNU message catalog (little endian), revision 0.0, 629 messages, Project-Id-Version: audacity 3.0.3 '\320\221\320\265\321\201\320\260\320\264\320\276'
dropped
C:\Program Files\Audacity\Languages\tr\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4339 messages, Project-Id-Version: audacity 3.0.3 '\011 ve'
dropped
C:\Program Files\Audacity\Languages\tr\is-SKP1O.tmp
GNU message catalog (little endian), revision 0.0, 4339 messages, Project-Id-Version: audacity 3.0.3 '\011 ve'
dropped
C:\Program Files\Audacity\Languages\uk\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: audacity 3.2.0 '\011 \321\226'
dropped
C:\Program Files\Audacity\Languages\uk\is-1SRVN.tmp
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: audacity 3.2.0 '\011 \321\226'
dropped
C:\Program Files\Audacity\Languages\vi\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: Audacity '\011 v\303\240'
dropped
C:\Program Files\Audacity\Languages\vi\is-DG9PQ.tmp
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: Audacity '\011 v\303\240'
dropped
C:\Program Files\Audacity\Languages\zh_CN\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 3918 messages, Project-Id-Version: audacity 3.0.3 '\011 \345\222\214'
dropped
C:\Program Files\Audacity\Languages\zh_CN\is-5KIHE.tmp
GNU message catalog (little endian), revision 0.0, 3918 messages, Project-Id-Version: audacity 3.0.3 '\011 \345\222\214'
dropped
C:\Program Files\Audacity\Languages\zh_TW\audacity.mo (copy)
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: audacity 3.0.3 '\011 \345\222\214 '
dropped
C:\Program Files\Audacity\Languages\zh_TW\is-1MOHQ.tmp
GNU message catalog (little endian), revision 0.0, 4353 messages, Project-Id-Version: audacity 3.0.3 '\011 \345\222\214 '
dropped
C:\Program Files\Audacity\Nyquist\aud-do-support.lsp (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\dspprims.lsp (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\envelopes.lsp (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\equalizer.lsp (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\evalenv.lsp (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\fileio.lsp (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\init.lsp (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-13T21.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-2UCMK.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-5GAUM.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-6R5OG.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-7K270.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-8A690.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-BNLP7.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-BQNBQ.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-CFM98.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-CGAC7.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-D9254.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-DQTC5.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-ESFAT.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-EVALG.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-G5GC0.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-HH9U2.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-IL8FC.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-L09O0.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-MMQJF.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-MROM6.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-NPI02.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-NQM3B.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-NTKH4.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-PPVH8.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-PVUQC.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-QSS2A.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-RAD77.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-RHAJM.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-UVR1R.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\is-V3FC0.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\misc.lsp (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\nyinit-dbg.lsp (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\nyinit.lsp (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\nyqmisc.lsp (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\nyquist-plot.txt (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\nyquist.lsp (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\printrec.lsp (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\profile.lsp (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\is-05MM5.tmp
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\is-20JHV.tmp
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\is-3463Q.tmp
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\is-3DJRE.tmp
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\is-4EKK3.tmp
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\is-5EL2U.tmp
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\is-727SG.tmp
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\is-C2JTA.tmp
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\is-E3H07.tmp
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\is-E4TOU.tmp
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\is-HJCIF.tmp
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\is-O6A7U.tmp
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\is-P0K9Q.tmp
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\is-P38RE.tmp
raw G3 (Group 3) FAX
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\is-RT5IA.tmp
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\mand1.raw (copy)
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\mand10.raw (copy)
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\mand11.raw (copy)
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\mand12.raw (copy)
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\mand2.raw (copy)
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\mand3.raw (copy)
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\mand4.raw (copy)
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\mand5.raw (copy)
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\mand6.raw (copy)
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\mand7.raw (copy)
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\mand8.raw (copy)
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\mand9.raw (copy)
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\mandpluk.raw (copy)
data
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\marmstk1.raw (copy)
raw G3 (Group 3) FAX
dropped
C:\Program Files\Audacity\Nyquist\rawwaves\sinewave.raw (copy)
data
dropped
C:\Program Files\Audacity\Nyquist\sal-parse.lsp (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\sal.lsp (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\seq.lsp (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\seqfnint.lsp (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\seqmidi.lsp (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\sliders.lsp (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\sndfnint.lsp (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\spec-plot.lsp (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\spectral-analysis.lsp (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\stk.lsp (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\system.lsp (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\test.lsp (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\velocity.lsp (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\xlinit.lsp (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Nyquist\xm.lsp (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\SpectralEditMulti.ny (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\SpectralEditParametricEQ.ny (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\SpectralEditShelves.ny (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\StudioFadeOut.ny (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\adjustable-fade.ny (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\beat.ny (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\clipfix.ny (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\crossfadeclips.ny (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\crossfadetracks.ny (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\delay.ny (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\eq-xml-to-txt-converter.ny (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\equalabel.ny (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\highpass.ny (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-02MKN.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-06UFT.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-11997.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-591EJ.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-6KU03.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-6QFDO.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-77BQK.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-853A0.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-BD9F7.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-BRLM5.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-C5P2B.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-EJHHE.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-G1KMP.tmp
Lisp/Scheme program, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-II6NQ.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-KU5LN.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-LHPLL.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-LKBSE.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-LRPH6.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-MD7TV.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-MQUPM.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-NO5SG.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-ODRMT.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-P00HI.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-P1C46.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-QVTJ7.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-SO3LD.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-SP0OV.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-TBL3M.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\is-V3UUL.tmp
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\label-sounds.ny (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\limiter.ny (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\lowpass.ny (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\noisegate.ny (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\notch.ny (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\nyquist-plug-in-installer.ny (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\pluck.ny (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\rhythmtrack.ny (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\rissetdrum.ny (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\rms.ny (copy)
Lisp/Scheme program, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\sample-data-export.ny (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\sample-data-import.ny (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\spectral-delete.ny (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\tremolo.ny (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\vocalrediso.ny (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\Plug-Ins\vocoder.ny (copy)
Lisp/Scheme program, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\README.txt (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\concrt140.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\crashreporter.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-0KP7K.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-0UADG.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\is-0UDPU.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-19I02.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-1J0J3.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-2SCU5.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-32N1E.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-37ABV.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-3RF3V.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-4STCS.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-5AL5G.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-5BTDL.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-5LJ3G.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-5OMUN.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-6C785.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-6S7SN.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-7A0A0.tmp
exported SGML document, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\is-7BF1G.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-7F1IJ.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-7HBD3.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-7U34J.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-8JNDO.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-8SGGQ.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-9JHT8.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-9K9M7.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-9T84T.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\is-AG00V.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-CV5R1.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-DBS3U.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-DEMF3.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-E63DL.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-EE795.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-EGO60.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-EPTFT.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-GAK9A.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-GCDE1.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-H8I8G.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-HKD6O.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-HKQ8J.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-IOAI2.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-IU3MP.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-J5UM8.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-JALHN.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-JO5BM.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-K3IU2.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-K8GOH.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-KJ41F.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-KRBQ3.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-KRBVG.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-L050V.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-L0CK2.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-LAIB1.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-MVD1T.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-NKFUD.