Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
2cFFfHDG7D.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
initial sample
|
||
C:\Config.Msi\56f4af.rbs
|
data
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\BouncyCastle.Crypto.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\System.ValueTuple.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI27EA.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
modified
|
||
C:\Windows\Installer\MSI27EA.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI27EA.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSID78.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSID78.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSID78.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIF644.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSIF644.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIF644.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIF924.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSIF924.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIF924.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIF9C.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\System32\InstallUtil.InstallLog
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\~DF1D087F7A3E9CA16A.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF6A8465F9B84E5905.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF6E3B0B399A62DDDC.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF976A0F2522BB20B3.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFB4214A4473B515E6.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFEB3FF44FCF811A1A.TMP
|
data
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallState
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation.zip
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.ini
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AteraAgent.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\Installer\56f4ae.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\56f4b0.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\MSI1116.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI27EA.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSI27EA.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI27EA.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSID78.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSID78.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSID78.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIF644.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSIF644.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIF644.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIF924.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSIF924.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIF924.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIF9D.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIFFB.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SourceHash{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1A374813EDB1A6631387E414D3E73232
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\329B6147266C1E26CD774EA22B79EC2E
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BA74182F76F15A9CF514DEF352303C95
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
Certificate, Version=3
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
|
Certificate, Version=3
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1A374813EDB1A6631387E414D3E73232
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\329B6147266C1E26CD774EA22B79EC2E
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
|
data
|
modified
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BA74182F76F15A9CF514DEF352303C95
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageAgentInformation.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\Temp\~DF14163CA0B260B1E9.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF24E6A300EFCABCAA.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFA1DF50E87199E3FA.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFA7DEFBF093EFC4B6.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFC1A00F68BCA0E010.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFF5DEE46F6D57FE24.TMP
|
data
|
dropped
|
||
\Device\ConDrv
|
JSON data
|
dropped
|
There are 75 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSIF644.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5699250 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSIF924.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5699937 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSID78.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5705093 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="omar.zetawi@polaris-tek.com" /CompanyId="1"
/IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000HarDhIAJ" /AgentId="7d7ca517-f825-4372-8327-c232f61880c4"
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
|
||
C:\Windows\System32\sc.exe
|
"C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI27EA.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5711890 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
