IOC Report
INSTALL.EXE

loading gif

Files

File Path
Type
Category
Malicious
INSTALL.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Program Files (x86)\SIGA\CM\pdf\CM_MyZI S jours.pdf
PDF document, version 1.5
dropped
malicious
C:\Program Files (x86)\SIGA\CM\pdf\CM_MyZi Thailande.pdf
PDF document, version 1.5
dropped
malicious
C:\Program Files (x86)\SIGA\INSTALL\INSTALL.ZIP
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Program Files (x86)\SIGA\INSTALL\ServeursWeb.wdk
data
dropped
malicious
C:\Program Files (x86)\SIGA\INSTALL\_FRAMEWORK.ZIP
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Program Files (x86)\SIGA\INSTALL\_UPDATE.ZIP
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Program Files (x86)\SIGA\INSTALL\__WDINST.ZIP
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Program Files (x86)\SIGA\PAGE_CENTRE.awl
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\33CUD2J1\__WDINST[1].zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\90SNK17T\_FRAMEWORK[1].zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\AN5UOLP8\INSTALL[1].zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\C7S8M5VS\_UPDATE[1].zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\INSTALL.ZIP
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\ServeursWeb.wdk
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\WDSetup.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\_FRAMEWORK.ZIP
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\_UPDATE.ZIP
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\__WDINST.ZIP
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\WD_171A.tmp\INSTALL.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Common Files\PC SOFT\26.0\ReplicSynchro\ReplicSynchro.wx
Generic INItialization configuration [REPLICEXE_1]
dropped
C:\Program Files (x86)\SIGA\Admin-Contrat.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\SIGA\Admin-Ordre.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\SIGA\Base-Donnees.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\SIGA\Bilan.png
PNG image data, 128 x 128, 8-bit colormap, non-interlaced
dropped
C:\Program Files (x86)\SIGA\CM\avatars\CM_femme-01.png
PNG image data, 86 x 86, 8-bit/color RGBA, interlaced
dropped
C:\Program Files (x86)\SIGA\CM\avatars\CM_femme-02.png
PNG image data, 86 x 86, 8-bit/color RGBA, interlaced
dropped
C:\Program Files (x86)\SIGA\CM\avatars\CM_femme-03.png
PNG image data, 86 x 86, 8-bit/color RGBA, interlaced
dropped
C:\Program Files (x86)\SIGA\CM\avatars\CM_femme-04.png
PNG image data, 86 x 86, 8-bit/color RGBA, interlaced
dropped
C:\Program Files (x86)\SIGA\CM\avatars\CM_homme-01.png
PNG image data, 86 x 86, 8-bit/color RGBA, interlaced
dropped
C:\Program Files (x86)\SIGA\CM\avatars\CM_homme-02.png
PNG image data, 86 x 86, 8-bit/color RGBA, interlaced
dropped
C:\Program Files (x86)\SIGA\CM\avatars\CM_homme-03.png
PNG image data, 86 x 86, 8-bit/color RGBA, interlaced
dropped
C:\Program Files (x86)\SIGA\CM\avatars\CM_homme-04.png
PNG image data, 86 x 86, 8-bit/color RGBA, interlaced
dropped
C:\Program Files (x86)\SIGA\CM\pdf\CM_Certificat d'authenticit .pdf
PDF document, version 1.4
dropped
C:\Program Files (x86)\SIGA\CM\pdf\CM_Sport addict.pdf
PDF document, version 1.5, 5 pages
dropped
C:\Program Files (x86)\SIGA\CM\pdf\CM_Super splash.pdf
PDF document, version 1.4, 1 pages
dropped
C:\Program Files (x86)\SIGA\Compte-Recevoir.png
PNG image data, 128 x 128, 8-bit colormap, non-interlaced
dropped
C:\Program Files (x86)\SIGA\Contrat.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\SIGA\Facture.png
PNG image data, 120 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\SIGA\Finances\Acompte.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\SIGA\Finances\Consommation.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\SIGA\Finances\Devis.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\SIGA\Finances\Mensualisation.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\SIGA\Finances\Ordre.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\SIGA\Finances\Specifique.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\SIGA\INSTALL\INST.WXF
data
dropped
C:\Program Files (x86)\SIGA\INSTALL\WDMetabase.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\INSTALL\WDRelanceur.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\INSTALL\WDSetup.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\INSTALL\WDSetupFont.ttf
TrueType Font data, digitally signed, 19 tables, 1st "DSIG", 30 names, Macintosh, Digitized data copyright \251 2010-2011, Google Corporation.Open Sans LightRegularAscender - Ope
dropped
C:\Program Files (x86)\SIGA\INSTALL\WDSetupFontLicence.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\SIGA\INSTALL\WDUPDATE.NET
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\SIGA\INSTALL\__GABARIT.ZIP
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Program Files (x86)\SIGA\INSTALL\wd260com.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\INSTALL\wd260hf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\INSTALL\wd260mat.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\INSTALL\wd260mdl.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\INSTALL\wd260obj.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\INSTALL\wd260ole.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\INSTALL\wd260pnt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\INSTALL\wd260sql.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\INSTALL\wd260std.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\INSTALL\wd260trs.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\INSTALL\wd260uni.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\INSTALL\wd260vm.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\INSTALL\wd260xml.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\INSTALL\wd260zip.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\Jour-Courant.png
PNG image data, 120 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\SIGA\Management-Report.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\SIGA\Ordres\Branchement.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\SIGA\Ordres\Compteur.png
PNG image data, 46 x 46, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\SIGA\Ordres\Connexion.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, little-endian, direntries=1], baseline, precision 8, 48x48, components 3
dropped
C:\Program Files (x86)\SIGA\Ordres\Deconnexion.png
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\SIGA\PI_TDB_Widget_Info.awl
data
dropped
C:\Program Files (x86)\SIGA\PI_TDB_Widget_Valeur.awl
data
dropped
C:\Program Files (x86)\SIGA\Recherche-Avancee.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\SIGA\Retard-Paiement.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\SIGA\SIGA-ADMINISTRATION.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\SIGA-ADMINISTRATION.wx
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\SIGA\WDUPDATE.NET
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\SIGA\uactest626db141624c4fb59d04abb5acf8e7bd.txt
data
dropped
C:\Program Files (x86)\SIGA\uacteste65c9d3eef924d52b7b3fbc88c5484cd.txt
data
dropped
C:\Program Files (x86)\SIGA\wd260action.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\wd260barc.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\wd260com.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\wd260cpl.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\wd260grf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\wd260hf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\wd260html.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\wd260mat.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\wd260mdl.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\wd260obj.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\wd260pdf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\wd260pic.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\wd260pnt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\wd260prn.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\wd260rtf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\wd260sql.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\wd260std.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\wd260uni.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\wd260vm.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\wd260wk.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\wd260xls.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\wd260xml.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\SIGA\wd260zip.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Syst me Int gr des Gestion des Abonn s\Syst me Int gr de Gestion des Abonn s - Module d'administration.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Archive, ctime=Fri May 29 20:17:16 2020, mtime=Fri May 29 20:17:16 2020, atime=Fri May 29 20:17:16 2020, length=340, window=hide
dropped
C:\Users\Public\Desktop\Syst me Int gr de Gestion des Abonn s - Module d'administration.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Archive, ctime=Fri May 29 20:17:16 2020, mtime=Fri May 29 20:17:16 2020, atime=Fri May 29 20:17:16 2020, length=340, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\AN5UOLP8\WDUPDATE[1].NET
Generic INItialization configuration [WDSETUP]
dropped
C:\Users\user\AppData\Local\Temp\B9C8.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\FEN_ExempleGabarit.png
PNG image data, 674 x 474, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\FEN_ExempleGabaritUS.png
PNG image data, 674 x 474, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat.wdy
data
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Bg_Sheet_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Bg_Sheet_Break.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Bg_Sheet_Hover.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Bg_Sheet_Select.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Break.png
PNG image data, 18 x 9, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Break_Pict.png
PNG image data, 18 x 9, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Btn_Brw.png
PNG image data, 120 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Btn_Media_Center.png
PNG image data, 400 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Btn_Media_OK.png
PNG image data, 100 x 25, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Btn_Menu.png
PNG image data, 400 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Btn_Menu2.png
PNG image data, 400 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Btn_Menu3.png
PNG image data, 400 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Btn_Remove.png
PNG image data, 400 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Btn_Std.png
PNG image data, 400 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Btn_Syst_Close.png
PNG image data, 200 x 18, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Btn_Syst_Increase.png
PNG image data, 140 x 18, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Btn_Tool.png
PNG image data, 130 x 38, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_CBox.gif
GIF image data, version 89a, 168 x 14
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_CBox_Table.png
PNG image data, 168 x 14, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Combo.png
PNG image data, 400 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Edt.png
PNG image data, 120 x 20, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Edt_Light.png
PNG image data, 120 x 20, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Edt_ReadOnly.png
PNG image data, 120 x 20, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Etiquette.gif
GIF image data, version 87a, 114 x 150
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Fiche.gif
GIF image data, version 87a, 114 x 150
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Form.gif
GIF image data, version 87a, 114 x 150
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Frame.png
PNG image data, 95 x 95, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Label.gif
GIF image data, version 87a, 114 x 150
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Logo.gif
GIF image data, version 89a, 309 x 179
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Mailing.gif
GIF image data, version 87a, 114 x 150
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_MailingUS.gif
GIF image data, version 87a, 114 x 150
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_PROGBAR_Activ.png
PNG image data, 216 x 14, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_PROGBAR_Bg.png
PNG image data, 216 x 14, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_PROGBAR_C_Bckgrd.png
PNG image data, 227 x 227, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_PROGBAR_C_Border.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_PROGBAR_C_Center.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_PROGBAR_C_Center2.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Add_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Apply_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Browse_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_BrwFirst_V_24_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_BrwForward_V_24_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_BrwLast_V_24_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_BrwNext_H_24_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_BrwNext_V_24_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Cancel_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Copy_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Correct_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Cut_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Delete_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Detail_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Help_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Home_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Import_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Link_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_List_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_LogOff_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Modify_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_NavigForward_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_NavigNext_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_ParentFolder_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Paste_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_PeriodNext_24_5.png
PNG image data, 120 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_PeriodPrevious_24_5.png
PNG image data, 120 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_PlaneForward_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Print_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Redo_24_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Refresh_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Repair_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Ribbon_Cancel.png
PNG image data, 160 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Ribbon_Delete.png
PNG image data, 120 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Ribbon_List.png
PNG image data, 215 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Ribbon_Modify.png
PNG image data, 160 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Ribbon_New.png
PNG image data, 160 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Ribbon_Ok.png
PNG image data, 165 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Ribbon_Open.png
PNG image data, 215 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Ribbon_Preview.png
PNG image data, 135 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Ribbon_Print.png
PNG image data, 160 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Save_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Search_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Syst_Close_5.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Syst_Maximise_5.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Syst_Minimize_5.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Syst_Restore_5.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Syst_umc_5.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Tab_Add_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Tab_Close_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Trad_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_Undo_24_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_VisionPlus_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Pict_open_16_5.png
PNG image data, 80 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Radio.png
PNG image data, 168 x 14, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Resize.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Ribbon_Separ.png
PNG image data, 48 x 93, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Ribbon_Tab.png
PNG image data, 400 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Ribbon_Tab_Color.png
PNG image data, 400 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Rollover.png
PNG image data, 128 x 54, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Scroll_H.png
PNG image data, 360 x 45, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Scroll_H_2.png
PNG image data, 360 x 45, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Scroll_V.png
PNG image data, 60 x 120, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Scroll_V_2.png
PNG image data, 60 x 120, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Select.png
PNG image data, 620 x 50, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Side_Light.png
PNG image data, 400 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Sld_Bckgrd.png
PNG image data, 154 x 2, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Sld_Cursor.png
PNG image data, 48 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Sld_V_Bckgrd.png
PNG image data, 2 x 154, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Spliter_Grip_H.png
PNG image data, 15 x 3, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Spliter_Grip_v.png
PNG image data, 3 x 15, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_TV_Node_Close.png
PNG image data, 32 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_TabSlide_Bottom.gif
GIF image data, version 89a, 60 x 26
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_TabSlide_Top.gif
GIF image data, version 89a, 60 x 28
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Tab_Bottom.png
PNG image data, 118 x 36, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Tab_Left.png
PNG image data, 72 x 28, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Tab_MDI_Btn-New.png
PNG image data, 200 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Tab_MDI_Top.png
PNG image data, 80 x 28, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Tab_MDI_Top_2.png
PNG image data, 80 x 36, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Tab_Right.png
PNG image data, 72 x 28, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Tab_Top.png
PNG image data, 118 x 36, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Tab_Top_Bg.png
PNG image data, 24 x 20, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Table.gif
GIF image data, version 87a, 114 x 150
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_TableUS.gif
GIF image data, version 87a, 114 x 150
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Table_ColPict.png
PNG image data, 33 x 53, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_Table_ColTitle.png
PNG image data, 400 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_WDMSGBOX-ERROR.png
PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_WDMSGBOX-INFO.png
PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_WDMSGBOX-PERSO.png
PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\GAB4F22.tmp\GenFlat_WDMSGBOX-QUESTION.png
PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\STDDEFF.tmp
Generic INItialization configuration [WDSETUP]
modified
C:\Users\user\AppData\Local\Temp\UPDDAD8.tmp
Generic INItialization configuration [WDSETUP]
dropped
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\INST.WXF
data
dropped
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\WDMetabase.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\WDRelanceur.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\WDSetupFont.ttf
TrueType Font data, digitally signed, 19 tables, 1st "DSIG", 30 names, Macintosh, Digitized data copyright \251 2010-2011, Google Corporation.Open Sans LightRegularAscender - Ope
dropped
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\WDSetupFontLicence.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\WDUPDATE.NET
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\__GABARIT.ZIP
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\wd260com.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\wd260hf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\wd260mat.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\wd260mdl.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\wd260obj.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\wd260ole.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\wd260pnt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\wd260sql.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\wd260std.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\wd260trs.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\wd260uni.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\wd260vm.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\wd260xml.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\wd260zip.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WDS6B85.tmp\_FRAMEWORK\1\wd260action.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WDS6B85.tmp\_FRAMEWORK\1\wd260barc.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WDS6B85.tmp\_FRAMEWORK\1\wd260cpl.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WDS6B85.tmp\_FRAMEWORK\1\wd260grf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WDS6B85.tmp\_FRAMEWORK\1\wd260html.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WDS6B85.tmp\_FRAMEWORK\1\wd260pdf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WDS6B85.tmp\_FRAMEWORK\1\wd260pic.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WDS6B85.tmp\_FRAMEWORK\1\wd260prn.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WDS6B85.tmp\_FRAMEWORK\1\wd260rtf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WDS6B85.tmp\_FRAMEWORK\1\wd260wk.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WDS6B85.tmp\_FRAMEWORK\1\wd260xls.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WD_171A.tmp\INSTALL.INI
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\WD_171A.tmp\WDUpdate.net
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\WX_B959.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\WX_B979.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\WDSetup\SIGASIGA-ADMINISTRATION\SIGASIGA-ADMINISTRATION_WDSETUP.wx
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Syst me Int gr de Gestion des Abonn s - Module d'administration.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Archive, ctime=Fri May 29 20:17:16 2020, mtime=Fri May 29 20:17:16 2020, atime=Fri May 29 20:17:16 2020, length=340, window=hide
dropped
There are 269 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\Temp\WD_171A.tmp\INSTALL.EXE
"C:\Users\user\AppData\Local\Temp\WD_171A.tmp\INSTALL.EXE"
malicious
C:\Users\user\AppData\Local\Temp\WD1C79.tmp\WDSetup.EXE
"C:\Users\user\AppData\Local\Temp\WD1C79.tmp\WDSetup.EXE" /REP="C:\Users\user\AppData\Local\Temp\WD1C79.tmp\" /PID_PARENT=6388 /VERSION_PARENT=26 /COMPOSITE=0 /WXF="C:\Users\user\AppData\Local\Temp\WD1C79.tmp\INST.WXF" "C:\Users\user\AppData\Local\Temp\WD_171A.tmp\INSTALL.EXE"
malicious
C:\Users\user\Desktop\INSTALL.EXE
"C:\Users\user\Desktop\INSTALL.EXE"
C:\Program Files (x86)\SIGA\SIGA-ADMINISTRATION.exe
"C:\Program Files (x86)\SIGA\SIGA-ADMINISTRATION.exe"

URLs

Name
IP
Malicious
http://scap.nist.gov/specifications/tmsad/#resource-1.0
unknown
http://www.inf-az.com/SIGA-ADMINISTRATION/INSTALL/_UPDATE.ZIP
unknown
http://www.linkedin.com/shareArticle?mini=true&url=https://plus.google.com/share?url=http://twitter.