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-NL931.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\Audacity\is-NOB4R.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-NTE5N.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-OF8N5.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-P90KL.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Audacity\is-R9F1C.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-SO45U.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-TDP90.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-U641C.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-UFU1R.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-UJ3RS.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-UR1D7.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-V5T2O.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-VGNVB.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\is-VMF33.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-audio-devices.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-audio-graph.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-basic-ui.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-cloud-audiocom.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-cloud-upload.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-components.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-exceptions.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-ffmpeg-support.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-files.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-graphics.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-ipc.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-math.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-module-manager.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-network-manager.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-preferences.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-project-history.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-project-rate.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-project.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-registries.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-sample-track.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-screen-geometry.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-sentry-reporting.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-string-utils.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-strings.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-theme-resources.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-theme.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-track.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-transactions.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-url-schemes.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-utility.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-uuid.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\lib-xml.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\libcurl.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\libexpat.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\mod-script-pipe.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\modules\is-JOTP7.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\modules\mod-script-pipe.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\mpg123.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\msvcp140.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\msvcp140_1.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\msvcp140_2.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\msvcp140_atomic_wait.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\msvcp140_codecvt_ids.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\ogg.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\opus.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\portaudio_x64.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\portmidi.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\sndfile.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\unins000.dat
InnoSetup Log 64-bit Audacity, version 0x418, 34133 bytes, 468325\37\user\, C:\Program Files\Audacity\376\377\377\007
modified
C:\Program Files\Audacity\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\Audacity\unins000.msg
InnoSetup messages, version 6.0.0, 261 messages (UTF-16), Cancel installation
dropped
C:\Program Files\Audacity\vcruntime140.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\vcruntime140_1.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\vorbis.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\vorbisenc.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\vorbisfile.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\wavpackdll.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\wxbase313u_vc_x64_custom.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\wxbase313u_xml_vc_x64_custom.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\wxmsw313u_aui_vc_x64_custom.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\wxmsw313u_core_vc_x64_custom.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\wxmsw313u_html_vc_x64_custom.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\wxmsw313u_qa_vc_x64_custom.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Audacity\zlib1.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Audacity.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Mon Oct 3 23:32:00 2022, mtime=Mon Oct 3 23:32:01 2022, atime=Thu Sep 22 22:55:12 2022, length=18346984, window=hide
dropped
C:\Users\Public\Desktop\Audacity.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Mon Oct 3 23:32:00 2022, mtime=Mon Oct 3 23:32:01 2022, atime=Thu Sep 22 22:55:12 2022, length=18346984, window=hide
dropped
C:\Users\user\AppData\Local\Temp\is-GK43T.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
There are 401 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\WsiysHggF9.exe
C:\Users\user\Desktop\WsiysHggF9.exe
malicious
C:\ProgramData\Installation_controller.exe
"C:\ProgramData\Installation_controller.exe"
malicious
C:\ProgramData\audacity-win-3.2.0-64bit.exe
"C:\ProgramData\audacity-win-3.2.0-64bit.exe"
malicious
C:\Users\user\AppData\Local\Temp\is-BVVE5.tmp\audacity-win-3.2.0-64bit.tmp
"C:\Users\user\AppData\Local\Temp\is-BVVE5.tmp\audacity-win-3.2.0-64bit.tmp" /SL5="$5040E,13178964,955904,C:\ProgramData\audacity-win-3.2.0-64bit.exe"
malicious
C:\Users\user\AppData\Local\Temp\is-GK43T.tmp\_isetup\_setup64.tmp
helper 105 0x420
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Audacity\Audacity.exe
C:\Program Files\Audacity\audacity.exe

URLs

Name
IP
Malicious
http://xmlns.com/foaf/0.1/name
unknown
http://lv2plug.in/ns/lv2core#project
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://lv2plug.in/ns/ext/presets#
unknown
http://lv2plug.in/ns/ext/state#makePath
unknown
http://lv2plug.in/ns/ext/log#Note
unknown
http://lame.sourceforge.net/
unknown
http://lv2plug.in/ns/lv2core#portProperty
unknown
http://lv2plug.in/ns/lv2core#requiredFeature
unknown
https://manual.audacityteam.org/quick_help.htmlQ
unknown
https://www.cs.cmu.edu/~music/nyquist/
unknown
http://lv2plug.in/ns/extensions/ui#noUserResize
unknown
http://lv2plug.in/ns/extensions/ui#X11UI
unknown
http://www.portmedia.sourceforge.net/portmidi/
unknown
https://www.remobjects.com/ps
unknown
http://lv2plug.in/ns/ext/atom#Chunk
unknown
https://wiki.audacityteam.org/wiki/EQCurvesDownloadEQBackup.xml
unknown
http://audacity.sourceforge.net/xml/xmlnsDELETE
unknown
http://lv2plug.in/ns/ext/atom#Sequence
unknown
https://plugins.audacityteam.org/No
unknown
https://www.innosetup.com/
unknown
http://lv2plug.in/ns/lv2core#InstrumentPlugin
unknown
https://audio.com
unknown
http://lv2plug.in/ns/ext/atom#Double
unknown
http://lv2plug.in/ns/ext/log#Warning
unknown
http://lv2plug.in/ns/extensions/ui#portMaphttp://lv2plug.in/ns/extensions/ui#portSubscribehttp://lv2
unknown
http://lv2plug.in/ns/ext/atom#AtomPort
unknown
http://lv2plug.in/ns/ext/port-props#notOnGUI
unknown
http://forum.audacityteam.org/
unknown
http://lv2plug.in/ns/lv2core#maximum
unknown
http://lv2plug.in/ns/ext/atom#Property
unknown
https://www.surina.net/soundtouch/
unknown
http://xmlns.com/foaf/0.1/homepage
unknown
http://lv2plug.in/ns/lv2core#projecthttp://usefulinc.com/ns/doap#maintainerhttp://xmlns.com/foaf/0.1
unknown
http://lv2plug.in/ns/ext/dynmanifest#DynManifest
unknown
http://lv2plug.in/ns/extensions/ui#external
unknown
http://manual.audacityteam.org/o/man/faq_about_audacity.html#free
unknown
https://manual.audacityteam.org/man/unzipping_the_manual.html
unknown
http://lv2plug.in/ns/extensions/ui#GtkUI
unknown
https://audio.comaudio.com%%&Unlink
unknown
http://lame.sf.net32bits64bits
unknown
http://lv2plug.in/ns/ext/options#optionsLV2InstanceFeaturesList::CheckOptionsD:
unknown
https://github.com/audacity/audacity/pulls
unknown
http://lv2plug.in/ns/ext/atom#URID
unknown
http://lv2plug.in/ns/ext/state#mapPathhttp://lv2plug.in/ns/ext/state#makePathlilv_state_new_from_ins
unknown
http://lv2plug.in/ns/ext/atom#Int
unknown
http://lv2plug.in/ns/ext/parameters#sampleRate
unknown
http://lv2plug.in/ns/extensions/ui#Qt4UI
unknown
http://lv2plug.in/ns/ext/atom#String
unknown
http://lv2plug.in/ns/ext/buf-size#fixedBlockLength
unknown
http://lv2plug.in/ns/ext/port-props#notAutomatic
unknown
http://www.twolame.org/
unknown
https://manual.audacityteam.org/man/faq_opening_and_saving_files.html#fromcd
unknown
http://lv2plug.in/ns/lv2core#sampleRate
unknown
http://www.haysoft.org%1-k
unknown
http://lv2plug.in/ns/lv2core#port
unknown
http://lv2plug.in/ns/ext/atom#Long
unknown
http://lv2plug.in/ns/ext/buf-size#minBlockLength
unknown
http://lv2plug.in/ns/ext/time#speed
unknown
http://lv2plug.in/ns/lv2core#scalePoint
unknown
https://manual.audacityteam.org/quick_help.html
unknown
http://lv2plug.in/ns/ext/instance-access
unknown
http://lv2plug.in/ns/lv2core#name
unknown
http://lv2plug.in/ns/ext/port-groups#group
unknown
http://lv2plug.in/ns/ext/event#supportsEventlilv_port_get_valuelilv_port_get_name%s():
unknown
https://www.audacityteam.org/about/desktop-privacy-notice/our
unknown
http://lv2plug.in/ns/ext/worker#schedule
unknown
http://lv2plug.in/ns/ext/atom#Blankhttp://lv2plug.in/ns/ext/atom#Boolhttp://lv2plug.in/ns/ext/atom#C
unknown
http://xmlns.com/foaf/0.1/
unknown
http://kxstudio.sf.net/ns/lv2ext/external-ui#Host
unknown
http://lv2plug.in/ns/lv2core#AudioPort
unknown
https://www.audacityteam.org/wiki/index.php?title=file:
unknown
http://lv2plug.in/ns/ext/event#supportsEvent
unknown
http://ocsp.sectigo.com0
unknown
http://ll-plugins.nongnu.org/lv2/namespace#MathFunctionPlugin
unknown
http://lv2plug.in/ns/ext/log#log
unknown
https://github.com/audacity/audacity/releases
unknown
http://lv2plug.in/ns/lv2core#OutputPort
unknown
http://lv2plug.in/ns/extensions/ui#noUserResizehttp://lv2plug.in/ns/extensions/ui#fixedSizehttp://lv
unknown
http://lv2plug.in/ns/extensions/ui#touch
unknown
http://lv2plug.in/ns/lv2core#symbol
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://kxstudio.sf.net/ns/lv2ext/external-ui#Widget
unknown
http://lv2plug.in/ns/ext/port-props#causesArtifacts
unknown
https://www.audacityteam.orgDon
unknown
http://lv2plug.in/ns/ext/port-props#rangeSteps
unknown
http://lv2plug.in/ns/ext/time#Position
unknown
http://www.gnu.org/licenses/licenses.html
unknown
http://lv2plug.in/ns/lv2core#enumeration
unknown
http://lv2plug.in/ns/extensions/ui#portMap
unknown
http://lv2plug.in/ns/ext/atom#childType%2XFailed
unknown
http://lv2plug.in/ns/ext/port-props#trigger
unknown
http://lv2plug.in/ns/lv2core#prototype
unknown
http://lv2plug.in/ns/ext/atom#childType
unknown
https://forum.audacityteam.org/viewforum.php?f=19
unknown
http://lv2plug.in/ns/extensions/ui#Gtk3UI
unknown
https://audacityteam.org/errorshereWould
unknown
https://plugins.audacityteam.org/
unknown
https://forum.audacityteam.org/.
unknown
http://audacityteam.org/about/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
updates.audacityteam.org
172.67.74.133

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.AUP
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.AUP3
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Audacity.Project
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Audacity.Project\shell
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Audacity.Project\shell\open\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audacity_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audacity_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audacity_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audacity_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audacity_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audacity_is1
Inno Setup: Selected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audacity_is1
Inno Setup: Deselected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audacity_is1
Inno Setup: Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audacity_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audacity_is1
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audacity_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audacity_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audacity_is1
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audacity_is1
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audacity_is1
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audacity_is1
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audacity_is1
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audacity_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audacity_is1
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audacity_is1
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audacity_is1
MajorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audacity_is1
MinorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audacity_is1
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audacity_is1
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audacity_is1
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
There are 26 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
44850000
trusted library allocation
page read and write
A55127F000
stack
page read and write
46E70000
trusted library allocation
page read and write
1241C5B0000
unkown
page read and write
44A70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
8ED547D000
stack
page read and write
1241D5B0000
unkown
page read and write
8ED4F7E000
stack
page read and write
446D0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44660000
trusted library allocation
page read and write
1241C880000
unkown
page read and write
44AA0000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
2256000
direct allocation
page read and write
7FFCFF068000
unkown
page readonly
2EF2000
stack
page read and write
3FA84000
heap
page read and write
22BF1C8B000
heap
page read and write
86D6000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
241000