7d7ca517-f825-4372-8327-c232f61880c4 "3205572e-b701-411c-935a-8eefcd863daa" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000HarDhIAJ
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
7d7ca517-f825-4372-8327-c232f61880c4 "e84a63c2-b176-4565-84a8-bf664a770baa" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000HarDhIAJ
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
7d7ca517-f825-4372-8327-c232f61880c4 "64e30cd7-7773-4e23-a998-f6edaea887a9" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000HarDhIAJ
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
7d7ca517-f825-4372-8327-c232f61880c4 "0a143a2b-b19b-4fce-bc04-41b81bcbcc4b" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000HarDhIAJ
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
7d7ca517-f825-4372-8327-c232f61880c4 "0a143a2b-b19b-4fce-bc04-41b81bcbcc4b" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000HarDhIAJ
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
7d7ca517-f825-4372-8327-c232f61880c4 "f7c52d87-a697-402f-9ddb-f4bd7930a959" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000HarDhIAJ
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
7d7ca517-f825-4372-8327-c232f61880c4 "34fed5af-6ccf-418e-89e6-f319c0139431" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000HarDhIAJ
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
7d7ca517-f825-4372-8327-c232f61880c4 "16f383b9-4be1-4380-b33c-f4b37a96755f" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000HarDhIAJ
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\2cFFfHDG7D.msi"
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding 0F692C21F340271B8770E1FC6E93F18E
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding 185C737B37B128F567DAE967E866CAE9 E Global\MSI0000
|
||
C:\Windows\SysWOW64\net.exe
|
"NET" STOP AteraAgent
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\net1.exe
|
C:\Windows\system32\net1 STOP AteraAgent
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"TaskKill.exe" /f /im AteraAgent.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 23 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://microsoft.co$
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517-f825-4372-8327-c232f61880c4/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=04b28964-6ef0-4a42-97e9-de0d1f8969f6&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.227
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517-f825-4372-8327-c232f61880c4/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=7232c231-fbd8-40c5-9fd4-a6b3ac2c95bc&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.227
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=6108e17e-e70c-47ee-93a9-dff9a3c5dc87&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.229
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/7d7ca517-f825-4372-8327-c232f61880c4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=644afada-5df7-4de5-b444-b1d3402ba380&tr=43&tt=17200237221481014&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.229
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=580032ce-f9f4-4e21-acd4-6e1ccc580200
|
unknown
|
||
http://schemas.datacontract.org
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/7d7ca517-f825-4372-8327-c232f61880c4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=8c864d9a-ab98-41ba-aa3b-cc8bfbb46040&tt=0&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.229
|
||
https://agent-api.atera.com/Production/Agent/GetCommands)
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/7d7ca517-f825-4372-8327-c232f61880c4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=3223849c-8c48-4b98-a40e-e3dd7f3726a2&tr=43&tt=17200236621884071&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.229
|
||
http://ocsp.digicert.c
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/track-event
|
unknown
|
||
http://dl.google.com/googletalk/googletalk-setup.exe
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/7d7ca517-f825-4372-8327-c232f61880c4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=59ddd6fa-ec59-4c28-92e6-b21af451dd77&tt=0&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.227
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=ceac7b8a-d06f-46f6-b40d-723d7f8ecc6e&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.229
|
||
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.1/AgentPackageAg
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=4268a400-66a4-4a60-8ada-3d40a293c400&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.229
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/7d7ca517-f825-4372-8327-c232f61880c4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=357c8023-d06f-43c6-af75-ff9276fa6312&tr=43&tt=17200236682775915&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.229
|
||
https://ps.atera.com/agentpackageswin/AgentPackageAgentI
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=31d30483-1276-494b-8626-3e162b57285f
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=6e72782c-04f9-4b3f-b04c-e2bcfd8dec88
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=e3c1bb87-134a-4b79-9350-4fcf40025dd1