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordText
unknown
http://jqueryui.com
unknown
https://web.archive.org/web/20100324014747/http://blindsignals.com/index.php/2009/07/jquery-delay/
unknown
https://promisesaplus.com/#point-75
unknown
https://html.spec.whatwg.org/multipage/forms.html#concept-fe-disabled
unknown
https://bugs.webkit.org/show_bug.cgi?id=29084
unknown
http://www.ascc.net/xml/schematron
unknown
https://infra.spec.whatwg.org/#strip-and-collapse-ascii-whitespace
unknown
http://https://.xsdHTTP
unknown
http://www.inf-az.com/SIGA-ADMINISTRATION/INSTALL/WDUPDATE.NETP
unknown
http://api.messaging-service.com/sms/1/text/single
unknown
http://github.com/tapmodo/Jcrop
unknown
https://html.spec.whatwg.org/multipage/forms.html#concept-option-disabled
unknown
http://www.inf-az.com/SIGA-ADMINISTRATION/INSTALL/INSTALL.ZIP
unknown
https://github.com/jrburke/requirejs/wiki/Updating-existing-libraries#wiki-anon
unknown
https://www.pcsoft.frM
unknown
http://www.aleksey.com/xmlsec/xmlsec_2002#AESKeyValue
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=687787
unknown
http://maps.google.com/maps/api/js?Mozilla/5.0
unknown
https://www.pcsoft.fr
unknown
https://pcscloud.net/FR/cloud_service.awp
unknown
https://i.stack.imgur.com/WSmLn.png?s=32&g=1
unknown
https://bugs.chromium.org/p/chromium/issues/detail?id=470258
unknown
https://bugs.jquery.com/ticket/13378
unknown
https://promisesaplus.com/#point-64
unknown
http://TLM/WDANALYTICS_WEB/awws/WDAnalytics.rawwsTLMTLM_Critere/TLMUUDECODEDateLastAaf24B2446A4A3C44
unknown
https://developer.mozilla.org/en/DOM/window.scrollX)
unknown
https://github.com/nickpettit/glide
unknown
https://promisesaplus.com/#point-61
unknown
http://www.pcsoft.fr
unknown
http://www.aleksey.com/xmlsec/xmlsec_2002#DESKeyValue
unknown
http://svn.webkit.org/repository/webkit/trunk/Source/WebCore/page/animation/AnimationBase.cpp
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.inf-az.com/SIGA-ADMINISTRATION/INSTALL/__WDINST.ZIP
unknown
https://html.spec.whatwg.org/#nonce-attributes
unknown
http://stackoverflow.com/questions/11214651/google-maps-api-v3-gray-areas
unknown
http://www.pcsoft.frn
unknown
http://ns.adobe
unknown
https://jsperf.com/getall-vs-sizzle/2
unknown
http://jqueryui.com/themeroller/?scope=&folderName=base&cornerRadiusShadow=8px&offsetLeftShadow=0px&
unknown
http://wwww3.1999
unknown
http://ns.a
unknown
http://ns.aobe
unknown
http://www.pcsoft.fr58
unknown
https://developer.mozilla.org/en-US/docs/Web/JavaScript/Guide/Control_flow_and_error_handling
unknown
https://developer.mozilla.org/en-US/docs/CSS/display
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://www.aleksey.com/xmlsec/xmlsec_2002#HMACKeyValue
unknown
https://jquery.com/
unknown
https://www.google.fr/search?q=%shttps://www.google.com/search?q=%shttp://help.windev.com/aaf.awp?t=
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://www.inf-az.com/SIGA-ADMINISTRATION/INSTALL/WDUPDATE.NET
unknown
http://https://:/?_.#&;=%20
unknown
https://github.com/jquery/sizzle/pull/225
unknown
https://bugs.jquery.com/ticket/4833
unknown
https://sizzlejs.com/
unknown
https://bugs.chromium.org/p/chromium/issues/detail?id=449857
unknown
https://js.foundation/
unknown
https://bugs.jquery.com/ticket/13393
unknown
http://maps.google.com/maps/api/js?v=3
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdwsa:FaultTowsseSecu
unknown
https://bugs.webkit.org/show_bug.cgi?id=136851
unknown
https://codepen.io/teeganlincoln/pen/mjjzeE)
unknown
https://jsperf.com/thor-indexof-vs-for/5
unknown
https://stackoverflow.com/questions/5608758/get-delete-event-of-edited-element
unknown
https://bugs.jquery.com/ticket/12359
unknown
http://www.inf-az.com/SIGA-ADMINISTRATION/INSTALL/_UPDATE.ZIPX
unknown
http://maps.google.com/maps/api/js?
unknown
http://maps.google.com/maps/api/js?v=3&libraries=geometry
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://html.spec.whatwg.org/#strip-and-collapse-whitespace
unknown
http://ns.aobe/xap
unknown
http://purl.oclc.org/dsdl/schematron
unknown
https://web.archive.org/web/20141116233347/http://fluidproject.org/blog/2008/01/09/getting-setting-a
unknown
https://drafts.csswg.org/cssom/#common-serializing-idioms
unknown
https://curl.haxx.se/docs/http-cookies.html
unknown
http://www.inf-az.com/SIGA-ADMINISTRATION/INSTALL/_FRAMEWORK.ZIP
unknown
http://www.w3.
unknown
https://github.com/jquery/jquery/pull/557)
unknown
http://www.ascendercorp.com/http://www.ascendercorp.com/typedesigners.htmlLicensed
unknown
https://pcscloud.net/FR/cloud_service_plateforme.awp
unknown
http://localdocument/%s/mail.htmlimage/svg
unknown
https://bugs.chromium.org/p/chromium/issues/detail?id=378607
unknown
http://daneden.me/animate
unknown
http://www.aleksey.com/xmlsec/xmlsec_2002
unknown
http://www.ascc.net/xml/schematronhttp://purl.oclc.org/dsdl/schematronallocating
unknown
https:///WDANALYTICSCOLLECT_WEB/Collect.rawp?MUI=
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://www.inf-az.com/SIGA-ADMINISTRATION/INSTALL/WDUPDATE.NETNoV
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordDigest
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://jsperf.com/alternative-isfunction-implementations
unknown
https://drafts.csswg.org/cssom/#resolved-values
unknown
https://bugs.chromium.org/p/chromium/issues/detail?id=589347
unknown
http://schemas.xmlsoap.org/soap/encoding/application/soap
unknown
http://www.aiim.org/pdfa/ns/id/
unknown
http://www.apache.org/licenses/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.inf-az.com
23.161.96.139

IPs

IP
Domain
Country
Malicious
23.161.96.139
www.inf-az.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\INITINST
DecouvertFaaPosFenNb
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\INITINST
DecouvertFaaPosFen
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\6\SIGASIGA-ADMINISTRATION
REPINST
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\6\SIGASIGA-ADMINISTRATION
PATCH_EXE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\SIGA-ADMINISTRATION.exe
NULL
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\6\SIGASIGA-ADMINISTRATION
PATCH_EXE0001
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDEtat Utilisateur\26.0\Common\MRI\SIGASIGA-ADMINISTRATION
Path
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDEtat Utilisateur\26.0\Common\MRI\SIGASIGA-ADMINISTRATION
DisplayName
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP
DecouvertFaaPosFenNb
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP
DecouvertFaaPosFen
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FenParamCx\FI_CxDetail\TABLE_InfosEtendues
Checksum
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FenParamCx\FI_CxDetail\TABLE_InfosEtendues
Largeur
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FenParamCx\FI_CxDetail\TABLE_InfosEtendues
Zoom
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FenParamCx\FI_CxDetail\TABLE_InfosEtendues
ConfigurationAncrage
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FenParamCx\FI_CxDetail\TABLE_InfosEtendues\COL_SInfo
IndiceAffichageOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FenParamCx\FI_CxDetail\TABLE_InfosEtendues\COL_SInfo
LargeurOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FenParamCx\FI_CxDetail\TABLE_InfosEtendues\COL_SInfo
LargeurInitiale
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FenParamCx\FI_CxDetail\TABLE_InfosEtendues\COL_SInfo
IndiceCreation
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FenParamCx\FI_CxDetail\TABLE_InfosEtendues\COL_SInfo
LargeurRefAncrage
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FenParamCx\FI_CxDetail\TABLE_InfosEtendues\COL_SInfo
FixeAGaucheEnOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FenParamCx\FI_CxDetail\TABLE_InfosEtendues\COL_SInfo
VisibleOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FenParamCx\FI_CxDetail\TABLE_InfosEtendues\COL_SInfo
VisibleInitial
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FenParamCx\FI_CxDetail\TABLE_InfosEtendues\COL_SValeur
IndiceAffichageOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FenParamCx\FI_CxDetail\TABLE_InfosEtendues\COL_SValeur
LargeurOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FenParamCx\FI_CxDetail\TABLE_InfosEtendues\COL_SValeur
LargeurInitiale
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FenParamCx\FI_CxDetail\TABLE_InfosEtendues\COL_SValeur
IndiceCreation
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FenParamCx\FI_CxDetail\TABLE_InfosEtendues\COL_SValeur
LargeurRefAncrage
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_RPCUsers\TABLE_UserRPC
Checksum
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_RPCUsers\TABLE_UserRPC
Largeur
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_RPCUsers\TABLE_UserRPC
ConfigurationAncrage
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_RPCUsers\TABLE_UserRPC\COL_User
LargeurOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_RPCUsers\TABLE_UserRPC\COL_User
LargeurInitiale
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_RPCUsers\TABLE_UserRPC\COL_User
LargeurRefAncrage
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_RPCUsers\TABLE_UserRPC\COL_PwdUser
LargeurOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_RPCUsers\TABLE_UserRPC\COL_PwdUser
LargeurInitiale
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_RPCUsers\TABLE_UserRPC\COL_PwdUser
LargeurRefAncrage
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_RPCConfigAnalyse\TABLE_CheminRPC
Checksum
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_RPCConfigAnalyse\TABLE_CheminRPC
ConfigurationAncrage
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_RPCConfigAnalyse\TABLE_CheminRPC\COL_RepAna
LargeurOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_RPCConfigAnalyse\TABLE_CheminRPC\COL_RepAna
LargeurInitiale
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_RPCConfigAnalyse\TABLE_CheminRPC\COL_RepAna
LargeurRefAncrage
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_RPCConfigAnalyse\TABLE_CheminRPC\COL_RepSrv
LargeurOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_RPCConfigAnalyse\TABLE_CheminRPC\COL_RepSrv
LargeurInitiale
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_RPCConfigAnalyse\TABLE_CheminRPC\COL_RepSrv
LargeurRefAncrage
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_RPCConfigAnalyse\TABLE_CheminRPC\COL_SelectRep
IndiceAffichageOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_RPCConfigAnalyse\TABLE_CheminRPC\COL_SelectRep
LargeurOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_RPCConfigAnalyse\TABLE_CheminRPC\COL_SelectRep
LargeurInitiale
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_RPCConfigAnalyse\TABLE_CheminRPC\COL_SelectRep
IndiceCreation
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_RPCConfigAnalyse\TABLE_CheminRPC\COL_SelectRep
LargeurRefAncrage
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_FiltreReplication\TABLE_ParamReplic
Checksum
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_FiltreReplication\TABLE_ParamReplic
Largeur
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_FiltreReplication\TABLE_ParamReplic\COL_Param tre
LargeurOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_FiltreReplication\TABLE_ParamReplic\COL_Param tre
LargeurInitiale
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_FiltreReplication\TABLE_ParamReplic\COL_Param tre
LargeurRefAncrage
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_FiltreReplication\TABLE_ParamReplic\COL_Valeur
LargeurOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_FiltreReplication\TABLE_ParamReplic\COL_Valeur
LargeurInitiale
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_FiltreReplication\TABLE_ParamReplic\COL_Valeur
LargeurRefAncrage
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_BaseMaitreConnecte\FI_CxDetail\TABLE_InfosEtendues
Largeur
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_BaseMaitreConnecte\FI_CxDetail\TABLE_InfosEtendues\COL_SValeur
LargeurOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_BaseMaitreConnecte\FI_CxDetail\TABLE_InfosEtendues\COL_SValeur
LargeurInitiale
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_BaseMaitreConnecte\FI_CxDetail\TABLE_InfosEtendues\COL_SValeur
LargeurRefAncrage
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_BaseMaitreConnecte\FI_CxDetail\TABLE_InfosEtendues\COL_SValeur
FixeAGaucheEnOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_BaseMaitreConnecte\FI_CxDetail\TABLE_InfosEtendues\COL_SValeur
VisibleOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_BaseMaitreConnecte\FI_CxDetail\TABLE_InfosEtendues\COL_SValeur
VisibleInitial
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_ConfigRPC\TABLE_PortRPC
Checksum
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_ConfigRPC\TABLE_PortRPC
Largeur
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_ConfigRPC\TABLE_PortRPC
Zoom
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_ConfigRPC\TABLE_PortRPC
ConfigurationAncrage
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_ConfigRPC\TABLE_PortRPC\COL_Port
IndiceAffichageOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_ConfigRPC\TABLE_PortRPC\COL_Port
LargeurOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_ConfigRPC\TABLE_PortRPC\COL_Port
LargeurInitiale
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_ConfigRPC\TABLE_PortRPC\COL_Port
IndiceCreation
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_ConfigRPC\TABLE_PortRPC\COL_Port
LargeurRefAncrage
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_ConfigRPC\TABLE_PortRPC\COL_Port
FixeAGaucheEnOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_ConfigRPC\TABLE_PortRPC\COL_Port
VisibleOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_ConfigRPC\TABLE_PortRPC\COL_Port
VisibleInitial
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_ConfigRPC\TABLE_PortRPC\COL_Cryptage
IndiceAffichageOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_ConfigRPC\TABLE_PortRPC\COL_Cryptage
LargeurOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_ConfigRPC\TABLE_PortRPC\COL_Cryptage
LargeurInitiale
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_ConfigRPC\TABLE_PortRPC\COL_Cryptage
IndiceCreation
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_ConfigRPC\TABLE_PortRPC\COL_Cryptage
LargeurRefAncrage
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_ConfigRPC\TABLE_PortRPC\COL_Cryptage
FixeAGaucheEnOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_ConfigRPC\TABLE_PortRPC\COL_Cryptage
VisibleOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_ConfigRPC\TABLE_PortRPC\COL_Cryptage
VisibleInitial
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_ConfigRPC\TABLE_PortRPC\COL_Pwd
IndiceAffichageOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_ConfigRPC\TABLE_PortRPC\COL_Pwd
LargeurOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_ConfigRPC\TABLE_PortRPC\COL_Pwd
LargeurInitiale
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_ConfigRPC\TABLE_PortRPC\COL_Pwd
IndiceCreation
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_ConfigRPC\TABLE_PortRPC\COL_Pwd
LargeurRefAncrage
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_BaseLocale\FI_CxDetail\TABLE_InfosEtendues
Checksum
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_BaseLocale\FI_CxDetail\TABLE_InfosEtendues
Largeur
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_BaseLocale\FI_CxDetail\TABLE_InfosEtendues
Zoom
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_BaseLocale\FI_CxDetail\TABLE_InfosEtendues
ConfigurationAncrage
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_BaseLocale\FI_CxDetail\TABLE_InfosEtendues\COL_SInfo
IndiceAffichageOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_BaseLocale\FI_CxDetail\TABLE_InfosEtendues\COL_SInfo
LargeurOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_BaseLocale\FI_CxDetail\TABLE_InfosEtendues\COL_SInfo
LargeurInitiale
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_BaseLocale\FI_CxDetail\TABLE_InfosEtendues\COL_SInfo
IndiceCreation
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_BaseLocale\FI_CxDetail\TABLE_InfosEtendues\COL_SInfo
LargeurRefAncrage
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_BaseLocale\FI_CxDetail\TABLE_InfosEtendues\COL_SValeur
IndiceAffichageOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_BaseLocale\FI_CxDetail\TABLE_InfosEtendues\COL_SValeur
LargeurOuverture
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_BaseLocale\FI_CxDetail\TABLE_InfosEtendues\COL_SValeur
LargeurInitiale
HKEY_CURRENT_USER\SOFTWARE\PC SOFT\WDSetup\ASSSETUP\FI_BaseLocale\FI_CxDetail\TABLE_InfosEtendues\COL_SValeur
LargeurRefAncrage
HKEY_CURRENT_USER\SOFTWARE\DINEPA\SIGA-ADMINISTRATION\FEN_COMMENCER\SAI_Utilisateur
DecouvertFaaHash
HKEY_CURRENT_USER\SOFTWARE\DINEPA\SIGA-ADMINISTRATION\FEN_COMMENCER\SAI_Utilisateur
DecouvertFaaNb
HKEY_CURRENT_USER\SOFTWARE\WinDev Applications\AAF
DateLastDiscoveryToast
There are 95 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
8D97000
heap
page read and write
5F23000
heap
page read and write
67570000
unkown
page readonly
6D9E000
heap
page read and write
5DE4000
heap
page read and write
613C000
heap
page read and write
3667000
heap
page read and write
5F36000
heap
page read and write
70FD000
heap
page read and write
6ACA000
heap
page read and write
6510000
heap
page read and write
15FD000
heap
page read and write
6145000
heap
page read and write
6ECF000
heap
page read and write
3184000
heap
page read and write
67276000
unkown
page read and write
5C08000
heap
page read and write
7F05000
heap
page read and write
671D0000
unkown
page readonly
5F30000
heap
page read and write
3BC4000
heap
page read and write
3A5C000
stack
page read and write
5EAF000
heap
page read and write
3405000
heap
page read and write
67856000
unkown
page readonly
5CFE000
heap
page read and write
547F000
stack
page read and write
674D000
heap
page read and write
6D1F000
heap
page read and write
33F0000
heap
page read and write
5FC9000
heap
page read and write
5F8D000
heap
page read and write
6D9E000
heap
page read and write
671C000
heap
page read and write
6AD1000
heap
page read and write
681A0000
unkown
page readonly
5FE1000
heap
page read and write
40A5000
heap
page read and write
6A59B000
unkown
page readonly
69629000
unkown
page read and write
7F09000
heap
page read and write
8CE7000
heap
page read and write
6364000
heap
page execute and read and write
61E6000
heap
page read and write
5D7E000
heap
page read and write
6A44D000
unkown
page read and write
6FDC000
heap
page read and write
671F000
heap
page read and write
58CD000
heap
page read and write
15FD000
heap
page read and write
AED000
heap
page read and write
5DD2000
heap
page read and write
3512000
heap
page read and write
B18000
heap
page read and write
5EDA000
heap
page read and write
671D000
heap
page read and write
408F000
heap
page read and write
70AC000
heap
page read and write
3BBF000
heap
page read and write
354B000
heap
page read and write
5DE6000
heap
page read and write
6AF8000
heap
page read and write
576D000
stack
page read and write
5DFB000
heap
page read and write
6709B000
unkown
page execute read
6203000
heap
page read and write
3579000
heap
page read and write
674F000
heap
page read and write
6E8C000
heap
page read and write
9B39000
heap
page read and write
5C6E000
stack
page read and write
ABE000
heap
page read and write
5F97000
heap
page read and write
5DE3000
heap
page read and write
6BE9000
heap
page read and write
3BBF000
heap
page read and write
6C1000
unkown
page execute read
5D0B000
heap
page read and write
5DDA000
heap
page read and write
6719C000
unkown
page readonly
6A041000
unkown
page execute read
5B19000
heap
page read and write
6FBA000
heap
page read and write
5CB8000
heap
page read and write
4800000
trusted library allocation
page read and write
3713000
heap
page read and write
6709D000
unkown
page execute read
40B7000
heap
page read and write