unkown
page execute read
1241A400000
unkown
page readonly
3237000
heap
page read and write
44AA0000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
1E2CD500000
heap
page read and write
92A2000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44850000
trusted library allocation
page read and write
1241CB80000
unkown
page read and write
7FFCFF40B000
unkown
page read and write
44A90000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
46E40000
trusted library allocation
page read and write
20B83620000
heap
page read and write
1E2CD320000
heap
page read and write
44A70000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
7FFCFF1B1000
unkown
page execute read
3FA84000
heap
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
1241C510000
unkown
page read and write
7FFCFF3AD000
unkown
page readonly
3FA84000
heap
page read and write
32A1000
heap
page read and write
46E60000
trusted library allocation
page read and write
1241A130000
unkown
page readonly
44A70000
trusted library allocation
page read and write
7FFCFF2DD000
unkown
page readonly
7FFCFF190000
unkown
page readonly
46E40000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E60000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
2055A680000
heap
page read and write
2AD0000
heap
page read and write
1241CA8C000
unkown
page read and write
46E60000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
7FFCFF065000
unkown
page readonly
46E70000
trusted library allocation
page read and write
7FF60E4FA000
unkown
page readonly
44AA0000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
1241C760000
unkown
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
44850000
trusted library allocation
page read and write
44650000
trusted library allocation
page read and write
401000
unkown
page execute read
44A70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44A70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
1241C640000
unkown
page read and write
3FC50000
heap
page read and write
46E60000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
83150AB000
stack
page read and write
44A70000
trusted library allocation
page read and write
44760000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
9340000
trusted library allocation
page read and write
1241C6C0000
unkown
page read and write
4B7000
unkown
page read and write
1241D740000
unkown
page read and write
44850000
trusted library allocation
page read and write
22BF1AA0000
heap
page read and write
7FFCFEEB0000
unkown
page readonly
1241C860000
unkown
page read and write
7FFCFEF11000
unkown
page readonly
44810000
trusted library allocation
page read and write
1241D6F0000
unkown
page read and write
44660000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
419A9000
trusted library allocation
page read and write
52DC000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
44700000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
22BF1D13000
heap
page read and write
419A0000
trusted library allocation
page read and write
44690000
trusted library allocation
page read and write
3FA84000
heap
page read and write
8CDD47B000
stack
page read and write
23E7687A000
heap
page read and write
1241C670000
unkown
page read and write
7FFCFF029000
unkown
page readonly
419A0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
1241C560000
unkown
page read and write
46E70000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
46E50000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
46E30000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
7FFCFEFB6000
unkown
page readonly
26DB000
direct allocation
page read and write
46E70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
28E3000
heap
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
3FCA7000
heap
page read and write
44A80000
trusted library allocation
page read and write
493537B000
stack
page read and write
44750000
trusted library allocation
page read and write
1241A1B0000
unkown
page readonly
44A90000
trusted library allocation
page read and write
7FFCFEFC0000
unkown
page readonly
4C4000
unkown
page readonly
93A2000
trusted library allocation
page read and write
3FA84000
heap
page read and write
22BF1D00000
heap
page read and write
2EEA000
stack
page read and write
44930000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
1241A1A0000
unkown
page readonly
46E70000
trusted library allocation
page read and write
35D0000
trusted library allocation
page read and write
1241C700000
unkown
page read and write
44A70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FCB5000
heap
page read and write
23E77002000
trusted library allocation
page read and write
3FA84000
heap
page read and write
7FF60D4D4000
unkown
page execute read
44A70000
trusted library allocation
page read and write
3FCAD000
heap
page read and write
272000
unkown
page readonly
44990000
trusted library allocation
page read and write
327E000
heap
page read and write
3FA84000
heap
page read and write
3FCA7000
heap
page read and write
7FF60E3D0000
unkown
page read and write
46E70000
trusted library allocation
page read and write
198000
stack
page read and write
7FFCFF00F000
unkown
page readonly
1241A051000
heap
page read and write
44850000
trusted library allocation
page read and write
7FFCFF34B000
unkown
page execute read
44A70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
9C0000
heap
page read and write
44AA0000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44A70000
trusted library allocation
page read and write
7FFCFF249000
unkown
page readonly
46E70000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
448C0000
trusted library allocation
page read and write
7FFCFF401000
unkown
page execute read
44A90000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
2055A7E0000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
44660000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
7FFCFF009000
unkown
page readonly
34DE000
stack
page read and write
1241C4E0000
unkown
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
1241CCE0000
unkown
page read and write
46E70000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
1241CD70000
unkown
page read and write
1241C570000
unkown
page read and write
3FA84000
heap
page read and write
46E40000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
7FFCFF0C0000
unkown
page readonly
3FA84000
heap
page read and write
1E2CD402000
heap
page read and write
3FA84000
heap
page read and write
23E7687B000
heap
page read and write
44850000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
7FFCFEF52000
unkown
page readonly
419A0000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
1241C6F0000
unkown
page read and write
46E70000
trusted library allocation
page read and write
44650000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FCA7000
heap
page read and write
44AA0000
trusted library allocation
page read and write
1241EEA0000
unkown
page read and write
1241CD40000
unkown
page read and write
3FA84000
heap
page read and write
324D000
heap
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
195000
stack
page read and write
1241C360000
unkown
page read and write
44850000
trusted library allocation
page read and write
8315D7F000
stack
page read and write
9211000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
7FE65000
direct allocation
page read and write
46E70000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E90000
trusted library allocation
page read and write
72D6000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
46E50000
trusted library allocation
page read and write
12419E70000
unkown
page readonly
3FA84000
heap
page read and write
7FFCFEEB9000
unkown
page readonly
44A70000
trusted library allocation
page read and write
2055A829000
heap
page read and write
44AA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44850000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
1241C3A0000
unkown
page read and write
20B8383D000
heap
page read and write
8ED4E7F000
stack
page read and write
23E76860000
heap
page read and write
3FCB4000
heap
page read and write
329F000
heap
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
7FFCFF0AF000
unkown
page readonly
9211000
trusted library allocation
page read and write
3FC3A000
heap
page read and write
44AA0000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
CACE6FF000
stack
page read and write
419A0000
trusted library allocation
page read and write
7FF60E608000
unkown
page readonly
7FFCFF406000
unkown
page execute read
46E40000
trusted library allocation
page read and write
372B000
direct allocation
page read and write
46E60000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
3FA84000
heap
page read and write
1241DA32000
unkown
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
1241A0D0000
unkown
page readonly
44A70000
trusted library allocation
page read and write
1241A230000
unkown
page readonly
446A0000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
1241C3C0000
unkown
page read and write
1E2CD45B000
heap
page read and write
44A80000
trusted library allocation
page read and write
29FBEC000
stack
page read and write
46E50000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44850000
trusted library allocation
page read and write
2ED0000
stack
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
A7E000
heap
page read and write
2EFA000
stack
page read and write
44AA0000
trusted library allocation
page read and write
1241C580000
unkown
page read and write
44640000
trusted library allocation
page read and write
321B000
heap
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
23E7688C000
heap
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
2251000
unkown
page execute read
44A70000
trusted library allocation
page read and write
448F0000
trusted library allocation
page read and write
1241CE30000
unkown
page readonly
A64000
heap
page read and write
2055A800000
heap
page read and write
44AA0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
1241D4D0000
unkown
page read and write
23E76866000
heap
page read and write
46E70000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
7FF60DF90000
unkown
page readonly
3FA84000
heap
page read and write
44A70000
trusted library allocation
page read and write
7FFCFEF69000
unkown
page readonly
46E90000
trusted library allocation
page read and write
140001000
unkown
page execute read
46E90000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
46E60000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
A550E7D000
stack
page read and write
1E2CD3E0000
trusted library allocation
page read and write
3FCB6000
heap
page read and write
3FC3E000
heap
page read and write
2A2000
unkown
page readonly
1241EE80000
unkown
page read and write
46E70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
20B838CD000
heap
page read and write
3FA84000
heap
page read and write
46E40000
trusted library allocation
page read and write
1241A7A0000
unkown
page readonly
46E70000
trusted library allocation
page read and write
20B83800000
heap
page read and write
46E70000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
1241BC00000
unkown
page read and write
46E90000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
1E2CD400000
heap
page read and write
46E70000
trusted library allocation
page read and write
1241CD60000
unkown
page read and write
44690000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
1241A3A0000
unkown
page readonly
44A90000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
44830000
trusted library allocation
page read and write
2EE3000
stack
page read and write
1241C720000
unkown
page read and write
7FFCFF3A2000
unkown
page execute read
46ED0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44850000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
7FF60E079000
unkown
page readonly
3FA84000
heap
page read and write
3FA84000
heap
page read and write
44850000
trusted library allocation
page read and write
7FFCFF36B000
unkown
page read and write
7FFCFF7A6000
unkown
page readonly
44A90000
trusted library allocation
page read and write
7FFCFEE21000
unkown
page execute read
1241C530000
unkown
page read and write
3FC3E000
heap
page read and write
1241D08B000
unkown
page read and write
3FA84000
heap
page read and write
547D000
stack
page read and write
3FCB5000
heap
page read and write
46E70000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
4E2000
unkown
page readonly
4934D0C000
stack
page read and write
44645000
trusted library allocation
page read and write
23E76847000
heap
page read and write
46E60000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
3FCA7000
heap
page read and write
1241A066000
heap
page read and write
3FA84000
heap
page read and write
44850000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
1241CD00000
unkown
page read and write
46EBF000
trusted library allocation
page read and write
7FF60E5CB000
unkown
page readonly
3FA84000
heap
page read and write
44850000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
9F6000
heap
page read and write
44AA0000
trusted library allocation
page read and write
1241C94E000
unkown
page read and write
46E70000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
2B37000
stack
page read and write
44A90000
trusted library allocation
page read and write
16EDE813000
heap
page read and write
1241EE50000
unkown
page read and write
1241C630000
unkown
page read and write
44640000
trusted library allocation
page read and write
1241C8D0000
unkown
page read and write
1241CC60000
unkown
page read and write
7FF60E34D000
unkown
page readonly
44AA0000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
1241CC90000
unkown
page read and write
1241CD30000
unkown
page read and write
1241C7D0000
unkown
page read and write
1241CDF0000
unkown
page read and write
44640000
trusted library allocation
page read and write
20B83823000
heap
page read and write
22BF35B0000
trusted library allocation
page read and write
A25000
heap
page read and write
44A70000
trusted library allocation
page read and write
7FFCFEFEF000
unkown
page readonly
44AA0000
trusted library allocation
page read and write
23E76858000
heap
page read and write
7FFCFEF4A000
unkown
page readonly
7FFCFF420000
unkown
page readonly
44850000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
1E2CD502000
heap
page read and write
44850000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
3FCA7000
heap
page read and write
2EC6000
stack
page read and write
3FA84000
heap
page read and write
1241F853000
unkown
page read and write
46E90000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
46E50000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
1241D5C0000
unkown
page read and write
7FF60E3B0000
unkown
page read and write
44A70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
1241A250000
unkown
page readonly
1241F747000
unkown
page read and write
831577E000
stack
page read and write
3540000
trusted library allocation
page read and write
A31000
heap
page read and write
1241C8F0000
unkown
page read and write
72FF000
stack
page read and write
3FA84000
heap
page read and write
46E30000
trusted library allocation