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=01817154-5258-48a3-85c0-e83f589a219b&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.229
|
||
https://agent-api.atera.com/Production/Agent/
|
unknown
|
||
http://schemas.datacontract.org/2004/07/System.ServiceProcess
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetCommandsFallback)
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=272b312b-8cbb-4ed4-bd82-1f2dd3cf8d11&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.229
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517-f825-4372-8327-c232f61880c4/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=9d6606e1-8f57-49c5-9ab0-2ca887e76ed8&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.227
|
||
http://wixtoolset.org
|
unknown
|
||
https://agent-api.atera.com/Production
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageProgramManagement/22.9/AgentPackageProgramManage
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.Watchdog/1.5/Agent.Package.Watchdog.zip
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/track-event;
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageRuntimeInstaller/13.0/AgentPackageRuntimeInstaller
|
unknown
|
||
http://acontrol.atera.com/
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/Agent
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517-f825-4372-8327-c232f61880c4/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=dbb4b35f-5f78-4ab4-bdd1-d6b922caff40&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.227
|
||
https://agent-api.atera.com/Production/Agent/AgentStarting)
|
unknown
|
||
https://ps.pndsn.com
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517-f825-4372-8327-c232f61880c4/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=c089a5f6-aacc-464d-ba59-69fd86253ba9&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.227
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517-f825-4372-8327-c232f61880c4/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=139b731a-b591-4698-bfee-48cc028559cd&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.227
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageADRemote/6.0/AgentPackageADRemote.zip
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageNetworkDiscovery/23.9/AgentPackageNetworkDiscove
|
unknown
|
||
http://agent-api.atera.com
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=49462288-5478-4372-9693-b47681abf7af&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.227
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=e6094e12-9fa8-4d26-aa06-4e8fb7a4009c&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.227
|
||
http://schemas.datacontract.org/2004/07/
|
unknown
|
||
https://github.com/icsharpcode/SharpZipLib
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=01dd44b0-5151-4864-a34b-b47d9fe01029
|
unknown
|
||
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/Acknowl
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageTaskScheduler/17.2/AgentPackageTaskScheduler.zip
|
unknown
|
||
https://agent-api.atera.com
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=0f6a6f9e-92dd-416b-bb7d-5bf345e8ea10&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.227
|
||
https://agent-api.atera.com/Production/Agent/AgentStarting
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517-f825-4372-8327-c232f61880c4/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=712442ef-230d-4277-b641-1839d4d8d808&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.227
|
||
http://www.w3.oh
|
unknown
|
||
http://schemas.datacontract.org/2004/07/System.ServiceProcess0
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetCommands
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=ad2ddba0-edbb-429e-9340-5807bd34a581&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.227
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517-f825-4372-8327-c232f61880c4/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=9adb2664-b18c-43f3-856f-5709e73f6369&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.227
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517-f825-4372-8327-c232f61880c4/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=02fdafa7-0cbf-4d21-9e7c-2644b1b8a69d&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.229
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=ccd8b767-ce84-425a-a6fc-e1d295ece179&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.227
|
||
https://agent-api.atera.com/
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=6108e17e-e70c-47ee-93a9-dff9a3c5dc87
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=22cf76d8-ac1d-4e8c-a645-ddf02c4a5363&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.229
|
||
https://agent-api.atera.com/Production/Agent/GetRecurringPackages
|
unknown
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.Availability/13.0/Agent.Package.Availability.zip
|
unknown
|
||
https://www.newtonsoft.com/jsonschema
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageAgentInformation/36.7/AgentPackageAgentInformati