6CBC000
heap
page read and write
6AB52000
unkown
page readonly
5BF6000
heap
page read and write
6736000
heap
page read and write
671B000
heap
page read and write
671F000
heap
page read and write
154A000
heap
page read and write
6DF9000
heap
page read and write
5CFA000
heap
page read and write
32E6000
heap
page read and write
5911000
heap
page read and write
74E0000
heap
page read and write
3BEE000
stack
page read and write
3272000
heap
page read and write
5FC4000
heap
page read and write
60C6000
heap
page read and write
8D6C000
heap
page read and write
649D000
heap
page read and write
61EA000
heap
page read and write
6EE8000
heap
page read and write
3561000
heap
page read and write
5913000
heap
page read and write
6AD1000
heap
page read and write
4095000
heap
page read and write
6E90000
heap
page read and write
5E77000
heap
page read and write
605E000
heap
page read and write
3D2F000
stack
page read and write
ADE000
heap
page read and write
7305000
heap
page read and write
5C93000
heap
page read and write
611C000
heap
page execute and read and write
6BA6000
heap
page read and write
58F4000
heap
page read and write
8EDD000
heap
page read and write
501000
unkown
page execute read
6712000
heap
page read and write
2EE0000
heap
page execute and read and write
8BDE000
heap
page read and write
CC6000
heap
page read and write
673B000
heap
page read and write
5D9F000
heap
page read and write
ACF000
heap
page read and write
356E000
heap
page read and write
7338000
heap
page read and write
B05000
heap
page read and write
5DF8000
heap
page read and write
6AD0000
heap
page read and write
62FD000
heap
page execute and read and write
507E000
stack
page read and write
327A000
heap
page read and write
6BDD000
heap
page read and write
367C000
heap
page read and write
5F0B000
heap
page read and write
15FC000
heap
page read and write
6AB50000
unkown
page read and write
AFD000
heap
page read and write
15FC000
heap
page read and write
3636000
heap
page read and write
5CEE000
heap
page read and write
6DDB000
heap
page read and write
72D7000
heap
page read and write
8F86000
heap
page read and write
AD3000
heap
page read and write
610F000
heap
page read and write
699B1000
unkown
page execute read
161A000
heap
page read and write
61F0000
heap
page read and write
5E78000
heap
page read and write
B19000
heap
page read and write
5BDF000
heap
page read and write
3518000
heap
page read and write
6014000
heap
page read and write
6D9E000
heap
page read and write
62AF000
heap
page execute and read and write
5DF3000
heap
page read and write
36AC000
heap
page read and write
2589000
heap
page read and write
593A000
heap
page read and write
8C6D000
heap
page read and write
6284000
heap
page execute and read and write
5F88000
heap
page read and write
6BE3000
heap
page read and write
6C5E000
heap
page read and write
ACE000
heap
page read and write
B18000
heap
page read and write
6506000
heap
page read and write
71BC000
heap
page read and write
A9D000
heap
page read and write
61BA000
heap
page read and write
3900000
heap
page execute and read and write
5E66000
heap
page read and write
61BB000
heap
page read and write
43BC000
stack
page read and write
599F000
heap
page read and write
B05000
heap
page read and write
6FED000
heap
page read and write
35B3000
heap
page read and write
6155000
heap
page read and write
307F000
heap
page read and write
5E42000
heap
page read and write
357B000
heap
page read and write
62EB000
heap
page execute and read and write
6B04000
heap
page read and write
63F2000
heap
page execute and read and write
5D5B000
heap
page read and write
2D80000
trusted library allocation
page read and write
7076000
heap
page read and write
5E97000
heap
page read and write
6192000
heap
page read and write
6AE4000
heap
page read and write
671F000
heap
page read and write
72DC000
heap
page read and write
67832000
unkown
page readonly
6B83000
heap
page read and write
AF0000
heap
page read and write
7F06000
heap
page read and write
5EE0000
heap
page read and write
4030000
heap
page read and write
60C2000
heap
page read and write
B18000
heap
page read and write
301F000
heap
page read and write
59A6000
heap
page read and write
6C37000
heap
page read and write
5B38000
heap
page read and write
5E87000
heap
page read and write
708F000
heap
page read and write
6AD0000
heap
page read and write
A50000
heap
page execute and read and write
6E08000
heap
page read and write
AF0000
heap
page read and write
704D000
heap
page read and write
637A000
heap
page execute and read and write
6DE1000
heap
page read and write
59AC000
heap
page read and write
3262000
heap
page read and write
61A4000
heap
page read and write
8BD9000
heap
page read and write
6736000
heap
page read and write
6FEF000
heap
page read and write
6087000
heap
page read and write
6BED000
heap
page read and write
68326000
unkown
page read and write
66E70000
unkown
page readonly
5D3A000
heap
page read and write
5CFA000
heap
page read and write
AAA000
heap
page read and write
5935000
heap
page read and write
6C3A000
heap
page read and write
6070000
heap
page read and write
B18000
heap
page read and write
670F000
heap
page read and write
3187000
heap
page read and write
6FD1000
heap
page read and write
34E5000
heap
page read and write
ABE000
heap
page read and write
627F000
heap
page execute and read and write
60D8000
heap
page read and write
6104000
heap
page read and write
6C20000
heap
page read and write
6815A000
unkown
page write copy
6717000
heap
page read and write
654E000
stack
page read and write
63D3000
heap
page execute and read and write
6104000
heap
page read and write
5FC1000
heap
page read and write
A9A000
heap
page read and write
41FB000
heap
page read and write
671D000
heap
page read and write
71DA000
heap
page read and write
5D7E000
heap
page read and write
5F2B000
heap
page read and write
8CC2000
heap
page read and write
1145000
heap
page read and write
630A000
heap
page execute and read and write
6CA2000
heap
page read and write
68A33000
unkown
page readonly
67231000
unkown
page readonly
5CF3000
heap
page read and write
6ABCA000
unkown
page readonly
7088000
heap
page read and write
40DD000
heap
page read and write
AE3000
heap
page read and write
35EB000
heap
page read and write
5CD3000
heap
page read and write
36FE000
heap
page read and write
687CF000
unkown
page readonly
B05000
heap
page read and write
6292000
heap
page execute and read and write
593A000
heap
page read and write
5DC1000
heap
page read and write
6270000
heap
page execute and read and write
6816D000
unkown
page read and write
5ED4000
heap
page read and write
6736000
heap
page read and write
621E000
heap
page read and write
69505000
unkown
page readonly
A659000
heap
page read and write
671E000
heap
page read and write
5BD5000
heap
page read and write
5DE7000
heap
page read and write
377F000
heap
page read and write
5932000
heap
page read and write
6143000
heap
page read and write
60F0000
heap
page read and write
8CCF000
heap
page read and write
5CB0000
heap
page read and write
5935000
heap
page read and write
AE3000
heap
page read and write
61BB000
heap
page read and write
630C000
heap
page execute and read and write
6725000
heap
page read and write
5E70000
heap
page read and write
8BEF000
heap
page read and write
362B000
heap
page read and write
8BEF000
heap
page read and write
5D4A000
heap
page read and write
32E6000
heap
page read and write
15DE000
heap
page read and write
62D9000
heap
page execute and read and write
6CB6000
heap
page read and write
660C000
heap
page read and write
301E000
heap
page read and write
5D4A000
heap
page read and write
607B000
heap
page read and write
8BD6000
heap
page read and write
69871000
unkown
page write copy
5CD8000
heap
page read and write
B19000
heap
page read and write
6CAD000
heap
page read and write
7052000
heap
page read and write
5B6D000
stack
page read and write
601F000
heap
page read and write
7076000
heap
page read and write
671E5000
unkown
page readonly
6030000
heap
page read and write
5DAB000
heap
page read and write
6D91000
heap
page read and write
5E92000
heap
page read and write
5E7F000
heap
page read and write
708C000
heap
page read and write
61B9000
heap
page read and write
15C8000
heap
page read and write
5935000
heap
page read and write
671D000
heap
page read and write
671F000
heap
page read and write
2A9E000
stack
page read and write
5CBE000
heap
page read and write
5C70000
trusted library allocation
page read and write
5DF0000
heap
page read and write
39DE000
stack
page read and write
61A2000
heap
page read and write
7F8E000
stack
page read and write
B34000
heap
page read and write
5D6B000
heap
page read and write
6B4C7000
unkown
page readonly
8E7E000
heap
page read and write
6090000
heap
page read and write
6B2C000
heap
page read and write
547000
unkown
page read and write
3BCE000
heap
page read and write
3009000
heap
page read and write
35E5000
heap
page read and write
533E000
stack
page read and write
C3E000
stack
page read and write
561E000
stack
page read and write
6FF3000
heap
page read and write
9CDC000
heap
page read and write
AED000
heap
page read and write
CB7000
heap
page read and write
5929000
heap
page read and write
8C8E000
heap
page read and write
5E65000
heap
page read and write
406C000
heap
page read and write
2BB0000
heap
page read and write
671A000
heap
page read and write
3501000
heap
page read and write
6C2A000
heap
page read and write
156E000
heap
page read and write
6F2B000
heap
page read and write
6708000
heap
page read and write
6C1A000
heap
page read and write
671B000
heap
page read and write
15FD000
heap
page read and write
6824E000
unkown
page execute read
6554000
heap
page read and write
5BEC000
heap
page read and write
671B000
heap
page read and write
7348000
heap
page read and write
606A000
heap
page read and write
6D23000
heap
page read and write
ABB000
heap
page read and write
59D6000
heap
page read and write
CAA000
heap
page read and write
60FC000
heap
page read and write
6E2E000
heap
page read and write
5FE8000
heap
page read and write
674D000
heap
page read and write
5D39000
heap
page read and write
673B000
heap
page read and write
6757E000
unkown
page readonly
340D000
heap
page read and write
594E000
heap
page execute and read and write
5D6D000
heap
page read and write
B18000
heap
page read and write
6183000
heap
page read and write
3777000
heap
page read and write
67270000
unkown
page write copy
5D33000
heap
page read and write
6D31000
heap
page read and write
5D55000
heap
page read and write
6C96000
heap
page read and write
AE3000
heap
page read and write
B05000
heap
page read and write
5FC4000
heap
page read and write
58F0000
heap
page read and write
357F000
heap
page read and write
3C40000
heap
page read and write
1143000
heap
page read and write
6B85000
heap
page read and write
6709000
heap
page read and write
5EE2000
heap
page read and write
6EE4000
heap
page read and write
37C3000
heap
page read and write
3BC9000
heap
page read and write
391E000
heap
page read and write
4090000
heap
page read and write
40A6000
heap
page read and write
612C000
heap
page read and write
AAA000
heap
page read and write
ACE000
heap
page read and write
8BE4000
heap
page read and write
37D4000
heap
page read and write
2A30000
heap
page read and write
A82000
heap
page read and write
64EF000
heap
page read and write
69284000
unkown
page execute read
5B9D000
heap
page read and write
6FA8000
heap
page read and write
62F4000
heap
page execute and read and write
8B7D000
stack
page read and write
62C1000
heap
page execute and read and write
AA0000
heap
page read and write
61F8000
heap
page read and write
40AF000
heap
page read and write
5C10000
heap
page read and write
6AD2000
heap
page read and write
6244000
heap
page read and write
613C000
heap
page read and write
35FB000
heap
page read and write
408C000
heap
page read and write
A5D000
heap
page read and write
1156000
heap
page read and write
5D4F000
heap
page read and write
B18000
heap
page read and write
5E2D000
heap
page read and write
6CA2000
heap
page read and write
8BD0000
trusted library allocation
page read and write
5C16000
heap
page read and write
6720000
heap
page read and write
490000
unkown
page readonly
E4E000
stack
page read and write
713F000
heap
page read and write
6FD3000
heap
page read and write
673B000
heap
page read and write
706B000
heap
page read and write
671F000
heap
page read and write
420A000
heap
page read and write
5E0E000
heap
page read and write
6BBE000
heap
page read and write
113B000
heap
page read and write
670E000
heap
page read and write
73EB000
heap
page read and write
6AE6000
heap
page read and write
8ED6000
heap
page read and write
6E2B000
heap
page read and write
6EEB000
heap
page read and write
5C02000
heap
page read and write
671F000
heap
page read and write
5873000
heap
page read and write
6C6C000
heap
page read and write
6F45000
heap
page read and write
3BA2000
heap
page read and write
5A38000
heap
page read and write
670C1000
unkown
page execute read
4DB000
unkown
page write copy
377F000
heap
page read and write
673B000
heap
page read and write
4096000
heap
page read and write
3555000
heap
page read and write
6ED000
unkown
page readonly
58F8000
heap
page read and write
6783A000
unkown
page readonly
671C000
heap
page read and write
3BD9000
heap
page read and write
5912000
heap
page read and write
3446000
heap
page read and write
671FB000
unkown
page readonly
7323000
heap
page read and write
69509000
unkown
page readonly
6F92000
heap
page read and write
60D2000
heap
page read and write
8BD9000
heap
page read and write
611A000
heap
page read and write
AFD000
heap
page read and write
3C2F000
heap
page read and write
5929000
heap
page read and write
5EDA000
heap
page read and write
3065000
heap
page read and write
73B5000
heap
page read and write
7147000
heap
page read and write
5A40000
heap
page read and write
6D29000
heap
page read and write
5F93000
heap
page read and write
5BE8000
heap
page read and write
5D12000
heap
page read and write
3606000
heap
page read and write
704C000
heap
page read and write
67400000
unkown
page readonly
5FE1000
heap
page read and write
5CE8000
heap
page read and write
B05000
heap
page read and write
5D9F000
heap
page read and write
306F000
heap
page read and write
63E9000
heap
page read and write
31AE000
heap
page read and write
AE3000
heap
page read and write
6F73000
heap
page read and write
5E4A000
heap
page read and write
6E3B000
heap
page read and write
40AB000
heap
page read and write
6F88000
heap
page read and write
6100000
heap
page read and write
8BD3000
heap
page read and write
6D93000
heap
page read and write
62FD000
heap
page execute and read and write
5D3F000
heap
page read and write
AE3000
heap
page read and write
5BDC000
heap
page read and write
3028000
heap
page read and write
5D2D000
heap
page read and write
6FF1000
heap
page read and write
5DE3000
heap
page read and write
30BC000
heap
page read and write
5A76000
heap
page read and write
70FD000
heap
page read and write
9109000
heap
page read and write
6C9A000
heap
page read and write
6719000
heap
page read and write
30D2000
heap
page read and write
4055000
heap
page read and write
3207000
heap
page read and write
AA6000
heap
page read and write
5C2A000
heap
page read and write
6ED6000
heap
page read and write
500000
unkown
page readonly
6F47000
heap
page read and write
6455000
heap
page read and write
740D000
heap
page read and write
6F88000
heap
page read and write
730A000
heap
page read and write
373E000
stack
page read and write
6C56000
heap
page read and write
5A44000
heap
page read and write
C94000
heap
page read and write
55BF000
stack
page read and write
6C1A000
heap
page read and write
5C96000
heap
page read and write
5DB1000
heap
page read and write
3657000
heap
page read and write
5FCD000
heap
page read and write
1616000
heap
page read and write
6BD6000
heap
page read and write
30C2000
heap
page read and write
35FB000
heap
page read and write
1143000
heap
page read and write
AC2000
heap
page read and write
5E29000
heap
page read and write
59A4000
heap
page read and write
7311000
heap
page read and write
AE3000
heap
page read and write
6A43F000
unkown
page read and write
671A4000
unkown
page readonly
6180000
heap
page read and write
6FBA000
heap
page read and write
61F4000
heap
page read and write
6830B000
unkown
page readonly
300E000
heap
page read and write
671F000
heap
page read and write
671F000
heap
page read and write
7245000
heap
page read and write
300F000
heap
page read and write
6FC3000
heap
page read and write
6709000
heap
page read and write
5D26000
heap
page read and write
6B63000
heap
page read and write
6BA6000
heap
page read and write
6FA4000
heap
page read and write
5D89000
heap
page read and write
5BDC000
heap
page read and write
671F000
heap
page read and write
6108000
heap
page execute and read and write
3BEA000
heap
page read and write
6E0A000
heap
page read and write
8CE0000
heap
page read and write
6DA0000
heap
page read and write
6FB8000
heap
page read and write
3AE0000
heap
page read and write
306F000
heap
page read and write
674A000
heap
page read and write
356F000
heap
page read and write
5CF6000
heap
page read and write
671F000
heap
page read and write
731A000
heap
page read and write
6B57000
heap
page read and write
40B7000
heap
page read and write
6B3A1000
unkown
page execute read
60B7000
heap
page read and write
41EE000
heap
page read and write
308B000
heap
page read and write
60C0000
heap
page read and write
371C000
heap
page read and write
351C000
heap
page read and write
CF0000
heap
page read and write
6DA5000
heap
page read and write
673F000
heap
page read and write
C5E000
heap
page read and write
8BD9000
heap
page read and write
60FC000
heap
page read and write
389E000
stack
page read and write
681A3000
unkown
page execute read
609F000
heap
page read and write
318D000
heap
page read and write
6B540000
unkown
page readonly
34FF000
stack
page read and write
731B000
heap
page read and write
5D6B000
heap
page read and write
6BAE000
heap
page read and write
61ED000
heap
page read and write
7033000
heap
page read and write
5D0F000
heap
page read and write
67F75000
unkown
page readonly
60F5000
heap
page read and write
5DA1000
heap
page read and write
6DAF000
heap
page read and write
BD0000
heap
page read and write
6B2E000
heap
page read and write
5ECB000
heap
page read and write
673F000
heap
page read and write
67236000
unkown
page readonly
5D46000
heap
page read and write
671F000
heap
page read and write
67241000
unkown
page readonly
C96000
heap
page read and write
67155000
unkown
page readonly
67849000
unkown
page readonly
6FE1000
heap
page read and write
BB2000
unkown
page readonly
716A000
heap
page read and write
6AB4000
heap
page read and write
6475000
heap
page read and write
ABB000
heap
page read and write
5E98000
heap
page read and write
604A000
heap
page read and write
5EE8000
heap
page read and write
3C21000
heap
page read and write
8BD2000
heap
page read and write
5E65000
heap
page read and write
5D29000
heap
page read and write
619B000
heap
page read and write
40E1000
heap
page read and write
5EA4000
heap
page read and write
405C000
heap
page read and write
6402000
heap
page execute and read and write
5D95000
heap
page read and write
5E69000
heap
page read and write
5D97000
heap
page read and write
4027000
heap
page read and write
5DF8000
heap
page read and write
6AC4000
heap
page read and write
5946000
heap
page execute and read and write
428E000
heap
page read and write
6C56000
heap
page read and write
7055000
heap
page read and write
5D8C000
heap
page read and write
6C00000
heap
page read and write
5B2C000
heap
page read and write
6223000
heap
page read and write
12F4000
stack
page read and write
8BD9000
heap
page read and write
6034000
heap
page read and write
673F000
heap
page read and write
6187000
heap
page read and write
61EF000
heap
page read and write
31FE000
heap
page read and write
61DE000
heap
page read and write
6ABD000
heap
page read and write