page read and write
7FFCFF0A0000
unkown
page readonly
7FFCFF260000
unkown
page readonly
224F000
direct allocation
page read and write
3FA84000
heap
page read and write
44850000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44990000
trusted library allocation
page read and write
7FFCFF004000
unkown
page readonly
44A90000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44660000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
44850000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
7FFCFF13A000
unkown
page execute read
44850000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
A550B7F000
stack
page read and write
44A70000
trusted library allocation
page read and write
2731000
direct allocation
page read and write
44AA0000
trusted library allocation
page read and write
E96000
heap
page read and write
44850000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
446A0000
trusted library allocation
page read and write
44650000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
2756000
direct allocation
page read and write
419A5000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
2264000
direct allocation
page read and write
5C8000
heap
page read and write
46E90000
trusted library allocation
page read and write
8ED527C000
stack
page read and write
3FA84000
heap
page read and write
1241D710000
unkown
page read and write
243A4A29000
heap
page read and write
3FA84000
heap
page read and write
46E40000
trusted library allocation
page read and write
3FCB5000
heap
page read and write
46E70000
trusted library allocation
page read and write
46ECA000
trusted library allocation
page read and write
3FA84000
heap
page read and write
1241C9F4000
unkown
page read and write
1241F910000
unkown
page read and write
46E40000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46EB0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
1241C280000
unkown
page read and write
46E40000
trusted library allocation
page read and write
19C000
stack
page read and write
44850000
trusted library allocation
page read and write
1241D780000
unkown
page read and write
9304000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44A80000
trusted library allocation
page read and write
243A4A3D000
heap
page read and write
46E70000
trusted library allocation
page read and write
7FF60E44F000
unkown
page read and write
44850000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
400000
unkown
page readonly
44A70000
trusted library allocation
page read and write
1241C4D0000
unkown
page read and write
3C20000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
1241CDB0000
unkown
page read and write
46E60000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
46E60000
trusted library allocation
page read and write
321B000
heap
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
448D0000
trusted library allocation
page read and write
44650000
trusted library allocation
page read and write
1241A3F0000
unkown
page readonly
44AA0000
trusted library allocation
page read and write
A81000
heap
page read and write
3FA84000
heap
page read and write
7FFCFF440000
unkown
page readonly
8CDD67B000
stack
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
2880000
direct allocation
page read and write
44850000
trusted library allocation
page read and write
3FA84000
heap
page read and write
400000
unkown
page readonly
1241C850000
unkown
page read and write
446A0000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
3204000
heap
page read and write
22BF1C48000
heap
page read and write
1241C520000
unkown
page read and write
46E40000
trusted library allocation
page read and write
1241CC20000
unkown
page read and write
7FFCFF17E000
unkown
page readonly
43F81000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FC3A000
heap
page read and write
3FA84000
heap
page read and write
1241A350000
unkown
page readonly
46E70000
trusted library allocation
page read and write
897000
heap
page read and write
7FFCFF758000
unkown
page readonly
44AA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
1241A0E0000
unkown
page readonly
46E90000
trusted library allocation
page read and write
1241C5C0000
unkown
page read and write
46E70000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
46E50000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
3FCB5000
heap
page read and write
7FF60E3C2000
unkown
page read and write
3FA84000
heap
page read and write
9271000
trusted library allocation
page read and write
30FE000
stack
page read and write
3FA84000
heap
page read and write
44640000
trusted library allocation
page read and write
20B83902000
heap
page read and write
44850000
trusted library allocation
page read and write
2870000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
46E50000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
44990000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
3FCB6000
heap
page read and write
23E76870000
heap
page read and write
1241A150000
unkown
page readonly
46E60000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
2238000
direct allocation
page read and write
46E70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
1241CC80000
unkown
page read and write
22BF3C00000
remote allocation
page read and write
46E30000
trusted library allocation
page read and write
7FFCFEFFE000
unkown
page readonly
7FF60DB68000
unkown
page execute read
46E50000
trusted library allocation
page read and write
3FCB3000
heap
page read and write
44850000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
227A000
direct allocation
page read and write
84E000
stack
page read and write
22BF1C9C000
heap
page read and write
1241A2D0000
unkown
page readonly
3FA84000
heap
page read and write
7FF60D430000
unkown
page readonly
16EDE7C0000
trusted library allocation
page read and write
7FFCFF2E0000
unkown
page readonly
44A70000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
243A4A00000
heap
page read and write
44990000
trusted library allocation
page read and write
9B000
stack
page read and write
44850000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
4B9000
unkown
page read and write
3FA84000
heap
page read and write
44A90000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
7FFCFF250000
unkown
page read and write
3FA84000
heap
page read and write
1241C790000
unkown
page read and write
2723000
direct allocation
page read and write
46EA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
23E76869000
heap
page read and write
6DF000
unkown
page readonly
3FCB3000
heap
page read and write
46E60000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
493547B000
stack
page read and write
2FF0000
heap
page read and write
1241A380000
unkown
page readonly
44850000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
1241D760000
unkown
page read and write
1241A190000
unkown
page readonly
1241BBE0000
unkown
page readonly
44AA0000
trusted library allocation
page read and write
1241CB70000
unkown
page read and write
8315A7D000
stack
page read and write
44A70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
225D000
direct allocation
page read and write
197000
stack
page read and write
23E76827000
heap
page read and write
7FFCFF182000
unkown
page readonly
44640000
trusted library allocation
page read and write
20B838BE000
heap
page read and write
44850000
trusted library allocation
page read and write
2714000
direct allocation
page read and write
44AA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44A70000
trusted library allocation
page read and write
7FFCFF007000
unkown
page readonly
44A80000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
7FFCFF0C1000
unkown
page execute read
3FA84000
heap
page read and write
1241C2B0000
unkown
page read and write
3FA84000
heap
page read and write
44850000
trusted library allocation
page read and write
1241C380000
unkown
page read and write
44AA0000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
A16000
heap
page read and write
2C2000
unkown
page readonly
44AA0000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
7FFCFF0B2000
unkown
page readonly
46E70000
trusted library allocation
page read and write
1241A3D0000
unkown
page readonly
7FFCFF171000
unkown
page execute read
8ED4CFF000
stack
page read and write
46E90000
trusted library allocation
page read and write
1241C440000
unkown
page read and write
44690000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
327E000
heap
page read and write
3FA84000
heap
page read and write
1241C3D0000
unkown
page read and write
44A90000
trusted library allocation
page read and write
320E000
heap
page read and write
3FA84000
heap
page read and write
419A0000
trusted library allocation
page read and write
1241C8A0000
unkown
page read and write
44AA0000
trusted library allocation
page read and write
7FFCFEEA4000
unkown
page readonly
46E70000
trusted library allocation
page read and write
25AA000
direct allocation
page read and write
573D000
stack
page read and write
46E70000
trusted library allocation
page read and write
7FFCFF067000
unkown
page read and write
46E70000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
2ECC000
stack
page read and write
3FC44000
heap
page read and write
44640000
trusted library allocation
page read and write
2055AFB0000
remote allocation
page read and write
7FF60DFE2000
unkown
page readonly
44AA0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
46E40000
trusted library allocation
page read and write
7FFCFF441000
unkown
page execute read
44AA0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
7FFCFEEB7000
unkown
page execute read
94000
stack
page read and write
3FCA7000
heap
page read and write
1241C2D0000
unkown
page read and write
1241C420000
unkown
page read and write
44850000
trusted library allocation
page read and write
4D2000
unkown
page readonly
7FFCFF369000
unkown
page read and write
7FF60E567000
unkown
page readonly
44850000
trusted library allocation
page read and write
7FFCFEF44000
unkown
page readonly
1241C770000
unkown
page read and write
9FE000
heap
page read and write
46E70000
trusted library allocation
page read and write
3FCA7000
heap
page read and write
44850000
trusted library allocation
page read and write
1E2CD465000
heap
page read and write
46E90000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
1241CB50000
unkown
page read and write
1241EE40000
unkown
page read and write
44A90000
trusted library allocation
page read and write
44650000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
1241DA57000
unkown
page read and write
1241F777000
unkown
page read and write
7FFCFF1D6000
unkown
page execute read
44A70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
3FCB5000
heap
page read and write
3FA84000
heap
page read and write
46E90000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
44A90000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
7FFCFF421000
unkown
page execute read
32A0000
heap
page read and write
240000
unkown
page readonly
3FCB3000
heap
page read and write
7FFCFEEA9000
unkown
page readonly
44AA0000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
1241CCF0000
unkown
page read and write
3FC3E000
heap
page read and write
3FA84000
heap
page read and write
1241C340000
unkown
page read and write
44AA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
419A0000
trusted library allocation
page read and write
20B8386D000
heap
page read and write
23E76846000
heap
page read and write
44850000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
447A0000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
1241C710000
unkown
page read and write
46E40000
trusted library allocation
page read and write
1241CC50000
unkown
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
7FFCFF00C000
unkown
page readonly
419A0000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
1241D750000
unkown
page read and write
44A70000
trusted library allocation
page read and write
3FCF0000
trusted library allocation
page read and write
20B83885000
heap
page read and write
44A80000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
7FFCFF1E5000
unkown
page read and write
44A70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
27D000
unkown
page write copy
3FA84000
heap
page read and write
7FFCFEF55000
unkown
page readonly
44640000
trusted library allocation
page read and write
7FFCFF434000
unkown
page readonly
46E90000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
E90000
heap
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
1241A610000
unkown
page readonly
7FFCFF22E000
unkown
page readonly
46E50000
trusted library allocation
page read and write
46E40000
trusted library allocation
page read and write
1241C7A0000
unkown
page read and write
3FA84000
heap
page read and write
7FFCFF839000
unkown
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
1241CC70000
unkown
page read and write
44A80000
trusted library allocation
page read and write
3FA84000
heap
page read and write
1241A310000
unkown
page readonly
46E70000
trusted library allocation
page read and write
E05A07E000
stack
page read and write
2EB9000
stack
page read and write
46E60000
trusted library allocation
page read and write
7FF60E49E000
unkown
page read and write
46E90000
trusted library allocation
page read and write
1E2CD452000
heap
page read and write
46E70000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
8315C7C000
stack
page read and write
419A0000
trusted library allocation
page read and write
3FC46000
heap
page read and write
46E70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
7FF60E5D8000
unkown
page readonly
41721000
heap
page read and write
7FFCFF252000
unkown
page readonly
44850000
trusted library allocation
page read and write
1241D560000
unkown
page read and write
7FF60DEEE000
unkown
page readonly
46E40000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
7FFCFF290000
unkown
page readonly
7FFCFF373000
unkown
page readonly
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
46E50000
trusted library allocation
page read and write
7FFCFF870000
unkown
page readonly
44A70000
trusted library allocation
page read and write
2C2000
unkown
page readonly
3FA84000
heap
page read and write
3FA84000
heap
page read and write
7FFCFF841000
unkown
page write copy
3FA84000
heap
page read and write
3FA84000
heap
page read and write
44850000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
1241C310000
unkown
page read and write
9C8000
heap
page read and write
23E7685B000
heap
page read and write
44960000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
3FA84000
heap
page read and write
4C0000
unkown
page read and write
1241C480000
unkown
page read and write
46E70000
trusted library allocation
page read and write
1241CB60000
unkown
page read and write
1241D121000
unkown
page read and write
44AA0000
trusted library allocation
page read and write
E05A37E000
stack
page read and write
3FA84000
heap
page read and write
1241C650000
unkown
page read and write
44A70000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44850000
trusted library allocation
page read and write
83154FC000
stack
page read and write
44AA0000
trusted library allocation