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=272b312b-8cbb-4ed4-bd82-1f2dd3cf8d11
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageRuntimeInstaller/1.5/AgentPackageRuntimeInstaller.
|
unknown
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.Watchdog/13.0/Agent.Package.Watchdog.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=6d71671f-ff3a-4b21-bbc6-dec364cbbb66&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.227
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=24efe0cb-37e4-4030-8040-96cc03619cbf&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.227
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=e3c1bb87-134a-4b79-9350-4fcf40025dd1&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.227
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=f70c64fb-bd8c-4b68-8d78-3a86a80f0fd6&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.227
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.Availability/0.16/Agent.Package.Availability.z
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=28c02dc8-fc10-46f4-9892-4dca60ee91e7&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.229
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageSTRemote/21.6/AgentPackageSTRemote.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageTicketing/27.5/AgentPackageTicketing.zip
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517-f825-4372-8327-c232f61880c4/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=800f1992-a163-4e95-be3a-8d7dd58c0f05&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.227
|
||
https://ps.atera.com/agentpackagesmac/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=28c02dc8-fc10-46f4-9892-4dca60ee91e7
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=8ca60d9f-75c2-4d80-a8a7-b05f671b9e42&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.227
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=8ca60d9f-75c2-4d80-a8a7-b05f671b9e42
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageSystemTools/26.6/AgentPackageSystemTools.zip
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02cec
|
unknown
|
||
https://www.newtonsoft.com/json
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/Age
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=f70c64fb-bd8c-4b68-8d78-3a86a80f0fd6
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517-f825-4372-8327-c232f61880c4/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=3da9111c-aaa7-4e08-ba06-01a1cd672c2b&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.227
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517-f825-4372-8327-c232f61880c4/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=c2080080-bc76-4491-ab59-0a0eabfe07a8&uuid=7d7ca517-f825-4372-8327-c232f61880c4
|
35.157.63.227
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=4268a400-66a4-4a60-8ada-3d40a293c400
|
unknown
|
||
http://wixtoolset.org/news/
|
unknown
|
||
https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ps.pndsn.com
|
35.157.63.229
|
||
bg.microsoft.map.fastly.net
|
199.232.214.172
|
||
d25btwd9wax8gu.cloudfront.net
|
3.165.136.99
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
||
ps.atera.com
|
unknown
|
||
agent-api.atera.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
35.157.63.227
|
unknown
|
United States
|
||
35.157.63.229
|
ps.pndsn.com
|
United States
|
||
3.165.136.99
|
d25btwd9wax8gu.cloudfront.net
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\56f4af.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\56f4af.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB9EFD7FDAF9AD115987000E181661F5
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CD868C8CE5A308147ABB306D829266BC
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C32B8CE0327C1E141950B4C9C2AD4DA7
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D9B1B1F0B1FC024D9390FE4B94D97D5
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\007F59F54ACD08842B2D98A10E6D1E3A
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB25C26F7C51D3C4AA2BED5600F46956
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01010F83113E72A4C81AD77422D2F947
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01D9DC4B27DFC0340B543A11D3CEBE07
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\ATERA Networks\AteraAgent\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\ATERA Networks\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\7D0A237E2F2A7564CA141B792446E854
|
INSTALLFOLDER_files_Feature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Features
|
INSTALLFOLDER_files_Feature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
|
LastUsedSource
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
|
AutoBackupLogFiles
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AteraAgent
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
AccountId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
IntegratorLogin
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
CompanyId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
AgentId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
ServerName
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AlphaAgent