6DE7000
heap
page read and write
610C000
heap
page read and write
6DFF000
heap
page read and write
6279000
heap
page execute and read and write
70E2000
heap
page read and write
3540000
heap
page read and write
35B3000
heap
page read and write
3736000
heap
page read and write
6102000
heap
page read and write
1601000
heap
page read and write
3467000
heap
page read and write
674E000
heap
page read and write
30A3000
heap
page read and write
6ED9000
heap
page read and write
4003000
heap
page read and write
6987B000
unkown
page read and write
5D65000
heap
page read and write
6A5D0000
unkown
page readonly
6B47000
heap
page read and write
15FD000
heap
page read and write
6E8C000
heap
page read and write
6713000
heap
page read and write
40BB000
heap
page read and write
6B1C000
heap
page read and write
5DD8000
heap
page read and write
674B000
heap
page read and write
671F000
heap
page read and write
6DC7000
heap
page read and write
593A000
heap
page read and write
AF8000
heap
page read and write
4076000
heap
page read and write
6F16000
heap
page read and write
3B90000
heap
page read and write
AED000
heap
page read and write
7057000
heap
page read and write
408F000
stack
page read and write
15A3000
heap
page read and write
15FD000
heap
page read and write
63D1000
heap
page execute and read and write
63F4000
heap
page read and write
731D000
heap
page read and write
5F46000
heap
page read and write
6DD7000
heap
page read and write
63E2000
heap
page execute and read and write
156A000
heap
page read and write
55BC000
stack
page read and write
6DF1000
heap
page read and write
FF0000
heap
page read and write
5E89000
heap
page read and write
61BB000
heap
page read and write
AB6000
heap
page read and write
6245000
heap
page read and write
5F9A000
heap
page read and write
5DFF000
heap
page read and write
5DAB000
heap
page read and write
5995000
heap
page read and write
64A0000
heap
page read and write
57F0000
heap
page read and write
671B000
heap
page read and write
6753E000
unkown
page execute read
6750000
heap
page read and write
6183000
heap
page read and write
5DF6000
heap
page read and write
6C34000
heap
page read and write
699B0000
unkown
page readonly
5F1C000
heap
page read and write
6115000
heap
page execute and read and write
30CD000
heap
page read and write
35E0000
heap
page read and write
6148000
heap
page read and write
604E000
heap
page read and write
300F000
heap
page read and write
74A8000
heap
page read and write
36F1000
heap
page read and write
62C1000
heap
page execute and read and write
6E34000
heap
page read and write
6FC3000
heap
page read and write
5EC7000
heap
page read and write
6E52000
heap
page read and write
7F13000
heap
page read and write
697F1000
unkown
page readonly
5FEB000
heap
page read and write
3078000
heap
page read and write
5EDD000
heap
page read and write
6184000
heap
page read and write
5C79000
heap
page read and write
6105000
heap
page read and write
67183000
unkown
page readonly
1180000
heap
page read and write
5D27000
heap
page read and write
69877000
unkown
page write copy
5EC3000
heap
page read and write
6E59000
heap
page read and write
3C13000
heap
page read and write
623B000
heap
page read and write
6F63000
heap
page read and write
6600000
heap
page read and write
5CE8000
heap
page read and write
5CE0000
heap
page read and write
5DF0000
heap
page read and write
6D6A000
heap
page read and write
158D000
heap
page read and write
10CE000
stack
page read and write
6AE4000
heap
page read and write
5FAE000
heap
page read and write
671F000
heap
page read and write
6714000
heap
page read and write
5DC1000
heap
page read and write
8BE1000
heap
page read and write
3716000
heap
page read and write
371A000
heap
page read and write
15FC000
heap
page read and write
5DB8000
heap
page read and write
40B5000
heap
page read and write
73F9000
heap
page read and write
309B000
heap
page read and write
5D65000
heap
page read and write
6F33000
heap
page read and write
5FE1000
heap
page read and write
8DFB000
heap
page read and write
6153000
heap
page read and write
3553000
heap
page read and write
5D55000
heap
page read and write
AC4000
heap
page read and write
353E000
heap
page read and write
3467000
heap
page read and write
74DA000
heap
page read and write
67196000
unkown
page readonly
6E8E000
heap
page read and write
6709000
heap
page read and write
5A2F000
heap
page read and write
552000
unkown
page readonly
6E28000
heap
page read and write
40A8000
heap
page read and write
36AC000
heap
page read and write
6741000
heap
page read and write
5D3A000
heap
page read and write
671F000
heap
page read and write
6736000
heap
page read and write
6038000
heap
page read and write
300F000
heap
page read and write
6328000
heap
page execute and read and write
3427000
heap
page read and write
6F90000
heap
page read and write
15E7000
heap
page read and write
5D8B000
heap
page read and write
6B0E2000
unkown
page readonly
60C0000
heap
page read and write
6116000
heap
page read and write
671F000
heap
page read and write
30F0000
heap
page read and write
671F000
heap
page read and write
15FD000
heap
page read and write
638C000
heap
page execute and read and write
40AE000
heap
page read and write
3439000
heap
page read and write
15FD000
heap
page read and write
60C0000
heap
page read and write
671F000
heap
page read and write
B05000
heap
page read and write
5D2D000
heap
page read and write
5E50000
heap
page read and write
682D6000
unkown
page readonly
5CFA000
heap
page read and write
9101000
heap
page read and write
6BE0000
heap
page read and write
68142000
unkown
page read and write
673B000
heap
page read and write
30AC000
stack
page read and write
AC5000
heap
page read and write
5EC3000
heap
page read and write
5D04000
heap
page read and write
353E000
heap
page read and write
6A4DC000
unkown
page readonly
71F0000
heap
page read and write
6193000
heap
page read and write
6728B000
unkown
page read and write
5932000
heap
page read and write
4031000
heap
page read and write
910E000
heap
page read and write
6036000
heap
page read and write
58CB000
heap
page read and write
6D23000
heap
page read and write
6ABE000
heap
page read and write
7516000
heap
page read and write
C90000
heap
page read and write
6713000
heap
page read and write
35E3000
heap
page read and write
5EE8000
heap
page read and write
5CCE000
heap
page read and write
608B000
heap
page read and write
6130000
heap
page read and write
5CF5000
heap
page read and write
5C7E000
heap
page read and write
10C0000
heap
page read and write
705A000
heap
page read and write
5F3E000
heap
page read and write
6311000
heap
page execute and read and write
9B0A000
heap
page read and write
5DC5000
heap
page read and write
6B95000
heap
page read and write
AE3000
heap
page read and write
6EFF000
heap
page read and write
31FA000
heap
page read and write
40CA000
heap
page read and write
6C22000
heap
page read and write
6FBF000
heap
page read and write
6813B000
unkown
page write copy
71C8000
heap
page read and write
6BFC000
heap
page read and write
6C2B000
heap
page read and write
6101000
heap
page read and write
6C0000
unkown
page readonly
CAF000
heap
page read and write
3462000
heap
page read and write
5929000
heap
page read and write
3C42000
heap
page read and write
40C7000
heap
page read and write
40D5000
heap
page read and write
5D70000
heap
page read and write
6003000
heap
page read and write
5D9D000
heap
page read and write
70EA000
heap
page read and write
41A2000
heap
page read and write
671F000
heap
page read and write
66EC8000
unkown
page execute read
654B000
heap
page read and write
354E000
heap
page read and write
673B000
heap
page read and write
309A000
heap
page read and write
72AB000
heap
page read and write
687EA000
unkown
page readonly
5E6B000
heap
page read and write
671D000
heap
page read and write
6185000
heap
page read and write
72BC000
heap
page read and write
3694000
heap
page read and write
61B6000
heap
page read and write
5DF8000
heap
page read and write
6EDD000
heap
page read and write
31C4000
heap
page read and write
6F53000
heap
page read and write
6C5A000
heap
page read and write
3BD0000
heap
page read and write
60BA000
heap
page read and write
1365000
heap
page read and write
6962B000
unkown
page write copy
61CD000
heap
page read and write
673B000
heap
page read and write
3621000
heap
page read and write
5F1B000
heap
page read and write
72F6000
heap
page read and write
15FD000
heap
page read and write
61AE000
heap
page read and write
3538000
heap
page read and write
AED000
heap
page read and write
ACD000
heap
page read and write
4048000
heap
page read and write
6C77000
heap
page read and write
5CF0000
heap
page read and write
7274000
heap
page read and write
6826D000
unkown
page execute read
7261000
heap
page read and write
15FD000
heap
page read and write
2B40000
heap
page execute and read and write
671F000
heap
page read and write
6428000
heap
page read and write
671C000
heap
page read and write
40B5000
heap
page read and write
673C000
heap
page read and write
673C000
heap
page read and write
32B2000
heap
page read and write
5EC3000
heap
page read and write
8E75000
heap
page read and write
BC7000
unkown
page write copy
671F000
heap
page read and write
533F000
stack
page read and write
702C000
heap
page read and write
6170000
heap
page read and write
5D2C000
heap
page read and write
7424000
heap
page read and write
6B57000
heap
page read and write
115F000
heap
page read and write
114E000
heap
page read and write
671B000
heap
page read and write
6F2E000
heap
page read and write
3053000
heap
page read and write
8BEE000
heap
page read and write
AC7000
heap
page read and write
76F1000
heap
page read and write
6DB5000
heap
page read and write
67280000
unkown
page read and write
3459000
heap
page read and write
5F53000
heap
page read and write
7051000
heap
page read and write
7072000
heap
page read and write
671D000
heap
page read and write
6959E000
unkown
page readonly
671F000
heap
page read and write
5D55000
heap
page read and write
72F9000
heap
page read and write
671C000
heap
page read and write
1604000
heap
page read and write
6CC8000
heap
page read and write
8DAA000
heap
page read and write
3781000
heap
page read and write
671F000
heap
page read and write
6A98000
heap
page read and write
5AFA000
heap
page read and write
5D19000
heap
page read and write
6469000
heap
page read and write
6D8E000
heap
page read and write
6CCA000
heap
page read and write
5BEC000
heap
page read and write
5CA1000
heap
page read and write
63F2000
heap
page execute and read and write
3031000
heap
page read and write
59FD000
heap
page read and write
696E0000
unkown
page readonly
6DDB000
heap
page read and write
2FB0000
trusted library allocation
page read and write
309B000
heap
page read and write
6F25000
heap
page read and write
673B000
heap
page read and write
AE3000
heap
page read and write
590B000
heap
page read and write
49CF000
stack
page read and write
59D2000
heap
page read and write
3023000
heap
page read and write
354D000
heap
page read and write
3204000
heap
page read and write
5E87000
heap
page read and write
7078000
heap
page read and write
95BE000
heap
page read and write
B18000
heap
page read and write
5D2D000
heap
page read and write
4060000
heap
page read and write
676E0000
unkown
page readonly
671F000
heap
page read and write
5B34000
heap
page read and write
3042000
heap
page read and write
8BD0000
trusted library allocation
page read and write
30C8000
heap
page read and write
AF2000
heap
page read and write
4042000
heap
page read and write
617C000
heap
page read and write
613C000
heap
page read and write
5CEC000
heap
page read and write
5E77000
heap
page read and write
5E8E000
heap
page read and write
94A2000
heap
page read and write
5A8C000
heap
page read and write
6C24000
heap
page read and write
62D5000
heap
page read and write
8F3F000
heap
page read and write
61ED000
heap
page read and write
3555000
heap
page read and write
31EB000
heap
page read and write
687EF000
unkown
page readonly
5C24000
heap
page read and write
5FC1000
heap
page read and write
5AA4000
heap
page read and write
3B10000
heap
page read and write
6457000
heap
page read and write
74A8000
heap
page read and write
3090000
heap
page read and write
7F0A000
heap
page read and write
8D95000
heap
page read and write
35EA000
heap
page read and write
40B4000
heap
page read and write
61CA000
heap
page read and write
67401000
unkown
page execute read
321A000
heap
page read and write
7147000
heap
page read and write
70C4000
heap
page read and write
8BEA000
heap
page read and write
491000
unkown
page execute read
731A000
heap
page read and write
8F83000
heap
page read and write
32D5000
heap
page read and write
671B000
heap
page read and write
60B0000
heap
page read and write
5932000
heap
page read and write
704A000
heap
page read and write
6C76000
heap
page read and write
62D2000
heap
page execute and read and write
5F7B000
heap
page read and write
6005000
heap
page read and write
6330000
heap
page execute and read and write
9233000
heap
page read and write
D3F000
stack
page read and write
671B000
heap
page read and write
749D000
heap
page read and write
615B000
heap
page read and write
400B000
heap
page read and write
5CF9000
heap
page read and write
5C14000
heap
page read and write
671F000
heap
page read and write
61ED000
heap
page read and write
5F85000
heap
page read and write
C5A000
heap
page read and write
6C1A000
heap
page read and write
1132000
heap
page read and write
8D16000
heap
page read and write
3504000
heap
page read and write
66F45000
unkown
page execute read
6036000
heap
page read and write
6DE7000
heap
page read and write
671B000
heap
page read and write
6E7C000
heap
page read and write
5CE8000
heap
page read and write
5B19000
heap
page read and write
4060000
heap
page read and write
6AED000
heap
page read and write
6F53000
heap
page read and write
6711000
heap
page read and write
F8E000
stack
page read and write
1F6000
heap
page read and write
5D40000
heap
page read and write
671F000
heap
page read and write
3673000
heap
page read and write
673B000
heap
page read and write
5A40000
heap
page read and write
5BD5000
heap
page read and write
AE3000
heap
page read and write
5CFF000
heap
page read and write
3435000
heap
page read and write
5D99000
heap
page read and write
BD5000
heap
page read and write
35B3000
heap
page read and write
3F8E000
stack
page read and write
15DD000
heap
page read and write
B01000
heap
page read and write
6EEE000
heap
page read and write
7044000
heap
page read and write
5CAB000
heap
page read and write
6A7A1000
unkown
page execute read
31AA000
heap
page read and write
3C16000
heap
page read and write
6751000
heap
page read and write
673B000
heap
page read and write
7318000
heap
page read and write
6D91000
heap
page read and write
5FF0000
heap
page read and write
6736000
heap
page read and write
8EE2000
heap
page read and write
8ED5000
heap
page read and write
921D000
heap
page read and write
7F00000
heap
page read and write
258D000
heap
page read and write
CAD000
heap
page read and write
61CC000
heap
page read and write
40B5000
heap
page read and write
71ED000
trusted library allocation
page read and write
5D08000
heap
page read and write
6D99000
heap
page read and write
611F000
heap
page read and write
5ADF000
heap
page read and write
7155000
heap
page read and write
1152000
heap
page read and write
40CE000
heap
page read and write
5D1C000
heap
page read and write
63A6000
heap
page execute and read and write
3456000
heap
page read and write
A9A000
heap
page read and write
603E000
heap
page read and write
6010000
heap
page read and write
6F33000
heap
page read and write
5932000
heap
page read and write
61F8000
heap
page read and write
3531000
heap
page read and write
7047000
heap
page read and write
5DCB000
heap
page read and write
5CEA000
heap
page read and write
6DFF000
heap
page read and write
300E000
heap
page read and write
CBE000
heap
page read and write
1540000
heap
page read and write
15FD000
heap
page read and write
71F8000
heap
page read and write
5D5A000
heap
page read and write
32EA000
heap
page read and write
7080000
heap
page read and write
35FD000
stack
page read and write
671F000
heap
page read and write
4F7E000
stack
page read and write
37BF000
heap
page read and write
58FC000
heap
page read and write
8BDB000
heap
page read and write
586A000
heap
page read and write
15FD000
heap
page read and write
62B2000
heap
page execute and read and write
3550000
heap
page read and write
62C9000
heap
page execute and read and write
716A000
heap
page read and write
6223000
heap
page read and write
897A000
heap
page read and write
3444000
heap
page read and write
58EC000
heap
page read and write
1149000
heap
page read and write
BC7000
unkown
page read and write
670B8000
unkown
page execute read
37CD000
heap
page read and write
355F000
heap
page read and write
5CAE000
heap
page read and write
5BEC000
heap
page read and write
2FF0000
heap
page read and write
5D3A000
heap
page read and write
113F000
heap
page read and write
3506000
heap
page read and write
647B000
heap
page read and write
4001000
heap
page read and write
5960000
heap
page read and write
5BEC000
heap
page read and write
5FA3000
heap
page read and write
6E2B000
heap
page read and write
5CA3000
heap
page read and write
5B50000
heap
page read and write
7027000
heap
page read and write
6208000
heap
page read and write
ACD000
heap
page read and write
A82000
heap
page read and write
4024000
heap
page read and write
B05000
heap
page read and write
5FAF000
heap
page read and write
6C54000
heap
page read and write
6BC9000
heap
page read and write
646D000
heap
page read and write
4074000
heap
page read and write
AA9000
heap
page read and write
594A000
heap
page execute and read and write
3C31000
heap
page read and write
5D99000
heap
page read and write
6E4C000
heap
page read and write
671F000
heap
page read and write
708C000
heap
page read and write
2EF6000
heap
page read and write
AA4000
heap
page read and write
3456000
heap
page read and write
8BDA000
heap
page read and write
35C5000
heap
page read and write
8DF0000
heap
page read and write
6460000
heap
page read and write
409D000
heap
page read and write
615E000
heap
page read and write
3550000
heap
page read and write
6C3C000
heap
page read and write
71C7000
heap
page read and write
5926000
heap
page read and write
30C4000
heap
page read and write
3C2E000
stack
page read and write
4050000
heap
page read and write
5C2A000
heap
page read and write
671B000
heap
page read and write
54BE000
stack
page read and write
6B44000
heap
page read and write
3746000
heap
page read and write
6F7B000
heap
page read and write
7047000
heap
page read and write
10BE000
stack
page read and write
3697000
heap
page read and write
3045000
heap
page read and write
6736000
heap
page read and write
328D000
heap
page read and write
6056000
heap
page read and write
357B000
heap
page read and write
6205000
heap
page read and write
AB3000
heap
page read and write
6E0D000
heap
page read and write
3407000
heap
page read and write
6032000
heap
page read and write
30E2000
heap
page read and write
5929000
heap
page read and write
3C21000
heap
page read and write
4082000
heap
page read and write
6918D000
unkown
page readonly
6813D000
unkown
page read and write
6F63000
heap
page read and write
671D000
heap
page read and write
5C06000
heap
page read and write
6000000
heap
page read and write
6AB44000
unkown
page read and write
5EC7000
heap
page read and write
61BE000
heap
page read and write
5E03000
heap
page read and write
615E000
heap
page read and write
3B70000
heap
page read and write
60EB000
heap
page read and write
156A000
heap
page read and write
6C25000
heap
page read and write
6E5C000
heap
page read and write
6058000
heap
page read and write
C90000
heap
page read and write
682E1000
unkown
page readonly
3696000
heap
page read and write
B34000
heap
page read and write
3187000
heap
page read and write
6078000
heap
page read and write
5DA3000