page read and write
1241A100000
unkown
page readonly
46E70000
trusted library allocation
page read and write
7FFCFF4D0000
unkown
page readonly
7FFCFF36A000
unkown
page write copy
7FFCFF430000
unkown
page readonly
44A80000
trusted library allocation
page read and write
3FC99000
heap
page read and write
3FA84000
heap
page read and write
1241A220000
unkown
page readonly
16EDE864000
heap
page read and write
44850000
trusted library allocation
page read and write
447E0000
trusted library allocation
page read and write
446C0000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
446B0000
trusted library allocation
page read and write
3651000
unkown
page execute read
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
7FF60E3B8000
unkown
page write copy
44A70000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
2055A802000
heap
page read and write
3FA84000
heap
page read and write
44640000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E90000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
283000
unkown
page read and write
44640000
trusted library allocation
page read and write
3600000
heap
page read and write
44640000
trusted library allocation
page read and write
1241CAF0000
unkown
page read and write
44640000
trusted library allocation
page read and write
44990000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
7FFCFF178000
unkown
page execute read
7FF60DF0E000
unkown
page readonly
46E30000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
3FA84000
heap
page read and write
1241A0AE000
heap
page read and write
46E70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
3FA84000
heap
page read and write
22BF1C51000
heap
page read and write
46E70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
8CDD8FE000
stack
page read and write
46E60000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
7FF60DEDC000
unkown
page execute read
44A70000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
3FA84000
heap
page read and write
23E7682A000
heap
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
A550F7E000
stack
page read and write
44A80000
trusted library allocation
page read and write
1241D8D3000
unkown
page read and write
46E70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
1241BC30000
unkown
page read and write
12419FD0000
heap
page read and write
46E70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
1241A180000
unkown
page readonly
44640000
trusted library allocation
page read and write
2A0000
unkown
page read and write
46E40000
trusted library allocation
page read and write
1241CBE0000
unkown
page read and write
7FFCFF381000
unkown
page execute read
7FFCFEFAB000
unkown
page readonly
46E70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
1E2CD330000
heap
page read and write
52B0000
heap
page read and write
3FA84000
heap
page read and write
419A0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
12419FC0000
unkown
page readonly
44A70000
trusted library allocation
page read and write
1241C610000
unkown
page read and write
44A90000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
1241D700000
unkown
page read and write
44A70000
trusted library allocation
page read and write
92D4000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44850000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
46E40000
trusted library allocation
page read and write
2281000
direct allocation
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
44A80000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
23E7683C000
heap
page read and write
5170000
trusted library allocation
page read and write
243A4A78000
heap
page read and write
44AA0000
trusted library allocation
page read and write
1241F68B000
unkown
page read and write
3FA84000
heap
page read and write
46E60000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
44B000
unkown
page read and write
16EDE660000
heap
page read and write
44AA0000
trusted library allocation
page read and write
1241C2E0000
unkown
page read and write
3FA84000
heap
page read and write
46E60000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44A70000
trusted library allocation
page read and write
2273000
direct allocation
page read and write
46E90000
trusted library allocation
page read and write
7FF60E3D1000
unkown
page write copy
46E70000
trusted library allocation
page read and write
52B0000
trusted library allocation
page read and write
44990000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
46EA0000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
44660000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
7FFCFF718000
unkown
page readonly
3FBA0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
7FFCFF158000
unkown
page write copy
44AA0000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E40000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
3FA84000
heap
page read and write
7FFCFF270000
unkown
page readonly
7FF60E5D8000
unkown
page readonly
46E70000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
52B8000
trusted library allocation
page read and write
2FF5000
heap
page read and write
46E70000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
3D20000
heap
page read and write
44980000
trusted library allocation
page read and write
1241D770000
unkown
page read and write
44640000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44A90000
trusted library allocation
page read and write
1241C600000
unkown
page read and write
3FA84000
heap
page read and write
44640000
trusted library allocation
page read and write
3FC3E000
heap
page read and write
46E70000
trusted library allocation
page read and write
7FF60DF78000
unkown
page readonly
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
7FFCFF3A4000
unkown
page readonly
46E60000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44A70000
trusted library allocation
page read and write
1241A600000
unkown
page readonly
3FA84000
heap
page read and write
1241CB00000
unkown
page read and write
CACE97E000
stack
page read and write
44A70000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
3FC3E000
heap
page read and write
1241D730000
unkown
page read and write
20B83913000
heap
page read and write
44AA0000
trusted library allocation
page read and write
7FFCFF871000
unkown
page execute read
44850000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
550000
trusted library allocation
page read and write
22BF1C13000
heap
page read and write
29FFFD000
stack
page read and write
446E0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
1241A1F0000
unkown
page readonly
46E70000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
E059DFB000
stack
page read and write
1E2CD3C0000
trusted library allocation
page read and write
23E7687C000
heap
page read and write
7FFCFF191000
unkown
page execute read
1E2CD390000
heap
page read and write
44AA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
22BF1C8C000
heap
page read and write
1241D5B3000
unkown
page read and write
44A70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
329F000
heap
page read and write
46E70000
trusted library allocation
page read and write
30000
heap
page read and write
1241A320000
unkown
page readonly
46E70000
trusted library allocation
page read and write
7FF60E3B0000
unkown
page write copy
3FA84000
heap
page read and write
7FFCFF3DF000
unkown
page execute read
46E70000
trusted library allocation
page read and write
44650000
trusted library allocation
page read and write
7FFCFF3C1000
unkown
page execute read
1241C350000
unkown
page read and write
44A80000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
16EDE856000
heap
page read and write
44AA0000
trusted library allocation
page read and write
20B83790000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
271B000
direct allocation
page read and write
1241C1F0000
unkown
page read and write
46E60000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
44990000
trusted library allocation
page read and write
1241D8E3000
unkown
page read and write
419A0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E40000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
3FA84000
heap
page read and write
7FFCFF2D7000
unkown
page read and write
46E70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
7FFCFEEFE000
unkown
page execute read
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
426000
unkown
page execute read
23E7687F000
heap
page read and write
3FA84000
heap
page read and write
44A70000
trusted library allocation
page read and write
23E76842000
heap
page read and write
46E70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
7FFCFF043000
unkown
page readonly
400000
unkown
page readonly
46E70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
1E2CD429000
heap
page read and write
3FA84000
heap
page read and write
44950000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
1241F3C7000
unkown
page read and write
46E70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
1241A110000
unkown
page readonly
CACDF0C000
stack
page read and write
446B0000
trusted library allocation
page read and write
274F000
direct allocation
page read and write
3FC3E000
heap
page read and write
6DD000
unkown
page readonly
16EDE913000
heap
page read and write
44A70000
trusted library allocation
page read and write
6D5000
unkown
page read and write
44850000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
22BF1B10000
heap
page read and write
16EDE828000
heap
page read and write
22BF1C58000
heap
page read and write
20B83867000
heap
page read and write
44A90000
trusted library allocation
page read and write
1241A330000
unkown
page readonly
44650000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
1241C750000
unkown
page read and write
3FA84000
heap
page read and write
46EA0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
9240000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
BFE000
stack
page read and write
46E70000
trusted library allocation
page read and write
9272000
trusted library allocation
page read and write
7FF60DFE2000
unkown
page readonly
3FA84000
heap
page read and write
46E90000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
46F10000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
44650000
trusted library allocation
page read and write
7FFCFF2AF000
unkown
page readonly
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
7FFCFF19C000
unkown
page readonly
44A70000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
7FF60D461000
unkown
page execute read
46DE0000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
12419E60000
heap
page read and write
44A80000
trusted library allocation
page read and write
8ED517C000
stack
page read and write
46E70000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
23E7685D000
heap
page read and write
20B83630000
heap
page read and write
46E90000
trusted library allocation
page read and write
6C6000
unkown
page write copy
46E70000
trusted library allocation
page read and write
8CDD87B000
stack
page read and write
1241A170000
unkown
page readonly
373C000
direct allocation
page read and write
1241A1C0000
unkown
page readonly
44640000
trusted library allocation
page read and write
3FA84000
heap
page read and write
1241D720000
unkown
page read and write
321B000
heap
page read and write
44A70000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
22BF1C00000
heap
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
44650000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
3530000
heap
page read and write
44640000
trusted library allocation
page read and write
23E76873000
heap
page read and write
44AA0000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
44990000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
1241C6D0000
unkown
page read and write
1241D790000
unkown
page read and write
241000
unkown
page execute read
46E70000
trusted library allocation
page read and write
419A5000
trusted library allocation
page read and write
7FFCFEED1000
unkown
page execute read
401000
unkown
page execute read
44640000
trusted library allocation
page read and write
1241BDB0000
unkown
page read and write
7FF60DB68000
unkown
page execute read
1241C840000
unkown
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
A10000
heap
page read and write
23E76834000
heap
page read and write
7FFCFF0AE000
unkown
page read and write
23E76876000
heap
page read and write
46E90000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
446D0000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
1241C4A0000
unkown
page read and write
44A90000
trusted library allocation
page read and write
7FFCFF019000
unkown
page readonly
243A4B13000
heap
page read and write
3FA84000
heap
page read and write
44850000
trusted library allocation
page read and write
7FFCFF17A000
unkown
page readonly
3FCB6000
heap
page read and write
23E765F0000
heap
page read and write
1241D5B7000
unkown
page read and write
7FFCFF070000
unkown
page readonly
44A80000
trusted library allocation
page read and write
2055A813000
heap
page read and write
44650000
trusted library allocation
page read and write
1241A140000
unkown
page readonly
4464A000
trusted library allocation
page read and write
31E0000
heap
page read and write
23E76863000
heap
page read and write
1241C400000
unkown
page read and write
419A5000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44A70000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
7FF60E214000
unkown
page readonly
44640000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44850000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
7FFCFF496000
unkown
page readonly
44AA0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
1241C7B0000
unkown
page read and write
20000
heap
page read and write
3FA84000
heap
page read and write
1241A260000
unkown
page readonly
1241C690000
unkown
page read and write
1241C4C0000
unkown
page read and write
7FFCFF1B0000
unkown
page readonly
32A0000
heap
page read and write
44660000
trusted library allocation
page read and write
1241A2F0000
unkown
page readonly
1241C9F8000
unkown
page read and write
3FA84000
heap
page read and write
46E80000
trusted library allocation
page read and write
896000
heap
page read and write
7FF60E34D000
unkown
page readonly
1241D4E0000
unkown
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
46E30000
trusted library allocation
page read and write
493557E000
stack
page read and write
44A90000
trusted library allocation
page read and write
1241C942000
unkown
page read and write
8CDD9FF000
stack
page read and write
44A70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
22BF1C72000
heap
page read and write
44850000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
46E50000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
419A0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
1E2CD513000
heap
page read and write
46E70000
trusted library allocation
page read and write
20B84002000
heap
page read and write
44AA0000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
1241C290000
unkown
page read and write
46E70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44A70000
trusted library allocation