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
FileDirectory
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\25\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\25\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
FileDirectory
|
There are 139 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
213E39E5000
|
heap
|
page read and write
|
||
24C04F52000
|
unkown
|
page readonly
|
||
19DB5D20000
|
heap
|
page read and write
|
||
1CE005DF000
|
trusted library allocation
|
page read and write
|
||
1CA906D3000
|
trusted library allocation
|
page read and write
|
||
24C04FE1000
|
trusted library allocation
|
page read and write
|
||
1CA90651000
|
trusted library allocation
|
page read and write
|
||
24297127000
|
trusted library allocation
|
page read and write
|
||
1CE7F49B000
|
heap
|
page read and write
|
||
24296857000
|
heap
|
page read and write
|
||
4C64000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4A4000
|
trusted library allocation
|
page read and write
|
||
213E4297000
|
trusted library allocation
|
page read and write
|
||
1CA8FE18000
|
heap
|
page read and write
|
||
213E399D000
|
heap
|
page read and write
|
||
238EB400000
|
heap
|
page read and write
|
||
1E1B60C2000
|
unkown
|
page readonly
|
||
242970E1000
|
trusted library allocation
|
page read and write
|
||
1E1B7F42000
|
trusted library allocation
|
page read and write
|
||
213E42D3000
|
trusted library allocation
|
page read and write
|
||
19DB5AA0000
|
heap
|
page read and write
|
||
19DB5AA9000
|
heap
|
page read and write
|
||
21780422000
|
trusted library allocation
|
page read and write
|
||
1E1B6311000
|
heap
|
page read and write
|
||
427E000
|
heap
|
page read and write
|
||
169F67A0000
|
heap
|
page read and write
|
||
217FC074000
|
heap
|
page read and write
|
||
7EE0BD5000
|
stack
|
page read and write
|
||
19DB64CF000
|
trusted library allocation
|
page read and write
|
||
24296B70000
|
heap
|
page read and write
|
||
1CE005A3000
|
trusted library allocation
|
page read and write
|
||
21780692000
|
trusted library allocation
|
page read and write
|
||
1E1D0810000
|
heap
|
page read and write
|
||
24C049CB000
|
heap
|
page read and write
|
||
24C05063000
|
trusted library allocation
|
page read and write
|
||
1CE7F4A8000
|
heap
|
page read and write
|
||
238800BF000
|
trusted library allocation
|
page read and write
|
||
169F677F000
|
heap
|
page read and write
|
||
19DB5AE3000
|
heap
|
page read and write
|
||
23880001000
|
trusted library allocation
|
page read and write
|
||
1E1D0540000
|
heap
|
page read and write
|
||
1E1B7F8C000
|
trusted library allocation
|
page read and write
|
||
217806B0000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
trusted library allocation
|
page read and write
|
||
4194000
|
heap
|
page read and write
|
||
1E1B62D0000
|
heap
|
page read and write
|
||
1CE7F548000
|
heap
|
page read and write
|
||
238EA4AC000
|
heap
|
page read and write
|
||
1CA8FE10000
|
heap
|
page read and write
|
||
23880047000
|
trusted library allocation
|
page read and write
|
||
2178013E000
|
trusted library allocation
|
page read and write
|
||
217809A0000
|
trusted library allocation
|
page read and write
|
||
1E1B7E9C000
|
trusted library allocation
|
page read and write
|
||
169F6682000
|
unkown
|
page readonly
|
||
19DB6493000
|
trusted library allocation
|
page read and write
|
||
238EA490000
|
heap
|
page read and write
|
||
1E1B630E000
|
heap
|
page read and write
|
||
1E1D05BE000
|
heap
|
page read and write
|
||
1E1B7ECA000
|
trusted library allocation
|
page read and write
|
||
21780305000
|
trusted library allocation
|
page read and write
|
||
1CE18D0A000
|
heap
|
page read and write
|
||
1CA8FE9B000
|
heap
|
page read and write
|
||
169F6760000
|
heap
|
page read and write
|
||
43FB000
|
heap
|
page read and write
|
||
16980083000
|
trusted library allocation
|
page read and write
|
||
24296819000
|
heap
|
page read and write
|
||
1CA8FE5C000
|
heap
|
page read and write
|
||
1CE7F460000
|
heap
|
page read and write
|
||
1E1B7ED9000
|
trusted library allocation
|
page read and write
|
||
24296896000
|
heap
|
page read and write
|
||
217801FD000
|
trusted library allocation
|
page read and write
|
||
1E1B6260000
|
heap
|
page read and write
|
||
213E430F000
|
trusted library allocation
|
page read and write
|
||
217FC08B000
|
heap
|
page read and write
|
||
238EA4CC000
|
heap
|
page read and write
|
||
19DB5B26000
|
heap
|
page read and write
|
||
217FC0D5000
|
heap
|
page read and write
|
||
2178094C000
|
trusted library allocation
|
page read and write
|
||
21780232000
|
trusted library allocation
|
page read and write
|
||
24C049EC000
|
heap
|
page read and write
|
||
16980001000
|
trusted library allocation
|
page read and write
|
||
24C04A36000
|
heap
|
page read and write
|
||
2429684D000
|
heap
|
page read and write
|
||
24297163000
|
trusted library allocation
|
page read and write
|
||
21780001000
|
trusted library allocation
|
page read and write
|
||
213E3960000
|
heap
|
page read and write
|
||
217FAB90000
|
heap
|
page read and write
|
||
1CE00521000
|