heap
page read and write
5D93000
heap
page read and write
6709000
heap
page read and write
6AFD000
heap
page read and write
B05000
heap
page read and write
15FC000
heap
page read and write
6BD8000
heap
page read and write
6DDC000
heap
page read and write
32B5000
heap
page read and write
113C000
heap
page read and write
302E000
heap
page read and write
15FD000
heap
page read and write
67277000
unkown
page write copy
62E0000
heap
page execute and read and write
671F000
heap
page read and write
6F50000
heap
page read and write
673B000
heap
page read and write
5EC0000
heap
page read and write
726C000
heap
page read and write
FB0000
heap
page read and write
32D8000
heap
page read and write
62D1000
heap
page execute and read and write
15D3000
heap
page read and write
36E5000
heap
page read and write
586D000
stack
page read and write
6404000
heap
page execute and read and write
6D3D000
heap
page read and write
682F1000
unkown
page readonly
6B33000
heap
page read and write
7147000
heap
page read and write
6B528000
unkown
page write copy
5F60000
heap
page read and write
543F000
stack
page read and write
3C30000
heap
page read and write
4C3000
unkown
page readonly
343F000
heap
page read and write
A605000
heap
page read and write
61EA000
heap
page read and write
35DD000
heap
page read and write
60D6000
heap
page read and write
6759000
heap
page read and write
6749000
heap
page read and write
6720000
heap
page read and write
6FEF000
heap
page read and write
671C000
heap
page read and write
32D8000
heap
page read and write
7066000
heap
page read and write
5DFD000
heap
page read and write
3C30000
heap
page read and write
3AE3000
heap
page read and write
5B2C000
heap
page read and write
AF8000
heap
page read and write
69CDC000
unkown
page readonly
15F4000
heap
page read and write
8C51000
heap
page read and write
3506000
heap
page read and write
6C65000
heap
page read and write
6DA6000
heap
page read and write
58DF000
heap
page read and write
5D7F000
heap
page read and write
5F2B000
heap
page read and write
6BF4000
heap
page read and write
3526000
heap
page read and write
5AF4000
heap
page read and write
671B000
heap
page read and write
67891000
unkown
page read and write
40C3000
heap
page read and write
C9D000
heap
page read and write
6CDD000
heap
page read and write
F20000
heap
page read and write
AED000
heap
page read and write
4075000
heap
page read and write
717C000
heap
page read and write
1158000
heap
page read and write
3087000
heap
page read and write
9105000
heap
page read and write
5DFB000
heap
page read and write
6201000
heap
page read and write
5C7A000
heap
page read and write
6D9E000
heap
page read and write
5DB1000
heap
page read and write
3228000
heap
page read and write
15FC000
heap
page read and write
598D000
heap
page read and write
6748000
heap
page read and write
5C72000
heap
page read and write
362F000
heap
page read and write
5FB0000
heap
page read and write
5D51000
heap
page read and write
5E26000
heap
page read and write
610C000
heap
page read and write
589C000
heap
page read and write
1560000
heap
page read and write
69BD000
heap
page read and write
61F4000
heap
page read and write
60DA000
heap
page read and write
258A000
heap
page read and write
8BDD000
heap
page read and write
4830000
trusted library allocation
page read and write
6C9E000
heap
page read and write
5DC8000
heap
page read and write
5CDB000
heap
page read and write
5C2E000
heap
page read and write
CBF000
heap
page read and write
1175000
heap
page read and write
5DD2000
heap
page read and write
5CFA000
heap
page read and write
738D000
trusted library allocation
page read and write
3BA5000
heap
page read and write
6402000
heap
page execute and read and write
3C51000
heap
page read and write
639D000
heap
page execute and read and write
CB7000
heap
page read and write
5DF2000
heap
page read and write
94B8000
heap
page read and write
5D3A000
heap
page read and write
59DA000
heap
page read and write
37DF000
heap
page read and write
6E5A000
heap
page read and write
5C09000
heap
page read and write
AEF000
heap
page read and write
5CB7000
heap
page read and write
3B91000
heap
page read and write
671F000
heap
page read and write
6DB8000
heap
page read and write
4039000
heap
page read and write
63E2000
heap
page execute and read and write
5B67000
heap
page read and write
12BE000
stack
page read and write
6D37000
heap
page read and write
5EE8000
heap
page read and write
AA9000
heap
page read and write
5A85000
heap
page read and write
716A000
heap
page read and write
CA4000
heap
page read and write
5EC0000
heap
page read and write
6E8E000
heap
page read and write
5D1B000
heap
page read and write
69624000
unkown
page read and write
5CD6000
heap
page read and write
6CD9000
heap
page read and write
32EC000
heap
page read and write
5D65000
heap
page read and write
32D0000
heap
page read and write
36FD000
heap
page read and write
67841000
unkown
page readonly
5D45000
heap
page read and write
6489000
heap
page read and write
3535000
heap
page read and write
3525000
heap
page read and write
6A451000
unkown
page read and write
37B7000
heap
page read and write
C8D000
heap
page read and write
5B2C000
heap
page read and write
B80000
unkown
page readonly
67F51000
unkown
page readonly
671F000
heap
page read and write
6B9E000
heap
page read and write
40B0000
heap
page read and write
424D000
heap
page read and write
3C11000
heap
page read and write
60DA000
heap
page read and write
6CC0000
heap
page read and write
4005000
heap
page read and write
6C56000
heap
page read and write
893F000
stack
page read and write
5D5D000
heap
page read and write
AF8000
heap
page read and write
66EE7000
unkown
page execute read
6C69000
heap
page read and write
58FC000
heap
page read and write
671B000
heap
page read and write
611A000
heap
page read and write
8BD5000
heap
page read and write
5DC3000
heap
page read and write
5F20000
heap
page read and write
15FC000
heap
page read and write
32A0000
heap
page read and write
6114000
heap
page read and write
6104000
heap
page read and write
5AFA000
heap
page read and write
56BC000
stack
page read and write
3807000
heap
page execute and read and write
AF8000
heap
page read and write
15FC000
heap
page read and write
7353000
heap
page read and write
6153000
heap
page read and write
6355000
heap
page execute and read and write
7072000
heap
page read and write
5CDC000
heap
page read and write
6CD2000
heap
page read and write
6712000
heap
page read and write
67152000
unkown
page readonly
3675000
heap
page read and write
5BE2000
heap
page read and write
600B000
heap
page read and write
3BD7000
heap
page read and write
40A9000
heap
page read and write
AD3000
heap
page read and write
5FAE000
heap
page read and write
5D52000
heap
page read and write
FE0000
heap
page read and write
6713000
heap
page read and write
4160000
heap
page read and write
6BAD000
heap
page read and write
6D87000
heap
page read and write
5CE8000
heap
page read and write
5F92000
heap
page read and write
6F3B000
heap
page read and write
323F000
heap
page read and write
35CA000
heap
page read and write
302E000
heap
page read and write
3637000
heap
page read and write
3532000
heap
page read and write
3237000
heap
page read and write
671F000
heap
page read and write
5A31000
heap
page read and write
32AF000
heap
page read and write
5F15000
heap
page read and write
3B70000
trusted library allocation
page read and write
5A89000
heap
page read and write
705F000
heap
page read and write
8BFC000
heap
page read and write
5EB6000
heap
page read and write
673F000
heap
page read and write
5C91000
heap
page read and write
671F000
heap
page read and write
AB3000
heap
page read and write
62AD000
heap
page execute and read and write
5D6D000
heap
page read and write
B01000
heap
page read and write
675AB000
unkown
page readonly
67427000
unkown
page execute read
603E000
heap
page read and write
1594000
heap
page read and write
5DA4000
heap
page read and write
3BF5000
heap
page read and write
8DAC000
heap
page read and write
671C7000
unkown
page readonly
8D0E000
heap
page read and write
3C4C000
heap
page read and write
6C5E000
heap
page read and write
6748000
heap
page read and write
6DF5000
heap
page read and write
346A000
heap
page read and write
42E0000
heap
page execute and read and write
5CD6000
heap
page read and write
6153000
heap
page read and write
60DA000
heap
page read and write
8ED9000
heap
page read and write
5DE3000
heap
page read and write
557F000
stack
page read and write
15FC000
heap
page read and write
AEA000
heap
page read and write
6C74000
heap
page read and write
40D0000
heap
page read and write
673B000
heap
page read and write
5F38000
heap
page read and write
407A000
heap
page read and write
33FB000
heap
page read and write
708C000
heap
page read and write
5C75000
heap
page read and write
618B000
heap
page read and write
341F000
heap
page read and write
615B000
heap
page read and write
5D7F000
heap
page read and write
6F8A000
heap
page read and write
5D9F000
heap
page read and write
5B00000
heap
page read and write
5C06000
heap
page read and write
5CFC000
heap
page read and write
547000
unkown
page write copy
3232000
heap
page read and write
6713000
heap
page read and write
6DB5000
heap
page read and write
3A9D000
stack
page read and write
7309000
heap
page read and write
5D4A000
heap
page read and write
6BB6000
heap
page read and write
5F53000
heap
page read and write
68322000
unkown
page read and write
304D000
heap
page read and write
639D000
heap
page execute and read and write
6BC0000
heap
page read and write
15A5000
heap
page read and write
8BDE000
heap
page read and write
72E9000
heap
page read and write
6BC2000
heap
page read and write
5C75000
heap
page read and write
6D3D000
heap
page read and write
AAC000
heap
page read and write
5E6B000
heap
page read and write
5D7D000
heap
page read and write
608C000
heap
page read and write
1161000
heap
page read and write
6F88000
heap
page read and write
6721000
heap
page read and write
3902000
heap
page execute and read and write
4DE000
unkown
page readonly
671B000
heap
page read and write
5E77000
heap
page read and write
6271000
heap
page execute and read and write
2ADE000
stack
page read and write
AC5000
heap
page read and write
617C000
heap
page read and write
62C0000
heap
page execute and read and write
6EFD000
heap
page read and write
6041000
heap
page read and write
5B05000
heap
page read and write
15FD000
heap
page read and write
5DF0000
heap
page read and write
3C13000
heap
page read and write
3068000
heap
page read and write
6784C000
unkown
page readonly
5CCA000
heap
page read and write
8F36000
heap
page read and write
36B1000
heap
page read and write
61AE000
heap
page read and write
58F8000
heap
page read and write
377F000
heap
page read and write
68A1E000
unkown
page read and write
6AB45000
unkown
page write copy
673B000
heap
page read and write
3BD0000
heap
page read and write
8BDB000
heap
page read and write
AE3000
heap
page read and write
67870000
unkown
page readonly
40B7000
heap
page read and write
5860000
heap
page read and write
406C000
heap
page read and write
6BDC000
heap
page read and write
5F4B000
heap
page read and write
69DB6000
unkown
page readonly
6CD2000
heap
page read and write
671F000
heap
page read and write
B0D000
heap
page read and write
671F000
heap
page read and write
5ADF000
heap
page read and write
6ECA000
heap
page read and write
6A71D000
unkown
page readonly
7360000
trusted library allocation
page read and write
6670000
heap
page read and write
36AC000
heap
page read and write
6D20000
heap
page read and write
618B000
heap
page read and write
6AEB000
heap
page read and write
61CC000
heap
page read and write
671D000
heap
page read and write
671F000
heap
page read and write
5D7A000
heap
page read and write
5DF0000
heap
page read and write
732F000
heap
page read and write
3713000
heap
page read and write
30E3000
heap
page read and write
671F000
heap
page read and write
68173000
unkown
page readonly
1122000
heap
page read and write
3E30000
direct allocation
page read and write
671F000
heap
page read and write
72E5000
heap
page read and write
6EC5000
heap
page read and write
3729000
heap
page read and write
6757000
heap
page read and write
6048000
heap
page read and write
43A3000
heap
page read and write
AC4000
heap
page read and write
5D13000
heap
page read and write
329A000
heap
page read and write
6F75000
heap
page read and write
8BE6000
heap
page read and write
650A000
heap
page read and write
E8E000
stack
page read and write
4024000
heap
page read and write
6355000
heap
page execute and read and write
6AD8000
heap
page read and write
1132000
heap
page read and write
AB6000
heap
page read and write
5DE9000
heap
page read and write
6197000
heap
page read and write
6178000
heap
page read and write
5E9E000
heap
page read and write
6CA7000
heap
page read and write
6AA2000
heap
page read and write
671F000
heap
page read and write
9398000
heap
page read and write
AB3000
heap
page read and write
CA5000
heap
page read and write
6F36000
heap
page read and write
8F87000
heap
page read and write
6AF10000
unkown
page readonly
5BC3000
heap
page read and write
3BC9000
heap
page read and write
61B8000
heap
page read and write
AF2000
heap
page read and write
3C4C000
heap
page read and write
671F000
heap
page read and write
6C4F000
heap
page read and write
5C8B000
heap
page read and write
6D21000
heap
page read and write
3627000
heap
page read and write
5CB3000
heap
page read and write
5FB7000
heap
page read and write
8BDE000
heap
page read and write
5861000
heap
page read and write
627A000
heap
page execute and read and write
ACE000
heap
page read and write
6C14000
heap
page read and write
5FB1000
heap
page read and write
3B71000
heap
page read and write
7413000
heap
page read and write
AF8000
heap
page read and write
5D9D000
heap
page read and write
671D000
heap
page read and write
61AE000
heap
page read and write
9925000
heap
page read and write
5D5E000
heap
page read and write
671F000
heap
page read and write
8BDD000
heap
page read and write
6492000
heap
page read and write
6338000
heap
page read and write
69881000
unkown
page readonly
CB7000
heap
page read and write
C2E000
stack
page read and write
67803000
unkown
page execute read
8DE0000
heap
page read and write
58C4000
heap
page read and write
6032000
heap
page read and write
671F000
heap
page read and write
674B000
heap
page read and write
11B7000
heap
page read and write
3667000
heap
page read and write
5B32000
heap
page read and write
3B90000
heap
page read and write
3C00000
heap
page read and write
619F000
heap
page read and write
5C12000
heap
page read and write
6EC0000
heap
page read and write
5BC5000
heap
page read and write
671C000
heap
page read and write
5F04000
heap
page read and write
6144000
heap
page read and write
5D7D000
heap
page read and write
6142000
heap
page read and write
1611000
heap
page read and write
3C43000
heap
page read and write
58AD000
stack
page read and write
648B000
heap
page read and write
610C000
heap
page read and write
61CD000
heap
page read and write
4DB000
unkown
page read and write
671F000
heap
page read and write
614D000
heap
page read and write
1180000
heap
page read and write
6B47000
heap
page read and write
6AB4000
heap
page read and write
5B99000
heap
page read and write
B19000
heap
page read and write
370C000
heap
page read and write
9393000
heap
page read and write
8BDA000
heap
page read and write
4049000
heap
page read and write
6EA0000
heap
page read and write
8CEA000
heap
page read and write
5CF0000
heap
page read and write
3C29000
heap
page read and write
3680000
heap
page read and write
40A2000
heap
page read and write
3C26000
heap
page read and write
4036000
heap
page read and write
54A000
unkown
page readonly
3F3F000
stack
page read and write
8BE0000
trusted library allocation
page read and write
5D88000
heap
page read and write
5D8B000
heap
page read and write
6FD8000
heap
page read and write
ACE000
heap
page read and write
5A89000
heap
page read and write
639E000
heap
page execute and read and write
6BB4000
heap
page read and write
40A5000
heap
page read and write
6C24000
heap
page read and write
64E8000
heap
page read and write
6E2B000
heap
page read and write
5CE0000
heap
page read and write
3032000
heap
page read and write
671A000
heap
page read and write
B34000
heap
page read and write
671B000
heap
page read and write
6AE2000
heap
page read and write
5AEE000
heap
page read and write
72C7000
heap
page read and write
3582000
heap
page read and write
60A2000
heap
page read and write
5CFD000
heap
page read and write
406C000
heap
page read and write
AA9000
heap
page read and write
6199000
heap
page read and write
8BDB000
heap
page read and write
671F000
heap
page read and write
7051000
heap
page read and write
5FCB000
heap
page read and write
30AA000
heap
page read and write
63C2000
heap
page read and write
6193000
heap
page read and write
6F12000
heap
page read and write
68801000
unkown
page readonly
8BD9000
heap
page read and write
40C6000
heap
page read and write
6AC2000
heap
page read and write
35C3000
heap
page read and write
5CD2000
heap
page read and write
6A787000
unkown
page readonly
31EA000
heap
page read and write
74C2000
heap
page read and write
6114000
heap
page read and write
3C21000
heap
page read and write
6AC4000
heap
page read and write
8BE6000
heap
page read and write
671C000
heap
page read and write
59A7000
heap
page read and write
72E9000
heap
page read and write
7104000
heap
page read and write
58F8000
heap
page read and write
68340000
unkown
page readonly
5DE9000
heap
page read and write
671F000
heap
page read and write
160B000
heap
page read and write
674D000
heap
page read and write
32B7000
heap
page read and write
2B1D000
stack
page read and write
6BBD000
heap
page read and write
CB0000
heap
page read and write
73B7000
heap
page read and write
5D7F000
heap
page read and write
7424000
heap
page read and write
6F17000
heap
page read and write
15FD000
heap
page read and write
9B34000
heap
page read and write
7027000
heap
page read and write
5A5E000
heap
page read and write
5EFE000
heap
page read and write
1156000
heap
page read and write
15FD000
heap
page read and write
5EFC000
heap
page read and write
6B05000
heap
page read and write
6403000
heap
page execute and read and write
15FC000
heap
page read and write
5A4C000
heap
page read and write
671F000
heap
page read and write
5CDA000
heap
page read and write
5D55000
heap
page read and write
70E2000
heap
page read and write
41E5000
heap
page read and write
671F000
heap
page read and write
6CCC000
heap
page read and write
5D4A000
heap
page read and write
676E1000
unkown
page execute read
367F000
heap
page read and write
6EC0000
heap
page read and write
69870000
unkown
page read and write
6B57000
heap
page read and write
4089000
heap
page read and write
5ECB000
heap
page read and write
6BAC000
heap
page read and write
59A6000
heap
page read and write
AE9000
heap
page read and write
40E0000
heap
page read and write
5D51000
heap
page read and write
7F01000
heap
page read and write
7F4A000
heap
page read and write
6370000
heap
page execute and read and write
F7C000
stack
page read and write
403D000
heap
page read and write
6741000
heap
page read and write
36B9000
heap
page read and write
6200000
heap
page read and write
61DE000
heap
page read and write
62A4000
heap
page execute and read and write
67113000
unkown
page execute read
671F000
heap
page read and write
6E1F000
heap
page read and write
3065000
heap
page read and write
40C6000
heap
page read and write
3BB0000
heap
page read and write
671F000
heap
page read and write
306F000
heap
page read and write
671B000
heap
page read and write
5DA7000
heap
page read and write
4526000
heap
page read and write
352B000
heap
page read and write
67172000
unkown
page readonly
673B000
heap
page read and write
5D1D000
heap
page read and write
32E6000
heap
page read and write
3BA2000
heap
page read and write
3171000
heap
page read and write