page read and write
3222000
heap
page read and write
44AA0000
trusted library allocation
page read and write
7FFCFF6E6000
unkown
page execute read
46E90000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46EC0000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
CACE57E000
stack
page read and write
72C9000
trusted library allocation
page read and write
1241C870000
unkown
page read and write
46E70000
trusted library allocation
page read and write
46EF0000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
2BA0000
trusted library allocation
page readonly
46E70000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
7FFCFEF4D000
unkown
page readonly
A04000
heap
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
A8F000
heap
page read and write
44850000
trusted library allocation
page read and write
46F00000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
7FFCFF17D000
unkown
page read and write
3FC4A000
heap
page read and write
44740000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E90000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
7FFCFF86A000
unkown
page readonly
44850000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
3FCA7000
heap
page read and write
3FA84000
heap
page read and write
44710000
trusted library allocation
page read and write
3FA84000
heap
page read and write
CACE7FD000
stack
page read and write
1241C460000
unkown
page read and write
46E70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
23E7683B000
heap
page read and write
46E70000
trusted library allocation
page read and write
7FFCFF071000
unkown
page execute read
46E90000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
1241CC00000
unkown
page read and write
44A80000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
3FA84000
heap
page read and write
419A0000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
92D3000
trusted library allocation
page read and write
35E0000
heap
page read and write
44850000
trusted library allocation
page read and write
1241C620000
unkown
page read and write
1241C2F0000
unkown
page read and write
9C000
stack
page read and write
44AA0000
trusted library allocation
page read and write
3F9B6000
unkown
page readonly
3FA84000
heap
page read and write
46E50000
trusted library allocation
page read and write
44990000
trusted library allocation
page read and write
3FC46000
heap
page read and write
44A80000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
46E50000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
23E76834000
heap
page read and write
3FA84000
heap
page read and write
557F000
stack
page read and write
46E70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
1241C5E0000
unkown
page read and write
44A90000
trusted library allocation
page read and write
A55087B000
stack
page read and write
46E70000
trusted library allocation
page read and write
46E30000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
1241C7F0000
unkown
page read and write
26C2000
direct allocation
page read and write
23E76861000
heap
page read and write
44AA0000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
1241A120000
unkown
page readonly
46E70000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
7FFCFF8D0000
unkown
page execute read
7FF60DEDC000
unkown
page execute read
44990000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
1241A240000
unkown
page readonly
46E90000
trusted library allocation
page read and write
44690000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
2738000
direct allocation
page read and write
46E90000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
3FA84000
heap
page read and write
1241C5D0000
unkown
page read and write
44850000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
23E76800000
heap
page read and write
46E40000
trusted library allocation
page read and write
3218000
heap
page read and write
3C1F000
stack
page read and write
46E60000
trusted library allocation
page read and write
16EDF002000
trusted library allocation
page read and write
43F80000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
20B838CF000
heap
page read and write
1241C6E0000
unkown
page read and write
8ED507E000
stack
page read and write
44920000
trusted library allocation
page read and write
3FA84000
heap
page read and write
1241C7E0000
unkown
page read and write
2055AFB0000
remote allocation
page read and write
3FA84000
heap
page read and write
44656000
trusted library allocation
page read and write
7FF60DD82000
unkown
page execute read
7FFCFF288000
unkown
page readonly
46E60000
trusted library allocation
page read and write
16EDE800000
heap
page read and write
2690000
heap
page read and write
2288000
direct allocation
page read and write
1241D040000
unkown
page read and write
16EDE85F000
heap
page read and write
46E70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44A90000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
7FFCFF408000
unkown
page readonly
243A4A76000
heap
page read and write
44850000
trusted library allocation
page read and write
1241CF40000
unkown
page read and write
44A70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
44670000
trusted library allocation
page read and write
28E0000
heap
page read and write
23E76884000
heap
page read and write
1241C830000
unkown
page read and write
7FF60D431000
unkown
page execute read
44690000
trusted library allocation
page read and write
93A2000
trusted library allocation
page read and write
A55137E000
stack
page read and write
1241D11F000
unkown
page read and write
44AA0000
trusted library allocation
page read and write
7FFCFF26E000
unkown
page execute read
46E60000
trusted library allocation
page read and write
23E76865000
heap
page read and write
8315B7F000
stack
page read and write
7FFCFEED0000
unkown
page readonly
3FA84000
heap
page read and write
7FF60E1A5000
unkown
page readonly
44AA0000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
1241C3E0000
unkown
page read and write
44AA0000
trusted library allocation
page read and write
451000
unkown
page execute read
2231000
direct allocation
page read and write
7FFCFF01E000
unkown
page readonly
46E40000
trusted library allocation
page read and write
3FCA7000
heap
page read and write
44AA0000
trusted library allocation
page read and write
41950000
trusted library allocation
page read and write
1241D8C3000
unkown
page read and write
5315000
trusted library allocation
page read and write
83157FC000
stack
page read and write
7FF60DEEE000
unkown
page readonly
44A70000
trusted library allocation
page read and write
7FFCFF377000
unkown
page readonly
46E70000
trusted library allocation
page read and write
18C000
stack
page read and write
44660000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
46EA0000
trusted library allocation
page read and write
46E30000
trusted library allocation
page read and write
2055A6E0000
heap
page read and write
400000
unkown
page readonly
44AA0000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
831567E000
stack
page read and write
46E40000
trusted library allocation
page read and write
1241C908000
unkown
page read and write
44640000
trusted library allocation
page read and write
1241A390000
unkown
page readonly
7FFCFEFC1000
unkown
page execute read
7FFCFF3F9000
unkown
page readonly
1241C8FA000
unkown
page read and write
7FFCFF3E1000
unkown
page readonly
46E70000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
1241BDA0000
unkown
page read and write
3FA84000
heap
page read and write
7204000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
3FA84000
heap
page read and write
446A0000
trusted library allocation
page read and write
7FF60E079000
unkown
page readonly
7FF60E4FA000
unkown
page readonly
44850000
trusted library allocation
page read and write
7FFCFF1EB000
unkown
page readonly
7FFCFF01C000
unkown
page readonly
44A70000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
6C6000
unkown
page read and write
7FFCFF1A0000
unkown
page readonly
3FA84000
heap
page read and write
46E40000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
9372000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
2880000
direct allocation
page read and write
1241A160000
unkown
page readonly
44AA0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
419A5000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44650000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
46E40000
trusted library allocation
page read and write
2ED5000
stack
page read and write
44A74000
trusted library allocation
page read and write
32A2000
heap
page read and write
46E70000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
3FCA7000
heap
page read and write
A34000
heap
page read and write
1241CDC0000
unkown
page read and write
9DE000
heap
page read and write
44A70000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
1241A1E0000
unkown
page readonly
46E90000
trusted library allocation
page read and write
1241C820000
unkown
page read and write
1241C490000
unkown
page read and write
3FC40000
heap
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
44640000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
7FF60D461000
unkown
page execute read
A55107F000
stack
page read and write
44AA0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
7FFCFEE8A000
unkown
page readonly
46E70000
trusted library allocation
page read and write
23E76813000
heap
page read and write
46E70000
trusted library allocation
page read and write
3FC4D000
heap
page read and write
16EDE840000
heap
page read and write
7FFCFF16C000
unkown
page readonly
44640000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
7FFCFF2A3000
unkown
page execute read
7FFCFF2C0000
unkown
page readonly
46E70000
trusted library allocation
page read and write
243A4A69000
heap
page read and write
44850000
trusted library allocation
page read and write
23E7686D000
heap
page read and write
46E40000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
26E2000
direct allocation
page read and write
E05A0FE000
stack
page read and write
3224000
heap
page read and write
44AA0000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
1241CD80000
unkown
page read and write
3FC8A000
heap
page read and write
3FA84000
heap
page read and write
2248000
direct allocation
page read and write
46E70000
trusted library allocation
page read and write
46E40000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
3F25D000
unkown
page execute read
44A70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
4C2000
unkown
page write copy
44640000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
23E76902000
heap
page read and write
44AA0000
trusted library allocation
page read and write
7FFCFEEB1000
unkown
page execute read
44840000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
3FC46000
heap
page read and write
44A80000
trusted library allocation
page read and write
1241CF10000
unkown
page read and write
46E70000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
3FA84000
heap
page read and write
E05A27F000
stack
page read and write
1241CC40000
unkown
page read and write
CACE3FE000
stack
page read and write
26E9000
direct allocation
page read and write
3FA84000
heap
page read and write
23E7683E000
heap
page read and write
32A0000
heap
page read and write
46E70000
trusted library allocation
page read and write
32B2000
heap
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
7FFCFEF0A000
unkown
page readonly
7CD6000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
3FCB5000
heap
page read and write
7FFCFF2D8000
unkown
page readonly
44A70000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E90000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
447B0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
7FFCFF428000
unkown
page execute read
44AA0000
trusted library allocation
page read and write
1241C730000
unkown
page read and write
7FFCFEE20000
unkown
page readonly
46E70000
trusted library allocation
page read and write
1241CB30000
unkown
page read and write
44850000
trusted library allocation
page read and write
3FA84000
heap
page read and write
A7D000
heap
page read and write
44A70000
trusted library allocation
page read and write
26F7000
direct allocation
page read and write
44A70000
trusted library allocation
page read and write
1241C8E0000
unkown
page read and write
44AA0000
trusted library allocation
page read and write
16EDE902000
heap
page read and write
2599000
direct allocation
page read and write
20B84100000
heap
page read and write
3FA84000
heap
page read and write
A1F000
heap
page read and write
44A70000
trusted library allocation
page read and write
4B7000
unkown
page write copy
7FFCFEF3C000
unkown
page readonly
46E70000
trusted library allocation
page read and write
16EDE650000
heap
page read and write
44AA0000
trusted library allocation
page read and write
1241C300000
unkown
page read and write
46E70000
trusted library allocation
page read and write
243A5202000
trusted library allocation
page read and write
44990000
trusted library allocation
page read and write
2ED7000
stack
page read and write
44850000
trusted library allocation
page read and write
7FFCFF170000
unkown
page readonly
CACE8FD000
stack
page read and write
7FFCFEFB0000
unkown
page read and write
44850000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
1241D13B000
unkown
page read and write
3606000
heap
page read and write
7FFCFF1DA000
unkown
page readonly
44990000
trusted library allocation
page read and write
46E30000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
2055AFB0000
remote allocation
page read and write
1241C92B000
unkown
page read and write
1241D6E0000
unkown
page read and write
7FFCFF3F2000
unkown
page read and write
3FA84000
heap
page read and write
2150000
direct allocation
page read and write
46E90000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
46E40000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
7FF60DD82000
unkown
page execute read
3FA84000
heap
page read and write
44850000
trusted library allocation
page read and write
7FFCFF862000
unkown
page readonly
46E70000
trusted library allocation
page read and write
1241C800000
unkown
page read and write
1241C2A0000
unkown
page readonly
44640000
trusted library allocation
page read and write
1241C390000
unkown
page read and write
46E70000
trusted library allocation
page read and write
1E2CD413000
heap
page read and write
5C0000
heap
page read and write
243A4890000
heap
page read and write
1241D109000
unkown
page read and write
23E7686E000
heap
page read and write
401000
unkown
page execute read
7FFCFEFC9000
unkown
page execute read
46E90000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44A90000
trusted library allocation
page read and write
12420290000
unkown
page read and write
5339000
trusted library allocation
page read and write
3FA84000
heap
page read and write
7FFCFF1E6000
unkown
page readonly
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
2A1000
unkown
page write copy
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
7FF60DF78000
unkown
page readonly
41721000
heap
page read and write
22BF3C00000
remote allocation