trusted library allocation
|
page read and write
|
||
217808E4000
|
trusted library allocation
|
page read and write
|
||
21780914000
|
trusted library allocation
|
page read and write
|
||
213E3AE0000
|
heap
|
page read and write
|
||
43E7000
|
trusted library allocation
|
page read and write
|
||
24C049FA000
|
heap
|
page read and write
|
||
217FABA0000
|
heap
|
page read and write
|
||
1E1B635F000
|
heap
|
page read and write
|
||
24C0509F000
|
trusted library allocation
|
page read and write
|
||
24C05027000
|
trusted library allocation
|
page read and write
|
||
1E1B7EC4000
|
trusted library allocation
|
page read and write
|
||
19DB6411000
|
trusted library allocation
|
page read and write
|
||
1CA9070F000
|
trusted library allocation
|
page read and write
|
||
1E1B6359000
|
heap
|
page read and write
|
||
1E1B7E11000
|
trusted library allocation
|
page read and write
|
||
1E1B7EC2000
|
trusted library allocation
|
page read and write
|
||
1CE7F4E8000
|
heap
|
page read and write
|
||
169F67AD000
|
heap
|
page read and write
|
||
19DB5ADD000
|
heap
|
page read and write
|
||
2429719F000
|
trusted library allocation
|
page read and write
|
||
4929000
|
heap
|
page read and write
|
||
169F69F0000
|
heap
|
page read and write
|
||
1E1B62D6000
|
heap
|
page read and write
|
||
213E3969000
|
heap
|
page read and write
|
||
213E4251000
|
trusted library allocation
|
page read and write
|
||
217FABA8000
|
heap
|
page read and write
|
||
24C1D961000
|
heap
|
page read and write
|
||
238EA568000
|
heap
|
page read and write
|
||
4341000
|
trusted library allocation
|
page read and write
|
||
1CE00567000
|
trusted library allocation
|
page read and write
|
||
23880083000
|
trusted library allocation
|
page read and write
|
||
1CE7F469000
|
heap
|
page read and write
|
||
238EA3F0000
|
heap
|
page read and write
|
||
1CE7F7C0000
|
heap
|
page read and write
|
||
24C049B0000
|
heap
|
page read and write
|
||
1CA90697000
|
trusted library allocation
|
page read and write
|
||
19DCEAD0000
|
heap
|
page read and write
|
||
217FADB0000
|
heap
|
page read and write
|
||
217FABDC000
|
heap
|
page read and write
|
||
238EA499000
|
heap
|
page read and write
|
||
24296810000
|
heap
|
page read and write
|
||
1CA90080000
|
heap
|
page read and write
|
||
238EA4DC000
|
heap
|
page read and write
|
||
19DB6457000
|
trusted library allocation
|
page read and write
|
||
1E1B7E99000
|
trusted library allocation
|
page read and write
|
||
217FBC0E000
|
heap
|
page read and write
|
||
24C049B8000
|
heap
|
page read and write
|
||
1E1B62EE000
|
heap
|
page read and write
|
||
217FAC24000
|
heap
|
page read and write
|
||
217806CE000
|
trusted library allocation
|
page read and write
|
||
217808ED000
|
trusted library allocation
|
page read and write
|
||
213E399F000
|
heap
|
page read and write
|
||
24C04970000
|
heap
|
page read and write
|
||
169F67ED000
|
heap
|
page read and write
|
||
217802B2000
|
trusted library allocation
|
page read and write
|
||
19DB5B61000
|
heap
|
page read and write
|
||
238EA517000
|
heap
|
page read and write
|
||
2178006E000
|
trusted library allocation
|
page read and write
|
||
21790084000
|
trusted library allocation
|
page read and write
|
||
7FFD9B472000
|
trusted library allocation
|
page read and write
|
||
7810AFD000
|
stack
|
page read and write
|
||
7FFD9B520000
|
trusted library allocation
|
page execute and read and write
|
||
2CFA000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
48E0000
|
trusted library allocation
|
page read and write
|
||
5AE000
|
stack
|
page read and write
|
||
4920000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4BD000
|
trusted library allocation
|
page read and write
|
||
58FF3FE000
|
stack
|
page read and write
|
||
4DFB8FE000
|
stack
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
1E1D05AC000
|
heap
|
page read and write
|
||
5341000
|
trusted library allocation
|
page read and write
|
||
213E3A90000
|
trusted library allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
7FFD9B5D0000
|
trusted library allocation
|
page read and write
|
||
217800C3000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6EA06FE000
|
stack
|
page read and write
|
||
242970D0000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
7FF4FD030000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B472000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
7FFD9B36C000
|
trusted library allocation
|
page execute and read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
169F6F80000
|
heap
|
page execute and read and write
|
||
1CA9068B000
|
trusted library allocation
|
page read and write
|
||
217FBC9C000
|
heap
|
page read and write
|
||
6C20000
|
heap
|
page execute and read and write
|
||
24C1D87F000
|
unkown
|
page readonly
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4E9000
|
trusted library allocation
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
217FAE30000
|
trusted library allocation
|
page read and write
|
||
7EE10FE000
|
stack
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
217809C4000
|
trusted library allocation
|
page read and write
|
||