6B2E000
heap
page read and write
ADD000
heap
page read and write
BD2000
unkown
page readonly
6E33000
heap
page read and write
671F000
heap
page read and write
AB5000
heap
page read and write
6712000
heap
page read and write
8BD0000
trusted library allocation
page read and write
112C000
heap
page read and write
399E000
stack
page read and write
5D48000
heap
page read and write
6F73000
heap
page read and write
6B72000
heap
page read and write
366E000
heap
page read and write
5F15000
heap
page read and write
5FC1000
heap
page read and write
6A7A0000
unkown
page readonly
3E30000
direct allocation
page read and write
62E9000
heap
page execute and read and write
5D9F000
heap
page read and write
5D6F000
heap
page read and write
705C000
heap
page read and write
3295000
heap
page read and write
6B61000
heap
page read and write
6372000
heap
page execute and read and write
6FEA000
heap
page read and write
413C000
heap
page read and write
302E000
heap
page read and write
61FB000
heap
page read and write
6E5C000
heap
page read and write
6D5C000
heap
page read and write
6CC8000
heap
page read and write
5F1B000
heap
page read and write
6B2C000
heap
page read and write
6D57000
heap
page read and write
5935000
heap
page read and write
5A30000
heap
page read and write
599C000
heap
page read and write
5F1B000
heap
page read and write
6AC2000
heap
page read and write
671B000
heap
page read and write
15CD000
heap
page read and write
6B32000
heap
page read and write
61A7000
heap
page read and write
6023000
heap
page read and write
6DA5000
heap
page read and write
66E72000
unkown
page execute read
5F9A000
heap
page read and write
676F8000
unkown
page execute read
6841D000
unkown
page execute read
AFF000
heap
page read and write
6BF4000
heap
page read and write
671F000
heap
page read and write
5DE4000
heap
page read and write
671E000
heap
page read and write
4064000
heap
page read and write
670E000
heap
page read and write
671C1000
unkown
page readonly
6AE2000
heap
page read and write
5D9C000
heap
page read and write
5EDA000
heap
page read and write
5CEC000
heap
page read and write
5EC3000
heap
page read and write
69190000
unkown
page readonly
5981000
heap
page read and write
8D15000
heap
page read and write
3C43000
heap
page read and write
671D000
heap
page read and write
15B7000
heap
page read and write
6B74000
heap
page read and write
6320000
heap
page execute and read and write
402F000
heap
page read and write
3546000
heap
page read and write
711E000
heap
page read and write
304B000
heap
page read and write
69874000
unkown
page read and write
5E53000
heap
page read and write
71FC000
heap
page read and write
3579000
heap
page read and write
6718000
heap
page read and write
4026000
heap
page read and write
62A3000
heap
page execute and read and write
5CDE000
heap
page read and write
710C000
heap
page read and write
61B6000
heap
page read and write
1F7000
heap
page read and write
6741000
heap
page read and write
40E2000
heap
page read and write
611B000
heap
page read and write
34E2000
heap
page read and write
6D33000
heap
page read and write
5CF6000
heap
page read and write
6339000
heap
page execute and read and write
6197000
heap
page read and write
5D88000
heap
page read and write
6712000
heap
page read and write
62D7000
heap
page execute and read and write
674A000
heap
page read and write
322D000
heap
page read and write
5DDA000
heap
page read and write
6FC8000
heap
page read and write
6759000
heap
page read and write
32A3000
heap
page read and write
671C000
heap
page read and write
44BE000
stack
page read and write
362F000
heap
page read and write
6C3B000
heap
page read and write
5D12000
heap
page read and write
30AE000
heap
page read and write
B29000
heap
page read and write
158F000
heap
page read and write
61C6000
heap
page read and write
5DDE000
heap
page read and write
5D43000
heap
page read and write
5D9D000
heap
page read and write
51FE000
stack
page read and write
3CAE000
stack
page read and write
6ED4000
heap
page read and write
37E2000
heap
page read and write
592E000
heap
page read and write
5C08000
heap
page read and write
32ED000
heap
page read and write
AF9000
stack
page read and write
7048000
heap
page read and write
10E0000
heap
page read and write
6F10000
heap
page read and write
6F91000
heap
page read and write
705E000
heap
page read and write
15FD000
heap
page read and write
58EC000
heap
page read and write
615E000
heap
page read and write
40D1000
heap
page read and write
3447000
heap
page read and write
671F000
heap
page read and write
58E0000
heap
page read and write
3036000
heap
page read and write
CAA000
heap
page read and write
8CFF000
heap
page read and write
ABE000
heap
page read and write
351A000
heap
page read and write
671F000
heap
page read and write
31B6000
heap
page read and write
8C6A000
heap
page read and write
74A1000
heap
page read and write
2FEF000
stack
page read and write
5A5D000
heap
page read and write
7304000
heap
page read and write
671A000
heap
page read and write
AEF000
heap
page read and write
6671000
heap
page read and write
74A5000
heap
page read and write
3257000
heap
page read and write
604F000
heap
page read and write
8D14000
heap
page read and write
6F27000
heap
page read and write
36F0000
heap
page read and write
6648000
heap
page read and write
6722C000
unkown
page readonly
61BE000
heap
page read and write
6D87000
heap
page read and write
37AC000
heap
page read and write
671F000
heap
page read and write
6ED000
unkown
page readonly
7F0E000
heap
page read and write
6FF000
unkown
page read and write
5C89000
heap
page read and write
72B4000
heap
page read and write
6C2D000
heap
page read and write
AA9000
heap
page read and write
B0D000
heap
page read and write
6F0E000
heap
page read and write
681A5000
unkown
page execute read
61F1000
heap
page read and write
6720000
heap
page read and write
5E73000
heap
page read and write
6C45000
heap
page read and write
593A000
heap
page read and write
2F90000
heap
page read and write
15BC000
heap
page read and write
40B4000
heap
page read and write
671F000
heap
page read and write
6F48000
heap
page read and write
40AE000
heap
page read and write
15E3000
heap
page read and write
3094000
heap
page read and write
5FE7000
heap
page read and write
AB3000
heap
page read and write
8BDB000
heap
page read and write
62C3000
heap
page execute and read and write
1170000
heap
page read and write
29F0000
heap
page read and write
15FC000
heap
page read and write
58F0000
heap
page read and write
3600000
heap
page read and write
6813F000
unkown
page write copy
10CE000
heap
page execute and read and write
68341000
unkown
page execute read
15D5000
heap
page read and write
300F000
heap
page read and write
671F000
heap
page read and write
7362000
heap
page read and write
66E7C000
unkown
page execute read
408D000
heap
page read and write
5FA3000
heap
page read and write
AAA000
heap
page read and write
6F13000
heap
page read and write
61FC000
heap
page read and write
1BE000
stack
page read and write
6CCC000
heap
page read and write
6DA5000
heap
page read and write
AF8000
heap
page read and write
6174000
heap
page read and write
6FF1000
heap
page read and write
5EA4000
heap
page read and write
72F1000
heap
page read and write
6048000
heap
page read and write
B19000
heap
page read and write
15C0000
heap
page read and write
3625000
heap
page read and write
5C79000
heap
page read and write
8A32000
heap
page read and write
2531000
heap
page read and write
4000000
heap
page read and write
5EC7000
heap
page read and write
8C54000
heap
page read and write
6E4D000
heap
page read and write
630F000
heap
page execute and read and write
711A000
heap
page read and write
6BF8000
heap
page read and write
B81000
unkown
page execute read
6B529000
unkown
page readonly
5EA5000
heap
page read and write
3422000
heap
page read and write
671F000
heap
page read and write
309B000
heap
page read and write
618B000
heap
page read and write
6061000
heap
page read and write
6AC2000
heap
page read and write
90FC000
heap
page read and write
58C6000
heap
page read and write
B29000
heap
page read and write
6BE9000
heap
page read and write
6E1B000
heap
page read and write
671F000
heap
page read and write
6C61000
heap
page read and write
60AD000
heap
page read and write
5F1B000
heap
page read and write
6153000
heap
page read and write
5A5B000
heap
page read and write
706C000
heap
page read and write
673B000
heap
page read and write
3C21000
heap
page read and write
37E9000
heap
page read and write
671F000
heap
page read and write
37DF000
heap
page read and write
8D5E000
stack
page read and write
673C000
heap
page read and write
5C10000
heap
page read and write
6EEB000
heap
page read and write
6F29000
heap
page read and write
69280000
unkown
page readonly
6159000
heap
page read and write
59FB000
heap
page read and write
10CC000
heap
page read and write
6E7C000
heap
page read and write
8D03000
heap
page read and write
3C2F000
heap
page read and write
439B000
stack
page read and write
69514000
unkown
page readonly
5D7E000
heap
page read and write
5CF7000
heap
page read and write
6ED1000
heap
page read and write
60EB000
heap
page read and write
ADD000
heap
page read and write
5D83000
heap
page read and write
671F000
heap
page read and write
5C19000
heap
page read and write
1179000
heap
page read and write
5929000
heap
page read and write
61EF000
heap
page read and write
40DD000
heap
page read and write
60B0000
heap
page read and write
3910000
heap
page read and write
6058000
heap
page read and write
5BE8000
heap
page read and write
5BDD000
heap
page read and write
95B9000
heap
page read and write
40CD000
heap
page read and write
409B000
heap
page read and write
5DE9000
heap
page read and write
7420000
heap
page read and write
6EE2000
heap
page read and write
5EA7000
heap
page read and write
4092000
heap
page read and write
6E7E000
heap
page read and write
40CE000
heap
page read and write
6AEB000
heap
page read and write
31A6000
heap
page read and write
6AFC000
heap
page read and write
7061000
heap
page read and write
5F76000
heap
page read and write
5C78000
heap
page read and write
2E30000
trusted library allocation
page read and write
73BD000
heap
page read and write
34F9000
heap
page read and write
644B000
heap
page read and write
7263000
heap
page read and write
6B073000
unkown
page readonly
79A3000
heap
page read and write
74D2000
heap
page read and write
3BCF000
heap
page read and write
4340000
heap
page read and write
69510000
unkown
page readonly
15FD000
heap
page read and write
40D5000
heap
page read and write
671F000
heap
page read and write
8D98000
heap
page read and write
695B7000
unkown
page readonly
6289000
heap
page execute and read and write
30A7000
heap
page read and write
6184000
heap
page read and write
36EE000
heap
page read and write
15E9000
heap
page read and write
35E8000
heap
page read and write
7088000
heap
page read and write
35BF000
heap
page read and write
35E4000
heap
page read and write
600C000
heap
page read and write
3579000
heap
page read and write
6A446000
unkown
page read and write
3429000
heap
page read and write
671B000
heap
page read and write
6EE4000
heap
page read and write
6016000
heap
page read and write
391E000
heap
page read and write
619A000
heap
page read and write
413D000
heap
page read and write
5EE8000
heap
page read and write
5D8B000
heap
page read and write
6FA2000
heap
page read and write
67202000
unkown
page readonly
6757000
heap
page read and write
6FEF000
heap
page read and write
8DD7000
heap
page read and write
2FA0000
heap
page read and write
6E0A000
heap
page read and write
5EED000
heap
page read and write
37BF000
heap
page read and write
5C02000
heap
page read and write
671F000
heap
page read and write
5E8B000
heap
page read and write
67F3E000
unkown
page readonly
60B3000
heap
page read and write
6EC2000
heap
page read and write
7336000
heap
page read and write
3652000
heap
page read and write
673F000
heap
page read and write
673B000
heap
page read and write
402F000
heap
page read and write
5F2B000
heap
page read and write
7302000
heap
page read and write
367F000
heap
page read and write
59F7000
heap
page read and write
5E6D000
heap
page read and write
CE5000
heap
page read and write
593E000
heap
page execute and read and write
6409000
heap
page execute and read and write
B29000
heap
page read and write
58F4000
heap
page read and write
6CCE000
heap
page read and write
6AB47000
unkown
page read and write
4097000
heap
page read and write
8DD3000
heap
page read and write
362B000
heap
page read and write
6FF1000
heap
page read and write
6CB7000
heap
page read and write
6B2C000
heap
page read and write
6A781000
unkown
page read and write
6E07000
heap
page read and write
AED000
heap
page read and write
40DE000
heap
page read and write
7059000
heap
page read and write
8BDD000
heap
page read and write
5E8C000
heap
page read and write
5ED4000
heap
page read and write
72D4000
heap
page read and write
5DF4000
heap
page read and write
7408000
heap
page read and write
6727D000
unkown
page read and write
5D75000
heap
page read and write
5D1D000
heap
page read and write
6F53000
heap
page read and write
6704000
heap
page read and write
AF8000
heap
page read and write
BE0000
heap
page read and write
5CEC000
heap
page read and write
ADE000
heap
page read and write
6AE6000
heap
page read and write
59B3000
heap
page read and write
6D2E000
heap
page read and write
69630000
unkown
page read and write
671B000
heap
page read and write
5A4B000
heap
page read and write
7070000
heap
page read and write
63C8000
heap
page execute and read and write
2EAE000
stack
page read and write
5EF3000
heap
page read and write
AA4000
heap
page read and write
6DFF000
heap
page read and write
5CE8000
heap
page read and write
2520000
direct allocation
page read and write
3FF0000
trusted library allocation
page read and write
5A84000
heap
page read and write
6110000
heap
page read and write
C50000
heap
page read and write
5911000
heap
page read and write
69DA8000
unkown
page read and write
5CA9000
heap
page read and write
34EA000
heap
page read and write
5F19000
heap
page read and write
3045000
heap
page read and write
5D2C000
heap
page read and write
68A23000
unkown
page read and write
A9A000
heap
page read and write
8EDD000
heap
page read and write
6C20000
heap
page read and write
2B8D000
stack
page read and write
407A000
heap
page read and write
6182000
heap
page read and write
5D94000
heap
page read and write
6D18000
heap
page read and write
40C8000
heap
page read and write
37F0000
heap
page execute and read and write
5C10000
heap
page read and write
8D65000
heap
page read and write
5D8F000
heap
page read and write
5DDC000
heap
page read and write
69DA5000
unkown
page read and write
62C6000
heap
page execute and read and write
702000
unkown
page readonly
6741000
heap
page read and write
6117000
heap
page read and write
4037000
heap
page read and write
3097000
heap
page read and write
6ACD000
heap
page read and write
61C6000
heap
page read and write
5EAA000
heap
page read and write
5D1F000
heap
page read and write
6201000
heap
page read and write
8CC4000
heap
page read and write
5DA6000
heap
page read and write
3C51000
heap
page read and write
6D6D000
heap
page read and write
5D2D000
heap
page read and write
6B541000
unkown
page execute read
329C000
heap
page read and write
5D23000
heap
page read and write
AD3000
heap
page read and write
6EE2000
heap
page read and write
8F48000
heap
page read and write
598D000
heap
page read and write
30AA000
heap
page read and write
5F85000
heap
page read and write
6710E000
unkown
page execute read
2580000
heap
page read and write
6059000
heap
page read and write
34FB000
heap
page read and write
5F23000
heap
page read and write
3729000
heap
page read and write
3637000
heap
page read and write
5DB3000
heap
page read and write
3C29000
heap
page read and write
6BE0000
heap
page read and write
68148000
unkown
page read and write
6441000
heap
page read and write
7031000
heap
page read and write
67F4B000
unkown
page readonly
6FC3000
heap
page read and write
63A8000
heap
page read and write
7344000
heap
page read and write
6366000
heap
page read and write
6F78000
heap
page read and write
B05000
heap
page read and write
AD3000
heap
page read and write
58F4000
heap
page read and write
69555000
unkown
page readonly
6DD7000
heap
page read and write
405C000
heap
page read and write
6B2E000
heap
page read and write
598A000
heap
page read and write
5C19000
heap
page read and write
633C000
heap
page execute and read and write
693F5000
unkown
page execute read
58E9000
heap
page read and write
5BE8000
heap
page read and write
351A000
heap
page read and write
5EC7000
heap
page read and write
6736000
heap
page read and write
6DF7000
heap
page read and write
5F93000
heap
page read and write
6F12000
heap
page read and write
671A000
heap
page read and write
6E4C000
heap
page read and write
6CD2000
heap
page read and write
5F07000
heap
page read and write
61E3000
heap
page read and write
7502000
heap
page read and write
30C1000
heap
page read and write
351F000
heap
page read and write
3036000
heap
page read and write
6B93000
heap
page read and write
5E98000
heap
page read and write
5D35000
heap
page read and write
671F000
heap
page read and write
302C000
heap
page read and write
5CF3000
heap
page read and write
671B000
heap
page read and write
671F000
heap
page read and write
5E96000
heap
page read and write
AD3000
heap
page read and write
5961000
heap
page read and write
6060000
heap
page read and write
682E8000
unkown
page readonly
B14000
heap
page read and write
6D89000
heap
page read and write
3F30000
trusted library allocation
page read and write
40D3000
heap
page read and write
70F2000
heap
page read and write
68143000
unkown
page write copy
5A48000
heap
page read and write
6CBF000
heap
page read and write
5DD6000
heap
page read and write
6BD8000
heap
page read and write
59B2000
heap
page read and write
161D000
heap
page read and write
5ECA000
heap
page read and write
6720000
heap
page read and write
6758C000
unkown
page readonly
5CAE000
heap
page read and write
62FA000
heap
page execute and read and write
367C000
heap
page read and write
6759000
heap
page read and write
60B7000
heap
page read and write
5E8B000
heap
page read and write
5CDE000
heap
page read and write
5C7B000
heap
page read and write
6171000
heap
page read and write
671C000
heap
page read and write
5CDC000
heap
page read and write
30D7000
heap
page read and write
5929000
heap
page read and write
6A5D1000
unkown
page execute read
A92000
heap
page read and write
6A91000
heap
page read and write
1139000
heap
page read and write
5B57000
heap
page read and write
61DE000
heap
page read and write
3C41000
heap
page read and write
304C000
heap
page read and write
67271000
unkown
page read and write
67531000
unkown
page execute read
15BA000
heap
page read and write
4810000
trusted library allocation
page read and write
3676000
heap
page read and write
612C000
heap
page read and write
2EF0000
trusted library allocation
page read and write
603E000
heap
page read and write
67CD1000
unkown
page execute read
547E000
stack
page read and write
8BEF000
heap
page read and write
3408000
heap
page read and write
6F79000
heap
page read and write
61C3000
heap
page read and write
5CA6000
heap
page read and write
3461000
heap
page read and write
5E96000
heap
page read and write
671A000
heap
page read and write
2EB0000
heap
page read and write
63D0000
heap
page execute and read and write
6987F000
unkown
page read and write
AEE000
heap
page read and write
1360000
heap
page read and write
5D9F000
heap
page read and write
6716000
heap
page read and write
356B000
heap
page read and write
6787F000
unkown
page readonly
6175000
heap
page read and write
615C000
heap
page read and write
302E000
heap
page read and write
74E0000
heap
page read and write
6741000
heap
page read and write
402C000
heap
page read and write
6AAB000
heap
page read and write
6B522000
unkown
page read and write
6FE9000