page read and write
9371000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
1241F6A4000
unkown
page read and write
3FA84000
heap
page read and write
1241C500000
unkown
page read and write
1241C740000
unkown
page read and write
44A70000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
3FC3E000
heap
page read and write
1241C3F0000
unkown
page read and write
44A70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
CFF000
stack
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
7FFCFEEBF000
unkown
page readonly
8ED488B000
stack
page read and write
22BF1D18000
heap
page read and write
44A70000
trusted library allocation
page read and write
1241D05A000
unkown
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
7FF60E608000
unkown
page readonly
493527B000
stack
page read and write
2055B002000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
322E000
heap
page read and write
46E60000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
1241A2C0000
unkown
page readonly
44AA0000
trusted library allocation
page read and write
9271000
trusted library allocation
page read and write
7FFCFEF36000
unkown
page readonly
1241C2C0000
unkown
page read and write
2BF0000
trusted library allocation
page read and write
7FFCFF2CC000
unkown
page execute read
E05A57F000
stack
page read and write
44AA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
1241CBA0000
unkown
page read and write
2BEE000
stack
page read and write
422000
unkown
page read and write
140025000
unkown
page readonly
52B1000
trusted library allocation
page read and write
44660000
trusted library allocation
page read and write
1241D8A3000
unkown
page read and write
46E90000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
9311000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
A5E000
heap
page read and write
3FA84000
heap
page read and write
7FFCFF261000
unkown
page execute read
44AA0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
22BF3602000
trusted library allocation
page read and write
23E76864000
heap
page read and write
20B83865000
heap
page read and write
27D000
unkown
page read and write
44AA0000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E90000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
6F3000
unkown
page readonly
3FA84000
heap
page read and write
5B0000
heap
page read and write
46E60000
trusted library allocation
page read and write
446C0000
trusted library allocation
page read and write
44770000
trusted library allocation
page read and write
1241A360000
unkown
page readonly
44AA0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
12419FA0000
unkown
page read and write
1241C270000
unkown
page read and write
44850000
trusted library allocation
page read and write
7FFCFF36D000
unkown
page readonly
44850000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
44660000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
448B0000
trusted library allocation
page read and write
44650000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3F25D000
unkown
page execute read
44AA0000
trusted library allocation
page read and write
46E40000
trusted library allocation
page read and write
46E50000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
44820000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
9271000
trusted library allocation
page read and write
23E7684F000
heap
page read and write
44640000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
52D6000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
1241D520000
unkown
page readonly
44640000
trusted library allocation
page read and write
3FA84000
heap
page read and write
7FFCFEF64000
unkown
page readonly
9304000
trusted library allocation
page read and write
3FA84000
heap
page read and write
7FF60D431000
unkown
page execute read
44AA0000
trusted library allocation
page read and write
7FF60E5CB000
unkown
page readonly
1241A270000
unkown
page readonly
7FFCFF34D000
unkown
page readonly
3FCA7000
heap
page read and write
7FFCFF1F1000
unkown
page execute read
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
1241D6D0000
unkown
page read and write
44698000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
16EDE802000
heap
page read and write
46E90000
trusted library allocation
page read and write
33DE000
stack
page read and write
320D000
heap
page read and write
44A80000
trusted library allocation
page read and write
46E50000
trusted library allocation
page read and write
35F4000
heap
page read and write
46E70000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
3207000
heap
page read and write
44891000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
419A7000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
46E50000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
35A0000
direct allocation
page read and write
7FFCFEF6C000
unkown
page readonly
1851000
unkown
page execute read
327E000
heap
page read and write
23E76867000
heap
page read and write
46E40000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44850000
trusted library allocation
page read and write
3FA84000
heap
page read and write
419A0000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
3FA84000
heap
page read and write
243A4A13000
heap
page read and write
E51000
unkown
page execute read
44640000
trusted library allocation
page read and write
1241BDA4000
unkown
page read and write
44990000
trusted library allocation
page read and write
313E000
stack
page read and write
3FA84000
heap
page read and write
46E90000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
3D21000
heap
page read and write
23E76841000
heap
page read and write
44A70000
trusted library allocation
page read and write
1241C680000
unkown
page read and write
44910000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
44A80000
trusted library allocation
page read and write
1241C240000
unkown
page read and write
44640000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
1241D5BA000
unkown
page read and write
1241CB10000
unkown
page read and write
44650000
trusted library allocation
page read and write
56FE000
stack
page read and write
3FC44000
heap
page read and write
2D20000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
1241C4B0000
unkown
page read and write
3FA84000
heap
page read and write
44690000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
A25000
heap
page read and write
46E30000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
7FF60E3C3000
unkown
page write copy
3FA84000
heap
page read and write
3FA84000
heap
page read and write
1241A0F0000
unkown
page readonly
3FA84000
heap
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
445B0000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
7FFCFEF00000
unkown
page readonly
3FCA7000
heap
page read and write
7FFCFF42F000
unkown
page read and write
46E70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
7FFCFF2D1000
unkown
page readonly
46E40000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
7FFCFF845000
unkown
page read and write
44AA0000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E40000
trusted library allocation
page read and write
32A0000
heap
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
7FFCFF22C000
unkown
page execute read
3FCA7000
heap
page read and write
44850000
trusted library allocation
page read and write
3FA84000
heap
page read and write
7FFCFEFEB000
unkown
page readonly
44A70000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
7FFCFF162000
unkown
page readonly
6D8000
unkown
page write copy
46E90000
trusted library allocation
page read and write
7FF60DF0E000
unkown
page readonly
22BF35D0000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
243A4820000
heap
page read and write
44970000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
1241C550000
unkown
page read and write
46E60000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44A90000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FC3E000
heap
page read and write
44850000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
46E40000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
324F000
heap
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
1241A210000
unkown
page readonly
46E90000
trusted library allocation
page read and write
16EDE86A000
heap
page read and write
324C000
heap
page read and write
3FCB6000
heap
page read and write
3FA84000
heap
page read and write
22BF1C66000
heap
page read and write
22BF3840000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
3FA84000
heap
page read and write
447D0000
trusted library allocation
page read and write
22BF3C00000
remote allocation
page read and write
1241BC40000
unkown
page read and write
3207000
heap
page read and write
140000000
unkown
page readonly
46E7C000
trusted library allocation
page read and write
7FFCFEFCB000
unkown
page readonly
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
1241C8B0000
unkown
page read and write
44AA0000
trusted library allocation
page read and write
23E76878000
heap
page read and write
44A70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
3B1F000
stack
page read and write
44780000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
3FCA7000
heap
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
7FFCFF06B000
unkown
page readonly
3FA84000
heap
page read and write
7FFCFF2C1000
unkown
page execute read
44850000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
9341000
trusted library allocation
page read and write
890000
heap
page read and write
46E90000
trusted library allocation
page read and write
46E40000
trusted library allocation
page read and write
A7C000
heap
page read and write
44AA0000
trusted library allocation
page read and write
1241A370000
unkown
page readonly
46E60000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
1241CB40000
unkown
page read and write
46E40000
trusted library allocation
page read and write
A0A000
heap
page read and write
24B0000
direct allocation
page read and write
46E70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
99F000
stack
page read and write
92A3000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
7FFCFF89E000
unkown
page execute read
419A0000
trusted library allocation
page read and write
9304000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
1241DAA1000
unkown
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
7FFCFF40F000
unkown
page readonly
44A70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44A70000
trusted library allocation
page read and write
31E8000
heap
page read and write
44A80000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
1241BC74000
unkown
page read and write
3FCA7000
heap
page read and write
243A4990000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
7FF60E4B2000
unkown
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
2748000
direct allocation
page read and write
3FA84000
heap
page read and write
2055A858000
heap
page read and write
6D0000
unkown
page read and write
46E70000
trusted library allocation
page read and write
6CD000
unkown
page read and write
44AA0000
trusted library allocation
page read and write
3FCA7000
heap
page read and write
7FFCFF40C000
unkown
page readonly
44850000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
1241C810000
unkown
page read and write
7FFCFF4F1000
unkown
page execute read
23E76862000
heap
page read and write
1241CD20000
unkown
page read and write
44A80000
trusted library allocation
page read and write
2A1000
unkown
page readonly
46E70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
23E7687E000
heap
page read and write
7FFCFF27F000
unkown
page read and write
3FA84000
heap
page read and write
226C000
direct allocation
page read and write
44850000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
7FFCFF4E8000
unkown
page execute read
3FA84000
heap
page read and write
46E90000
trusted library allocation
page read and write
A28000
heap
page read and write
7FFCFF026000
unkown
page readonly
A55117F000
stack
page read and write
7FFCFF380000
unkown
page readonly
44A70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FCA7000
heap
page read and write
44AA0000
trusted library allocation
page read and write
46E40000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
9A0000
trusted library allocation
page read and write
7FFCFF3B1000
unkown
page readonly
46EB0000
trusted library allocation
page read and write
419A5000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
44990000
trusted library allocation
page read and write
23E76832000
heap
page read and write
CACE67D000
stack
page read and write
7FFCFEFF6000
unkown
page readonly
3FA84000
heap
page read and write
44A70000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
44670000
trusted library allocation
page read and write
275E000
direct allocation
page read and write
35F0000
heap
page read and write
44AA0000
trusted library allocation
page read and write
1241C660000
unkown
page read and write
46E60000
trusted library allocation
page read and write
3FC3E000
heap
page read and write
93A2000
trusted library allocation
page read and write
3FA84000
heap
page read and write
7FF60DF90000
unkown
page readonly
7FFCFF291000
unkown
page execute read
1241D450000
unkown
page read and write
1241BC20000
unkown
page read and write
44AA0000
trusted library allocation
page read and write
446B0000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
1241F3D6000
unkown
page read and write
1241A280000
unkown
page readonly
448E0000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
23E76868000
heap
page read and write
44A90000
trusted library allocation
page read and write
7FF60D4D4000
unkown
page execute read
46E70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FCA7000
heap
page read and write
44640000
trusted library allocation
page read and write
1241C4F0000
unkown
page read and write
7FFCFEFB1000
unkown
page readonly
7FFCFF023000
unkown
page readonly
419A0000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
9271000
trusted library allocation
page read and write
A550A7B000
stack
page read and write
44A80000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
1241DA54000
unkown
page read and write
3FA84000
heap
page read and write
8CDDC7E000
stack
page read and write
44A70000
trusted library allocation
page read and write
1241BC60000
unkown
page read and write
43F80000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
44650000
trusted library allocation
page read and write
1241D1D3000
unkown
page read and write
7FFCFF3C0000
unkown
page readonly
3FA84000
heap
page read and write
44640000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
22BF1C2A000
heap
page read and write
44850000
trusted library allocation
page read and write
7FFCFF2E1000
unkown
page execute read
2055A83D000
heap
page read and write
44AA0000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
1241C780000
unkown
page read and write
46E70000
trusted library allocation
page read and write
1241C590000
unkown
page read and write
44AA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
7FFCFEF6F000
unkown
page readonly
44850000
trusted library allocation
page read and write
1241C540000