heap
page read and write
6DAF000
heap
page read and write
7027000
heap
page read and write
158A000
heap
page read and write
671F000
heap
page read and write
6708000
heap
page read and write
309F000
heap
page read and write
5D0F000
heap
page read and write
5D73000
heap
page read and write
5CE0000
heap
page read and write
61E1000
heap
page read and write
5C02000
heap
page read and write
6B2E000
heap
page read and write
48CE000
stack
page read and write
6E8C000
heap
page read and write
673B000
heap
page read and write
59AF000
heap
page read and write
5BF8000
heap
page read and write
671F000
heap
page read and write
49E0000
direct allocation
page read and write
3594000
heap
page read and write
3BCF000
heap
page read and write
6159000
heap
page read and write
4063000
heap
page read and write
5C1A000
heap
page read and write
5DE9000
heap
page read and write
9215000
heap
page read and write
6090000
heap
page read and write
3433000
heap
page read and write
5E88000
heap
page read and write
ABF000
heap
page read and write
6C56000
heap
page read and write
5D6D000
heap
page read and write
5D15000
heap
page read and write
62C1000
heap
page execute and read and write
6032000
heap
page read and write
6E04000
heap
page read and write
5EFA000
heap
page read and write
6F98000
heap
page read and write
5F9A000
heap
page read and write
6DAB000
heap
page read and write
3779000
heap
page read and write
AA3A000
heap
page read and write
5AF2000
heap
page read and write
31B0000
heap
page read and write
61FF000
heap
page read and write
3694000
heap
page read and write
3BB0000
heap
page read and write
60D0000
heap
page read and write
391E000
heap
page read and write
674F000
heap
page read and write
40D5000
heap
page read and write
671C000
heap
page read and write
6B08000
heap
page read and write
8BE0000
heap
page read and write
6DFA000
heap
page read and write
6C41000
heap
page read and write
671F8000
unkown
page readonly
5CBE000
heap
page read and write
5D65000
heap
page read and write
40B9000
heap
page read and write
6AE2000
heap
page read and write
593A000
heap
page read and write
5DA7000
heap
page read and write
3293000
heap
page read and write
6720000
heap
page read and write
6467000
heap
page read and write
6AE2000
heap
page read and write
AC5000
heap
page read and write
5E87000
heap
page read and write
7FEE000
stack
page read and write
6EC0000
heap
page read and write
5EDD000
heap
page read and write
5B58000
heap
page read and write
F6E000
stack
page read and write
69281000
unkown
page execute read
6460000
heap
page read and write
611B000
heap
page read and write
33EE000
stack
page read and write
5C1C000
heap
page read and write
2F68000
stack
page read and write
6721000
heap
page read and write
3434000
heap
page read and write
4C3000
unkown
page readonly
6114000
heap
page read and write
6713000
heap
page read and write
35C8000
heap
page read and write
5C10000
heap
page read and write
6D1F000
heap
page read and write
3525000
heap
page read and write
6C50000
heap
page read and write
408F000
heap
page read and write
8BDC000
heap
page read and write
5D0F000
heap
page read and write
5D19000
heap
page read and write
3427000
heap
page read and write
6056000
heap
page read and write
6ED4000
heap
page read and write
35D5000
heap
page read and write
671B000
heap
page read and write
6713000
heap
page read and write
5935000
heap
page read and write
36D0000
trusted library allocation
page read and write
5B57000
heap
page read and write
5FAD000
heap
page read and write
CAF000
heap
page read and write
674A000
heap
page read and write
6A91000
heap
page read and write
3BC0000
heap
page read and write
A94000
heap
page read and write
ADE000
heap
page read and write
5EE2000
heap
page read and write
703F000
heap
page read and write
6F0E000
heap
page read and write
5F48000
heap
page read and write
6EBE000
heap
page read and write
52FF000
stack
page read and write
4286000
heap
page read and write
6E56000
heap
page read and write
61DE000
heap
page read and write
67563000
unkown
page readonly
35CF000
heap
page read and write
60EE000
heap
page read and write
302E000
heap
page read and write
6F20000
heap
page read and write
34E2000
heap
page read and write
4090000
heap
page read and write
400D000
heap
page read and write
67095000
unkown
page execute read
3609000
heap
page read and write
3180000
heap
page read and write
6F12000
heap
page read and write
8040000
trusted library allocation
page read and write
671F000
heap
page read and write
6D68000
heap
page read and write
5CE8000
heap
page read and write
ADE000
heap
page read and write
5E0E000
heap
page read and write
3574000
heap
page read and write
5CFA000
heap
page read and write
5DE9000
heap
page read and write
6E21000
heap
page read and write
5B52000
heap
page read and write
B36000
heap
page read and write
A92000
heap
page read and write
6240000
heap
page read and write
C97000
heap
page read and write
5C14000
heap
page read and write
15FC000
heap
page read and write
41EB000
heap
page read and write
367F000
heap
page read and write
8DF8000
heap
page read and write
6F44000
heap
page read and write
71D8000
heap
page read and write
671B000
heap
page read and write
6DB7000
heap
page read and write
35E3000
heap
page read and write
9100000
heap
page read and write
671B000
heap
page read and write
6FE4000
heap
page read and write
60EE000
heap
page read and write
37B5000
heap
page read and write
368D000
heap
page read and write
10D3000
heap
page read and write
6DA5000
heap
page read and write
5FC1000
heap
page read and write
6D97000
heap
page read and write
6A440000
unkown
page write copy
671F000
heap
page read and write
6D2F000
heap
page read and write
6A70000
heap
page read and write
673B000
heap
page read and write
3C41000
heap
page read and write
4300000
direct allocation
page read and write
6D63000
heap
page read and write
6E2E000
heap
page read and write
5D12000
heap
page read and write
6A040000
unkown
page readonly
94AC000
heap
page read and write
5DB1000
heap
page read and write
AB5000
heap
page read and write
6060000
heap
page read and write
687F1000
unkown
page readonly
5998000
heap
page read and write
64A2000
heap
page read and write
61FC000
heap
page read and write
15FC000
heap
page read and write
6C14000
heap
page read and write
3418000
heap
page read and write
3B90000
heap
page read and write
6D5D000
heap
page read and write
12DF000
stack
page read and write
64D8000
heap
page read and write
5E98000
heap
page read and write
67246000
unkown
page readonly
6089000
heap
page read and write
8D65000
heap
page read and write
3558000
heap
page read and write
6B4D5000
unkown
page readonly
5D88000
heap
page read and write
609B000
heap
page read and write
5AA4000
heap
page read and write
9B05000
heap
page read and write
5A0B000
heap
page read and write
5F33000
heap
page read and write
61AA000
heap
page read and write
67CD0000
unkown
page readonly
60DA000
heap
page read and write
67169000
unkown
page readonly
30AA000
heap
page read and write
5D14000
heap
page read and write
2FA5000
heap
page read and write
3657000
heap
page read and write
1F0000
heap
page read and write
5C9C000
heap
page read and write
66E83000
unkown
page execute read
6F24000
heap
page read and write
61ED000
heap
page read and write
6204000
heap
page read and write
63E4000
heap
page execute and read and write
671F000
heap
page read and write
302E000
heap
page read and write
5A76000
heap
page read and write
94B9000
heap
page read and write
154E000
heap
page read and write
6757000
heap
page read and write
3296000
heap
page read and write
3BCC000
heap
page read and write
8BD5000
heap
page read and write
6DE7000
heap
page read and write
B00000
heap
page read and write
6DAF000
heap
page read and write
67164000
unkown
page readonly
5DCA000
heap
page read and write
617E000
heap
page read and write
35BA000
heap
page read and write
6B3A0000
unkown
page readonly
5C99000
heap
page read and write
6C25000
heap
page read and write
4087000
heap
page read and write
60F2000
heap
page read and write
5F94000
heap
page read and write
6DA7000
heap
page read and write
AA9000
heap
page read and write
31F3000
heap
page read and write
671C000
heap
page read and write
6C9D000
heap
page read and write
61F6000
heap
page read and write
15FC000
heap
page read and write
8BDB000
heap
page read and write
6F50000
heap
page read and write
5C02000
heap
page read and write
355B000
heap
page read and write
4058000
heap
page read and write
6457000
heap
page read and write
3622000
heap
page read and write
B38000
stack
page read and write
AF0000
heap
page read and write
30C1000
heap
page read and write
671F000
heap
page read and write
5DE2000
heap
page read and write
5BDC000
heap
page read and write
620F000
heap
page read and write
5AC4000
heap
page read and write
37DA000
heap
page read and write
B2A000
heap
page read and write
5C2E000
heap
page read and write
ACE000
heap
page read and write
6512000
heap
page read and write
6CDF000
heap
page read and write
671B000
heap
page read and write
6E6C000
heap
page read and write
5BF3000
heap
page read and write
671B000
heap
page read and write
CC7000
heap
page read and write
9192000
heap
page read and write
5DB1000
heap
page read and write
15FC000
heap
page read and write
15EC000
heap
page read and write
5F8B000
heap
page read and write
251D000
stack
page read and write
60A4000
heap
page read and write
671F000
heap
page read and write
3531000
heap
page read and write
35A2000
heap
page read and write
317A000
heap
page read and write
5EE3000
heap
page read and write
5F92000
heap
page read and write
6D21000
heap
page read and write
B05000
heap
page read and write
5D57000
heap
page read and write
60AD000
heap
page read and write
634B000
heap
page execute and read and write
671F000
heap
page read and write
671A9000
unkown
page readonly
5D6D000
heap
page read and write
919C000
heap
page read and write
91A8000
heap
page read and write
6056000
heap
page read and write
61EF000
heap
page read and write
63B0000
heap
page execute and read and write
36FB000
heap
page read and write
31EC000
heap
page read and write
7157000
heap
page read and write
3403000
heap
page read and write
62F6000
heap
page read and write
6F17000
heap
page read and write
6B4FD000
unkown
page readonly
405F000
heap
page read and write
70FF000
heap
page read and write
6DF5000
heap
page read and write
6240000
heap
page read and write
6A97000
heap
page read and write
6AF4000
heap
page read and write
15FC000
heap
page read and write
6BC2000
heap
page read and write
5929000
heap
page read and write
318D000
heap
page read and write
671F000
heap
page read and write
6EEB000
heap
page read and write
702A000
heap
page read and write
4EC000
stack
page read and write
613C000
heap
page read and write
671D000
heap
page read and write
3C21000
heap
page read and write
6059000
heap
page read and write
40DD000
heap
page read and write
3070000
heap
page read and write
673B000
heap
page read and write
402C000
heap
page read and write
3C41000
heap
page read and write
6A322000
unkown
page readonly
5CBE000
heap
page read and write
5A8C000
heap
page read and write
6F27000
heap
page read and write
5E75000
heap
page read and write
4093000
heap
page read and write
63C1000
heap
page execute and read and write
6F2C000
heap
page read and write
6B09000
heap
page read and write
4046000
heap
page read and write
15DA000
heap
page read and write
40CA000
heap
page read and write
40D0000
heap
page read and write
15FC000
heap
page read and write
6741000
heap
page read and write
68149000
unkown
page write copy
15FA000
heap
page read and write
1C0000
heap
page read and write
7F46000
heap
page read and write
6C56000
heap
page read and write
A94000
heap
page read and write
675C000
heap
page read and write
1143000
heap
page read and write
618F000
heap
page read and write
671F000
heap
page read and write
6371000
heap
page execute and read and write
6184000
heap
page read and write
8BDF000
heap
page read and write
3696000
heap
page read and write
15FC000
heap
page read and write
671B000
heap
page read and write
67218000
unkown
page readonly
CA0000
heap
page read and write
615E000
heap
page read and write
5A4C000
heap
page read and write
60F4000
heap
page read and write
6F4D000
heap
page read and write
638D000
heap
page execute and read and write
537E000
stack
page read and write
671B000
heap
page read and write
671C000
heap
page read and write
59AC000
stack
page read and write
3BCF000
heap
page read and write
6AF8000
heap
page read and write
62EE000
heap
page execute and read and write
4089000
heap
page read and write
3747000
heap
page read and write
61DE000
heap
page read and write
5C82000
heap
page read and write
60BA000
heap
page read and write
3C29000
heap
page read and write
62B7000
heap
page execute and read and write
3BEB000
heap
page read and write
302E000
heap
page read and write
72DA000
heap
page read and write
74DE000
heap
page read and write
6EDA000
heap
page read and write
6353000
heap
page execute and read and write
3C29000
heap
page read and write
66EB7000
unkown
page execute read
360C000
heap
page read and write
8BD6000
heap
page read and write
B14000
heap
page read and write
42A0000
heap
page read and write
59B4000
heap
page read and write
674C000
heap
page read and write
60B0000
heap
page read and write
6E33000
heap
page read and write
6700000
heap
page read and write
6CAA000
heap
page read and write
5E19000
heap
page read and write
8D17000
heap
page read and write
6B01000
heap
page read and write
6110000
heap
page read and write
61C1000
heap
page read and write
6F9A000
heap
page read and write
63A9000
heap
page execute and read and write
6056000
heap
page read and write
327E000
heap
page read and write
5EC0000
heap
page read and write
7093000
heap
page read and write
674A000
heap
page read and write
AA9000
heap
page read and write
6203000
heap
page read and write
5E0E000
heap
page read and write
6051000
heap
page read and write
30BA000
heap
page read and write
CAA000
heap
page read and write
61E8000
heap
page read and write
6173000
heap
page read and write
A9A000
heap
page read and write
6EB0000
heap
page read and write
5E56000
heap
page read and write
15DE000
heap
page read and write
301E000
heap
page read and write
407E000
heap
page read and write
708F000
heap
page read and write
30BC000
heap
page read and write
6A45B000
unkown
page read and write
40CE000
heap
page read and write
6F3E000
heap
page read and write
671B000
heap
page read and write
1571000
heap
page read and write
A73000
heap
page read and write
66EB1000
unkown
page execute read
AE3000
heap
page read and write
8C64000
heap
page read and write
A53000
heap
page read and write
67F66000
unkown
page readonly
35DE000
heap
page read and write
5C22000
heap
page read and write
6175000
heap
page read and write
319B000
heap
page read and write
ABF000
heap
page read and write
8BE7000
heap
page read and write
7373000
heap
page read and write
61CD000
heap
page read and write
5D8D000
heap
page read and write
40C6000
heap
page read and write
6757000
heap
page read and write
6177000
heap
page read and write
AC4000
heap
page read and write
6BB6000
heap
page read and write
317F000
heap
page read and write
3090000
heap
page read and write
4063000
heap
page read and write
5D2B000
heap
page read and write
72A6000
heap
page read and write
1566000
heap
page read and write
4024000
heap
page read and write
6080000
heap
page read and write
63A7000
heap
page execute and read and write
6DBB000
heap
page read and write
73FD000
heap
page read and write
5D81000
heap
page read and write
6AAB000
heap
page read and write
680DD000
unkown
page readonly
5FC6000
heap
page read and write
5AA4000
heap
page read and write
5C79000
heap
page read and write
30B6000
heap
page read and write
7092000
heap
page read and write
6020000
heap
page read and write
5C7F000
heap
page read and write
59A4000
heap
page read and write
35EB000
heap
page read and write
60ED000
heap
page read and write
5EC4000
heap
page read and write
6EBD000
heap
page read and write
30BC000
heap
page read and write
6C44000
heap
page read and write
6D18000
heap
page read and write
24E3000
heap
page read and write
6743000
heap
page read and write
342F000
heap
page read and write
7F10000
direct allocation
page read and write
671D000
heap
page read and write
60FE000
heap
page read and write
306F000
heap
page read and write
391E000
heap
page read and write
112D000
heap
page read and write
6C96000
heap
page read and write
4050000
heap
page read and write
258D000
heap
page read and write
402E000
heap
page read and write
628A000
heap
page execute and read and write
5DDE000
heap
page read and write
604E000
heap
page read and write
671F000
heap
page read and write
675CE000
unkown
page read and write
AB7000
heap
page read and write
7062000
heap
page read and write
72A2000
heap
page read and write
5F07000
heap
page read and write
3036000
heap
page read and write
6B44000
heap
page read and write
57A0000
heap
page execute and read and write
59F3000
heap
page read and write
6E2B000
heap
page read and write
5A56000
heap
page read and write
5CA1000
heap
page read and write
5D2F000
heap
page read and write
3658000
heap
page read and write
671C000
heap
page read and write
5DDC000
heap
page read and write
6726F000
unkown
page read and write
6F0F000
heap
page read and write
61FC000
heap
page read and write
5D57000
heap
page read and write
6C76000
heap
page read and write
5EEA000
heap
page read and write
5932000
heap
page read and write
5E96000
heap
page read and write
6B1C000
heap
page read and write
62F3000
heap
page read and write
30A5000
heap
page read and write
69DA6000
unkown
page write copy
15FC000
heap
page read and write
8C92000
heap
page read and write
15FC000
heap
page read and write
5CFC000
heap
page read and write
7696000
heap
page read and write
671F000
heap
page read and write
6752000
heap
page read and write
62EA000
heap
page read and write
5E8C000
heap
page read and write
AD3000
heap
page read and write
6743000
heap
page read and write
3209000
heap
page read and write
5D5D000
heap
page read and write
302E000
heap
page read and write
5BF4000
heap
page read and write
618E000
heap
page read and write
59DA000
heap
page read and write
37EE000
heap
page read and write
6D31000
heap
page read and write
729E000
heap
page read and write
32EE000
heap
page read and write
8F95000
heap
page read and write
671F000
heap
page read and write
7047000
heap
page read and write
61ED000
heap
page read and write
B29000
heap
page read and write
6100000
heap
page read and write
6F65000
heap
page read and write
59D6000
heap
page read and write
6B97000
heap
page read and write
5CE0000
heap
page read and write
5D21000
heap
page read and write
5D21000
heap
page read and write
B05000
heap
page read and write
3621000
heap
page read and write
5C89000
heap
page read and write
6197000
heap
page read and write
6098000
heap
page read and write
3228000
heap
page read and write
B06000
heap
page read and write
6E7C000
heap
page read and write
5D1F000
heap
page read and write
8A3F000
stack
page read and write
5C02000
heap
page read and write
4284000
heap
page read and write
6C60000
heap
page read and write
694C2000
unkown
page execute read
61C1000
heap
page read and write
3E20000
heap
page read and write
3031000
heap
page read and write
6E5C000
heap
page read and write
6BDE000
heap
page read and write
6CAD000
heap
page read and write
5CA3000
heap
page read and write
6B94000
heap
page read and write
6774000
heap
page read and write
5B43000
heap
page read and write
7063000
heap
page read and write
6178000
heap
page read and write
68A20000
unkown
page read and write
671B000
heap
page read and write
5D19000
heap
page read and write
6F0D000
heap
page read and write
4089000
heap
page read and write
523E000
stack
page read and write
66E86000
unkown
page execute read
3E3E000
stack
page read and write
3BF5000
heap
page read and write
8FE4000
heap
page read and write
8BDA000
heap
page read and write
5B91000
heap
page read and write