unkown
page read and write
44A70000
trusted library allocation
page read and write
32A0000
heap
page read and write
44640000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44A90000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
322F000
heap
page read and write
26F0000
direct allocation
page read and write
20B83829000
heap
page read and write
1241CD90000
unkown
page read and write
1241BC10000
unkown
page read and write
23E76875000
heap
page read and write
46E70000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
E05A47E000
stack
page read and write
1241A200000
unkown
page readonly
44A70000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
44660000
trusted library allocation
page read and write
7FFCFF19A000
unkown
page execute read
272A000
direct allocation
page read and write
3FA84000
heap
page read and write
44990000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
1241FA90000
unkown
page read and write
44AA0000
trusted library allocation
page read and write
2C51000
unkown
page execute read
540000
heap
page read and write
7FFCFF400000
unkown
page readonly
44A90000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
20B84112000
heap
page read and write
1241A290000
unkown
page readonly
12419FDB000
heap
page read and write
46E70000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
446B0000
trusted library allocation
page read and write
1241CDA0000
unkown
page read and write
44660000
trusted library allocation
page read and write
3FCB6000
heap
page read and write
44AA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44A80000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FA84000
heap
page read and write
CACE47E000
stack
page read and write
44A70000
trusted library allocation
page read and write
378E000
stack
page read and write
44AA0000
trusted library allocation
page read and write
44720000
trusted library allocation
page read and write
1241A340000
unkown
page readonly
3FA84000
heap
page read and write
20B83813000
heap
page read and write
3FA84000
heap
page read and write
44A90000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
7FE76000
direct allocation
page read and write
46E60000
trusted library allocation
page read and write
1241BC70000
unkown
page read and write
24B0000
direct allocation
page read and write
7FFCFEEC2000
unkown
page readonly
46E60000
trusted library allocation
page read and write
1241CD50000
unkown
page read and write
1241C890000
unkown
page read and write
46E30000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44850000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44670000
trusted library allocation
page read and write
7FFCFEF89000
unkown
page readonly
1241EE20000
unkown
page read and write
44730000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
44990000
trusted library allocation
page read and write
272000
unkown
page readonly
46E70000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
1241C3B0000
unkown
page read and write
7FFCFF1D4000
unkown
page execute read
46E60000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
140002000
unkown
page readonly
22BF1C3D000
heap
page read and write
3FA84000
heap
page read and write
44A70000
trusted library allocation
page read and write
270D000
direct allocation
page read and write
419A0000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
1241BBB0000
unkown
page read and write
7FF60E1A5000
unkown
page readonly
44A70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44A90000
trusted library allocation
page read and write
3FCA7000
heap
page read and write
1241A2B0000
unkown
page readonly
46E70000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
3FC46000
heap
page read and write
46E70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
7FFCFF09E000
unkown
page execute read
46E60000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44A70000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
1241D068000
unkown
page read and write
44A70000
trusted library allocation
page read and write
3609000
heap
page read and write
44850000
trusted library allocation
page read and write
26FF000
direct allocation
page read and write
44A70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
1241F697000
unkown
page read and write
44A70000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44A80000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E30000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
8CDD77F000
stack
page read and write
7FFCFF0B5000
unkown
page readonly
46E70000
trusted library allocation
page read and write
23E76830000
heap
page read and write
44A80000
trusted library allocation
page read and write
1241C200000
unkown
page read and write
6A00000
trusted library allocation
page read and write
E99000
heap
page read and write
44AA0000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
46E40000
trusted library allocation
page read and write
1241A3C0000
unkown
page readonly
46E70000
trusted library allocation
page read and write
240000
unkown
page readonly
44A70000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
44990000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
7FF60D430000
unkown
page readonly
44AA0000
trusted library allocation
page read and write
22BF1C5A000
heap
page read and write
46E70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
7FFCFF840000
unkown
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
7FFCFF4D1000
unkown
page execute read
1241C8C0000
unkown
page read and write
9310000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
6C8000
unkown
page read and write
46E90000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
44650000
trusted library allocation
page read and write
7FFCFF714000
unkown
page execute read
3FA84000
heap
page read and write
7FFCFF1A4000
unkown
page readonly
7FFCFF021000
unkown
page readonly
3FA84000
heap
page read and write
7FFCFEF67000
unkown
page readonly
46E70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
7FFCFF42B000
unkown
page readonly
1241A790000
unkown
page readonly
1241CFB7000
unkown
page read and write
46E70000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
3FCB3000
heap
page read and write
44AA0000
trusted library allocation
page read and write
23E76848000
heap
page read and write
44A90000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
1241CE00000
unkown
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
1E2CD443000
heap
page read and write
2706000
direct allocation
page read and write
243A4B02000
heap
page read and write
46E70000
trusted library allocation
page read and write
1241CC30000
unkown
page read and write
1241C7C0000
unkown
page read and write
1241CB20000
unkown
page read and write
46E70000
trusted library allocation
page read and write
1241CBF0000
unkown
page read and write
20B838E1000
heap
page read and write
41721000
heap
page read and write
1241CD10000
unkown
page read and write
44AA0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
4C6000
unkown
page readonly
3FA84000
heap
page read and write
321B000
heap
page read and write
1241CBC0000
unkown
page read and write
1241D1A2000
unkown
page read and write
46E60000
trusted library allocation
page read and write
1241A2A0000
unkown
page readonly
20B83690000
heap
page read and write
44AA0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
46E50000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
273F000
direct allocation
page read and write
44A80000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
7FF60E567000
unkown
page readonly
44640000
trusted library allocation
page read and write
3FCB4000
heap
page read and write
448A0000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
46E40000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
46E40000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
46E40000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
46E40000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
16EDE900000
heap
page read and write
46E40000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
3FC48000
heap
page read and write
2055A902000
heap
page read and write
222A000
direct allocation
page read and write
44AA0000
trusted library allocation
page read and write
44AA1000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
22BF1D02000
heap
page read and write
46E90000
trusted library allocation
page read and write
3FCA7000
heap
page read and write
243A4A02000
heap
page read and write
3FC3E000
heap
page read and write
52DB000
trusted library allocation
page read and write
1241A2E0000
unkown
page readonly
44640000
trusted library allocation
page read and write
44900000
trusted library allocation
page read and write
7FFCFF2A5000
unkown
page readonly
243A4A55000
heap
page read and write
419A0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FC41000
heap
page read and write
46E70000
trusted library allocation
page read and write
3FC40000
heap
page read and write
1241D8B3000
unkown
page read and write
3FA84000
heap
page read and write
1241A300000
unkown
page readonly
3FA84000
heap
page read and write
44AA0000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
7FFCFF3F4000
unkown
page readonly
3FA84000
heap
page read and write
44A70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
1241CDD0000
unkown
page read and write
1241D340000
unkown
page read and write
7FFCFEEA3000
unkown
page read and write
44AA0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
7FF60E214000
unkown
page readonly
20B83887000
heap
page read and write
7FFCFEF5F000
unkown
page readonly
243A4A5B000
heap
page read and write
1241C6B0000
unkown
page read and write
22BF3800000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44A90000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
35A0000
direct allocation
page read and write
7FFCFEF62000
unkown
page readonly
44A70000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
1241C260000
unkown
page read and write
1241A3E0000
unkown
page readonly
46EE0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
44850000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
83158FD000
stack
page read and write
2EE8000
stack
page read and write
446F0000
trusted library allocation
page read and write
56BF000
stack
page read and write
A550C7D000
stack
page read and write
317D000
stack
page read and write
44AA0000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
16EDE6C0000
heap
page read and write
44A80000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
20B8413A000
heap
page read and write
43F70000
trusted library allocation
page read and write
1E2CD43C000
heap
page read and write
44AA0000
trusted library allocation
page read and write
1241D204000
unkown
page read and write
1241C220000
unkown
page read and write
44AA0000
trusted library allocation
page read and write
1241C6A0000
unkown
page read and write
93A2000
trusted library allocation
page read and write
44640000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
2765000
direct allocation
page read and write
44A80000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
46E60000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
44A70000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
22BF1AB0000
heap
page read and write
44A90000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
3FCB6000
heap
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
9304000
trusted library allocation
page read and write
7FFCFF258000
unkown
page readonly
7FFCFEF31000
unkown
page readonly
46E70000
trusted library allocation
page read and write
447C0000
trusted library allocation
page read and write
23E7682E000
heap
page read and write
324F000
heap
page read and write
2055A670000
heap
page read and write
416F0000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
44A80000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
46E90000
trusted library allocation
page read and write
44860000
trusted library allocation
page read and write
8CDDBFF000
stack
page read and write
55BE000
stack
page read and write
7FFCFF280000
unkown
page readonly
1241C410000
unkown
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
30000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
1241CF00000
unkown
page readonly
1241C5F0000
unkown
page read and write
46E70000
trusted library allocation
page read and write
446E0000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
44990000
trusted library allocation
page read and write
7FFCFF83B000
unkown
page write copy
7FFCFF4C4000
unkown
page read and write
23E76650000
heap
page read and write
1241C5A0000
unkown
page read and write
44640000
trusted library allocation
page read and write
831597B000
stack
page read and write
46E70000
trusted library allocation
page read and write
44940000
trusted library allocation
page read and write
7FFCFF4C8000
unkown
page readonly
1241CDE0000
unkown
page read and write
1241A3B0000
unkown
page readonly
8CDDAFA000
stack
page read and write
7FFCFF2B2000
unkown
page readonly
23E765E0000
heap
page read and write
44A70000
trusted library allocation
page read and write
46E70000
trusted library allocation
page read and write
321D000
heap
page read and write
1241A1D0000
unkown
page readonly
46E70000
trusted library allocation
page read and write
44AA0000
trusted library allocation
page read and write
3FA84000
heap
page read and write
419A0000
trusted library allocation
page read and write
1241CBD0000
unkown
page read and write
2A00FD000
unkown
page read and write
7FFCFF15D000
unkown
page read and write
23E76750000
trusted library allocation
page read and write
243A4830000
heap
page read and write
29FEFD000
stack
page read and write
41B000
unkown
page readonly
8ED537E000
stack
page read and write
419A0000
trusted library allocation
page read and write
46E50000
trusted library allocation
page read and write
7FFCFEE88000
unkown
page execute read
7FFCFF1F0000
unkown
page readonly
3FCB4000
heap
page read and write
7FFCFF849000
unkown
page readonly
46E90000
trusted library allocation
page read and write
1241D07C000
unkown
page read and write
44850000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
46E90000
trusted library allocation
page read and write
22BF1C4A000
heap
page read and write
3FA84000
heap
page read and write
1241F6B0000
unkown
page read and write
44A70000
trusted library allocation
page read and write
7FB80000
direct allocation
page read and write
A550D7F000
stack
page read and write
44A70000
trusted library allocation
page read and write
374E000
stack
page read and write
46E70000
trusted library allocation
page read and write
3FA84000
heap
page read and write
73FD000
stack
page read and write
46E90000
trusted library allocation
page read and write
1E2CDE02000
trusted library allocation
page read and write
7FFCFF13C000
unkown
page readonly
1241D6C0000
unkown
page read and write
30000
heap
page read and write
44A80000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
44850000
trusted library allocation
page read and write
419A0000
trusted library allocation
page read and write
419A8000
trusted library allocation
page read and write
There are 2817 hidden memdumps, click here to show them.