6EC8000
heap
page read and write
15FD000
heap
page read and write
5CFD000
heap
page read and write
6713000
heap
page read and write
62C1000
heap
page execute and read and write
6BD9000
heap
page read and write
BCA000
unkown
page readonly
CAE000
heap
page read and write
5CA0000
heap
page read and write
36BA000
heap
page read and write
682D8000
unkown
page readonly
5D76000
heap
page read and write
3023000
heap
page read and write
308F000
heap
page read and write
8BD0000
trusted library allocation
page read and write
6240000
heap
page read and write
58F0000
heap
page read and write
6022000
heap
page read and write
6782D000
unkown
page readonly
5D49000
heap
page read and write
5C12000
heap
page read and write
602C000
heap
page read and write
36AC000
heap
page read and write
6F3F000
heap
page read and write
6737000
heap
page read and write
6E60000
heap
page read and write
CAA000
heap
page read and write
117E000
heap
page read and write
5D41000
heap
page read and write
FCE000
stack
page read and write
15E5000
heap
page read and write
5DF0000
heap
page read and write
6176000
heap
page read and write
5D39000
heap
page read and write
6CE0000
heap
page read and write
37C6000
heap
page read and write
5F15000
heap
page read and write
3579000
heap
page read and write
66EE0000
unkown
page execute read
708F000
heap
page read and write
64FA000
heap
page read and write
5EC3000
heap
page read and write
5D11000
heap
page read and write
6EDB000
heap
page read and write
50BE000
stack
page read and write
AC1000
heap
page read and write
3BA0000
heap
page read and write
C9C000
heap
page read and write
6AB4B000
unkown
page write copy
6B32000
heap
page read and write
7031000
heap
page read and write
5D2A000
heap
page read and write
36DE000
heap
page read and write
3B92000
heap
page read and write
3701000
heap
page read and write
37B0000
heap
page read and write
8BD6000
heap
page read and write
6D25000
heap
page read and write
3633000
heap
page read and write
6C37000
heap
page read and write
5D4D000
heap
page read and write
74D7000
heap
page read and write
1170000
heap
page read and write
3080000
heap
page read and write
3004000
heap
page read and write
599C000
heap
page read and write
5E81000
heap
page read and write
671F000
heap
page read and write
62F9000
heap
page read and write
5DC1000
heap
page read and write
6C59000
heap
page read and write
3265000
heap
page read and write
6082000
heap
page read and write
671B000
heap
page read and write
5DA4000
heap
page read and write
681A1000
unkown
page execute read
61EA000
heap
page read and write
62D0000
heap
page read and write
621C000
heap
page read and write
6CCE000
heap
page read and write
8BD6000
heap
page read and write
343D000
heap
page read and write
3229000
heap
page read and write
403D000
heap
page read and write
735F000
heap
page read and write
44D7000
heap
page read and write
AF0000
heap
page read and write
AC2000
heap
page read and write
44D0000
heap
page read and write
5C02000
heap
page read and write
3603000
heap
page read and write
5D2B000
heap
page read and write
3031000
heap
page read and write
5CDC000
heap
page read and write
5DC1000
heap
page read and write
4064000
heap
page read and write
5EDE000
heap
page read and write
8BF5000
heap
page read and write
74C1000
heap
page read and write
94BC000
heap
page read and write
6141000
heap
page read and write
304C000
heap
page read and write
5EFA000
heap
page read and write
6265000
heap
page read and write
5CB1000
heap
page read and write
31E2000
heap
page read and write
6725000
heap
page read and write
6AA0000
heap
page read and write
5C8D000
heap
page read and write
5E7D000
heap
page read and write
6EDA000
heap
page read and write
6DD7000
heap
page read and write
5DF0000
heap
page read and write
5CC0000
heap
page read and write
5CFE000
heap
page read and write
9232000
heap
page read and write
406E000
heap
page read and write
7027000
heap
page read and write
3517000
heap
page read and write
6BC0000
heap
page read and write
6148000
heap
page read and write
3BFF000
heap
page read and write
AD2000
heap
page read and write
35D8000
heap
page read and write
6483000
heap
page read and write
383F000
stack
page read and write
157C000
heap
page read and write
5D0F000
heap
page read and write
15FD000
heap
page read and write
6EF4000
heap
page read and write
671D9000
unkown
page readonly
6480000
heap
page read and write
638A000
heap
page execute and read and write
671F000
heap
page read and write
3906000
heap
page execute and read and write
5DAB000
heap
page read and write
5E81000
heap
page read and write
35BE000
heap
page read and write
716C000
heap
page read and write
6180000
heap
page read and write
37DF000
heap
page read and write
67F80000
unkown
page readonly
6DDD000
heap
page read and write
60FD000
heap
page read and write
3716000
heap
page read and write
5C04000
heap
page read and write
34FE000
heap
page read and write
6BAA000
heap
page read and write
4011000
heap
page read and write
6C75000
heap
page read and write
61C1000
heap
page read and write
6C25000
heap
page read and write
67F8B000
unkown
page readonly
35B6000
heap
page read and write
6F9C000
heap
page read and write
5A2B000
heap
page read and write
64E4000
heap
page read and write
6AA1B000
unkown
page readonly
A9A000
heap
page read and write
6E21000
heap
page read and write
8CE1000
heap
page read and write
A40000
heap
page read and write
5FA1000
heap
page read and write
5F14000
heap
page read and write
6736000
heap
page read and write
6C2A000
heap
page read and write
6EB0000
heap
page read and write
63D4000
heap
page execute and read and write
5D45000
heap
page read and write
5B67000
heap
page read and write
6BFC000
heap
page read and write
6E8C000
heap
page read and write
60BC000
heap
page read and write
5DF8000
heap
page read and write
571F000
stack
page read and write
5B77000
heap
page read and write
5BD5000
heap
page read and write
5E0E000
heap
page read and write
6C1F000
heap
page read and write
5D6D000
heap
page read and write
3000000
heap
page read and write
6F31000
heap
page read and write
51C0000
heap
page read and write
6AFC000
heap
page read and write
6BF4000
heap
page read and write
1170000
heap
page read and write
6D97000
heap
page read and write
673B000
heap
page read and write
30C1000
heap
page read and write
3295000
heap
page read and write
532000
unkown
page readonly
638B000
heap
page execute and read and write
A9A000
heap
page read and write
5FB2000
heap
page read and write
B01000
heap
page read and write
605E000
heap
page read and write
5DD8000
heap
page read and write
671C000
heap
page read and write
682C7000
unkown
page readonly
5FA5000
heap
page read and write
8C40000
heap
page read and write
33FE000
stack
page read and write
5C04000
heap
page read and write
6CD4000
heap
page read and write
5B4E000
heap
page read and write
3C51000
heap
page read and write
5E63000
heap
page read and write
5E6E000
heap
page read and write
94C1000
heap
page read and write
599F000
heap
page read and write
69527000
unkown
page readonly
6C6B000
heap
page read and write
7425000
heap
page read and write
3BD9000
heap
page read and write
6AF11000
unkown
page execute read
6480000
heap
page read and write
BB2000
unkown
page readonly
68170000
unkown
page read and write
6AF4000
heap
page read and write
62D9000
heap
page execute and read and write
6479000
heap
page read and write
32A5000
heap
page read and write
6736000
heap
page read and write
5E30000
heap
page read and write
789000
stack
page read and write
5C06000
heap
page read and write
6A442000
unkown
page read and write
5E87000
heap
page read and write
6AD0000
heap
page read and write
72FE000
heap
page read and write
8E8F000
stack
page read and write
4037000
heap
page read and write
6160000
heap
page read and write
3700000
heap
page read and write
6032000
heap
page read and write
3180000
heap
page read and write
3BCE000
heap
page read and write
3C21000
heap
page read and write
6CCC000
heap
page read and write
6C2A000
heap
page read and write
5D94000
heap
page read and write
3540000
heap
page read and write
6718B000
unkown
page readonly
362F000
heap
page read and write
7F08000
heap
page read and write
5C14000
heap
page read and write
3BC6000
heap
page read and write
40B9000
heap
page read and write
15D3000
heap
page read and write
606D000
heap
page read and write
3ADF000
stack
page read and write
5D85000
heap
page read and write
601F000
heap
page read and write
532000
unkown
page readonly
7360000
heap
page read and write
6715E000
unkown
page readonly
5A01000
heap
page read and write
5D51000
heap
page read and write
694FB000
unkown
page readonly
58EC000
heap
page read and write
4102000
heap
page read and write
357D000
heap
page read and write
62DF000
heap
page read and write
AED000
heap
page read and write
6396000
heap
page execute and read and write
156E000
heap
page read and write
15ED000
heap
page read and write
3432000
heap
page read and write
9058000
heap
page read and write
34EB000
heap
page read and write
67433000
unkown
page execute read
673B000
heap
page read and write
671B000
heap
page read and write
40E0000
heap
page read and write
5E6B000
heap
page read and write
5D3D000
heap
page read and write
3080000
heap
page read and write
37EB000
heap
page read and write
6B2F000
heap
page read and write
5DA3000
heap
page read and write
5C70000
heap
page read and write
610C000
heap
page read and write
34E8000
heap
page read and write
3298000
heap
page read and write
5D88000
heap
page read and write
AEC000
heap
page read and write
611C000
heap
page read and write
612C000
heap
page read and write
619B000
heap
page read and write
3523000
heap
page read and write
6080000
heap
page read and write
5DB5000
heap
page read and write
6E4C000
heap
page read and write
5D1D000
heap
page read and write
3BCA000
heap
page read and write
68157000
unkown
page read and write
40AE000
heap
page read and write
8C8E000
heap
page read and write
6DFF000
heap
page read and write
5FB5000
heap
page read and write
ABE000
heap
page read and write
5929000
heap
page read and write
5D6D000
heap
page read and write
6FF000
unkown
page write copy
62BE000
heap
page execute and read and write
6B9E000
heap
page read and write
5BEE000
heap
page read and write
6052000
heap
page read and write
703C000
heap
page read and write
5BF8000
heap
page read and write
671E000
heap
page read and write
5F0D000
heap
page read and write
35BA000
heap
page read and write
617E000
heap
page read and write
614A000
heap
page read and write
6270000
heap
page execute and read and write
5D19000
heap
page read and write
5D55000
heap
page read and write
5DAB000
heap
page read and write
B1B000
heap
page read and write
306E000
heap
page read and write
395B000
stack
page read and write
4061000
heap
page read and write
6191000
heap
page read and write
6C1D000
heap
page read and write
15FC000
heap
page read and write
5EE3000
heap
page read and write
7F09000
heap
page read and write
7418000
heap
page read and write
31ED000
heap
page read and write
6713000
heap
page read and write
6482000
heap
page read and write
69625000
unkown
page write copy
15FC000
heap
page read and write
671E000
heap
page read and write
32D3000
heap
page read and write
9053000
heap
page read and write
628F000
heap
page execute and read and write
42D0000
heap
page read and write
6354000
heap
page read and write
6DF5000
heap
page read and write
6721000
heap
page read and write
6EE4000
heap
page read and write
6F97000
heap
page read and write
6077000
heap
page read and write
15E5000
heap
page read and write
6E2E000
heap
page read and write
5DE9000
heap
page read and write
6F0F000
heap
page read and write
31EE000
heap
page read and write
5DFD000
heap
page read and write
5D18000
heap
page read and write
346B000
heap
page read and write
61BB000
heap
page read and write
8A7C000
stack
page read and write
1599000
heap
page read and write
615B000
heap
page read and write
40AE000
heap
page read and write
751A000
heap
page read and write
671B000
heap
page read and write
671F000
heap
page read and write
37C9000
heap
page read and write
66E7A000
unkown
page execute read
7215000
heap
page read and write
4040000
heap
page read and write
4044000
heap
page read and write
30CD000
heap
page read and write
6B86000
heap
page read and write
64E6000
heap
page read and write
FB7000
heap
page read and write
61B6000
heap
page read and write
66E76000
unkown
page execute read
671F000
heap
page read and write
7FD8000
trusted library allocation
page read and write
5BF1000
heap
page read and write
61B8000
heap
page read and write
5E0E000
heap
page read and write
686F000
stack
page read and write
6EB4000
heap
page read and write
5CA6000
heap
page read and write
5744000
heap
page read and write
6F33000
heap
page read and write
B18000
heap
page read and write
3035000
heap
page read and write
6155000
heap
page read and write
96DC000
heap
page read and write
671D000
heap
page read and write
62EE000
heap
page execute and read and write
6508000
heap
page read and write
6E02000
heap
page read and write
74DA000
heap
page read and write
59DA000
heap
page read and write
5DF2000
heap
page read and write
30CD000
heap
page read and write
5E6B000
heap
page read and write
15FC000
heap
page read and write
6486000
heap
page read and write
6C3A000
heap
page read and write
671F000
heap
page read and write
B70000
heap
page read and write
B18000
heap
page read and write
6153000
heap
page read and write
5994000
heap
page read and write
12BE000
stack
page read and write
64A7000
heap
page read and write
65BC000
stack
page read and write
2FA9000
heap
page read and write
671F000
heap
page read and write
5ECA000
heap
page read and write
5FD1000
heap
page read and write
7072000
heap
page read and write
6F73000
heap
page read and write
CBB000
heap
page read and write
6F2F000
heap
page read and write
5EFA000
heap
page read and write
AEF000
heap
page read and write
8BD6000
heap
page read and write
5F75000
heap
page read and write
7072000
heap
page read and write
6030000
heap
page read and write
59A6000
heap
page read and write
8DA2000
heap
page read and write
5F30000
heap
page read and write
353B000
heap
page read and write
5ACC000
heap
page read and write
749F000
heap
page read and write
31C0000
heap
page read and write
602F000
heap
page read and write
6F12000
heap
page read and write
3BC9000
heap
page read and write
6F33000
heap
page read and write
5FFD000
stack
page read and write
61DE000
heap
page read and write
AC5000
heap
page read and write
673B000
heap
page read and write
5E26000
heap
page read and write
AC4000
heap
page read and write
5D0F000
heap
page read and write
61EF000
heap
page read and write
170000
heap
page read and write
5DD6000
heap
page read and write
326D000
heap
page read and write
CBF000
heap
page read and write
633A000
heap
page read and write
696E1000
unkown
page execute read
5EBC000
heap
page read and write
5A0C000
heap
page read and write
7F0000
heap
page read and write
6A447000
unkown
page write copy
8BDE000
heap
page read and write
71E3000
heap
page read and write
5C75000
heap
page read and write
6F18000
heap
page read and write
5EED000
heap
page read and write
69585000
unkown
page readonly
35A9000
heap
page read and write
5CBF000
heap
page read and write
8E76000
heap
page read and write
AED000
heap
page read and write
671BB000
unkown
page readonly
68415000
unkown
page execute read
59D2000
heap
page read and write
7031000
heap
page read and write
671D2000
unkown
page readonly
40A5000
heap
page read and write
671B000
heap
page read and write
671D000
heap
page read and write
6CB6000
heap
page read and write
61A6000
heap
page read and write
7328000
heap
page read and write
3187000
heap
page read and write
61BA000
heap
page read and write
5C8A000
heap
page read and write
5E1F000
heap
page read and write
32AE000
heap
page read and write
7040000
heap
page read and write
6CBF000
heap
page read and write
6089000
heap
page read and write
6004000
heap
page read and write
5E75000
heap
page read and write
671B000
heap
page read and write
671F000
heap
page read and write
627B000
heap
page execute and read and write
B29000
heap
page read and write
58FC000
heap
page read and write
6DB7000
heap
page read and write
67F87000
unkown
page readonly
A2D000
stack
page read and write
8BE0000
heap
page read and write
5A74000
heap
page read and write
104000
stack
page read and write
671B000
heap
page read and write
5F8E000
heap
page read and write
10DC000
heap
page read and write
5CF2000
heap
page read and write
AC5000
heap
page read and write
36A8000
heap
page read and write
AB7000
heap
page read and write
61C8000
heap
page read and write
67161000
unkown
page readonly
5EFA000
heap
page read and write
2BB6000
heap
page read and write
5B47000
heap
page read and write
5EE4000
heap
page read and write
300E000
heap
page read and write
612C000
heap
page read and write
60EB000
heap
page read and write
346A000
heap
page read and write
60A1000
heap
page read and write
15FC000
heap
page read and write
71B8000
heap
page read and write
5F2C000
heap
page read and write
6F12000
heap
page read and write
671F000
heap
page read and write
671F000
heap
page read and write
301E000
heap
page read and write
CA2000
heap
page read and write
608F000
heap
page read and write
6B0C000
heap
page read and write
ACE000
heap
page read and write
6AA0000
heap
page read and write
5BE8000
heap
page read and write
35FD000
heap
page read and write
5B4D000
heap
page read and write
3048000
heap
page read and write
304C000
heap
page read and write
6079000
heap
page read and write
60D5000
heap
page read and write
671B000
heap
page read and write
673E000
heap
page read and write
35DB000
heap
page read and write
3BD7000
heap
page read and write
3B90000
heap
page read and write
6172000
heap
page read and write
682E3000
unkown
page readonly
6822B000
unkown
page execute read
6DF9000
heap
page read and write
6451000
heap
page read and write
696C000
stack
page read and write
633A000
heap
page read and write
355C000
heap
page read and write
6B44000
heap
page read and write
3626000
heap
page read and write
3C2A000
heap
page read and write
40C6000
heap
page read and write
607C000
heap
page read and write
6CAA000
heap
page read and write
15FA000
heap
page read and write
427B000
heap
page read and write
6157000
heap
page read and write
1604000
heap
page read and write
3549000
heap
page read and write
B3D000
heap
page read and write
71C4000
heap
page read and write
323D000
heap
page read and write
6C34000
heap
page read and write
6D29000
heap
page read and write
6144000
heap
page read and write
6E4F000
heap
page read and write
671B000
heap
page read and write
A34000
stack
page read and write
6B0A000
heap
page read and write
8EE4000
heap
page read and write
670C3000
unkown
page execute read
6174000
heap
page read and write
6050000
heap
page read and write
6116000
heap
page read and write
5BE1000
heap
page read and write
5FD1000
heap
page read and write
6F74000
heap
page read and write
5EC0000
heap
page read and write
60EB000
heap
page read and write
42A3000
heap
page read and write
607D000
heap
page read and write
66E88000
unkown
page execute read
70FA000
heap
page read and write
351A000
heap
page read and write
611B000
heap
page read and write
671F000
heap
page read and write
6AB49000
unkown
page read and write
5FA1000
heap
page read and write
B05000
heap
page read and write
51BE000
stack
page read and write
3543000
heap
page read and write
15FD000
heap
page read and write
3031000
heap
page read and write
9050000
heap
page read and write
69627000
unkown
page read and write
5E5C000
heap
page read and write
3DAF000
stack
page read and write
4886000
trusted library allocation
page read and write
5D5E000
heap
page read and write
36FB000
stack
page read and write
15F2000
heap
page read and write
F1E000
stack
page read and write
6208000
heap
page read and write
6B0DE000
unkown
page read and write
3C30000
heap
page read and write
There are 3660 hidden memdumps, click here to show them.