24C1D8C2000
|
unkown
|
page readonly
|
||
2D1F000
|
heap
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
67F4000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B33C000
|
trusted library allocation
|
page execute and read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B490000
|
trusted library allocation
|
page read and write
|
||
5A7E1FE000
|
stack
|
page read and write
|
||
7FFD9B4A6000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4C0000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
42F0000
|
trusted library allocation
|
page execute and read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2ED000
|
trusted library allocation
|
page execute and read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
7EE0F29000
|
stack
|
page read and write
|
||
48E3000
|
trusted library allocation
|
page execute and read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5C0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4AD000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
6740000
|
trusted library allocation
|
page execute and read and write
|
||
5BE000
|
unkown
|
page read and write
|
||
169F791C000
|
heap
|
page read and write
|
||
1CE0055D000
|
trusted library allocation
|
page read and write
|
||
19DB5AE1000
|
heap
|
page read and write
|
||
24296920000
|
heap
|
page read and write
|
||
217803D6000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
4590000
|
trusted library allocation
|
page execute and read and write
|
||
267E000
|
stack
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2F2000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6FA4000
|
trusted library allocation
|
page read and write
|
||
1CE7F486000
|
heap
|
page read and write
|
||
CB7D2F1000
|
stack
|
page read and write
|
||
217801D5000
|
trusted library allocation
|
page read and write
|
||
7EE193E000
|
stack
|
page read and write
|
||
4185000
|
trusted library allocation
|
page execute and read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
24296B75000
|
heap
|
page read and write
|
||
24C049F4000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
2790000
|
heap
|
page readonly
|
||
1CAA8F60000
|
heap
|
page read and write
|
||
7FFD9B4B8000
|
trusted library allocation
|
page read and write
|
||
26BE000
|
stack
|
page read and write
|
||
48F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4D0000
|
trusted library allocation
|
page read and write
|
||
1CA90793000
|
trusted library allocation
|
page read and write
|
||
24C04950000
|
trusted library allocation
|
page read and write
|
||
2178029D000
|
trusted library allocation
|
page read and write
|
||
217800A0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
43C000
|
stack
|
page read and write
|
||
19DB6553000
|
trusted library allocation
|
page read and write
|
||
6F45000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
1E1B6520000
|
heap
|
page read and write
|
||
24C14FE1000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
217802F2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B380000
|
trusted library allocation
|
page read and write
|
||
2CC2000
|
heap
|
page read and write
|
||
6EA04FE000
|
stack
|
page read and write
|
||
24297223000
|
trusted library allocation
|
page read and write
|
||
7C7000
|
heap
|
page read and write
|
||
7FFD9B2C2000
|
trusted library allocation
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
213FC970000
|
heap
|
page read and write
|
||
276B000
|
trusted library allocation
|
page execute and read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
67F000
|
stack
|
page read and write
|
||
7FFD9B490000
|
trusted library allocation
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
169F6BF5000
|
heap
|
page read and write
|
||
7FFD9B492000
|
trusted library allocation
|
page read and write
|
||
1E1D05BA000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
7FFD9B4B0000
|
trusted library allocation
|
page read and write
|
||
217FC188000
|
heap
|
page read and write
|
||
7EE2128000
|
stack
|
page read and write
|
||
7810EFE000
|
stack
|
page read and write
|
||
7FFD9B4DB000
|
trusted library allocation
|
page read and write
|
||
217801AD000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
217FC092000
|
heap
|
page read and write
|
||
7EE2F37000
|
stack
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
2388003B000
|
trusted library allocation
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
1CE00490000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5A0000
|
trusted library allocation
|
page read and write
|
||
4313000
|
trusted library allocation
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
1FB000
|
stack
|
page read and write
|
||
2D31000
|
heap
|
page read and write
|
||
2178095C000
|
trusted library allocation
|
page read and write
|
||
273D000
|
trusted library allocation
|
page execute and read and write
|
||
21780920000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
4DFA5FE000
|
stack
|
page read and write
|
||
7FFD9B386000
|
trusted library allocation
|
page read and write
|
||
4611000
|
trusted library allocation
|
page read and write
|
||
7FFD9B30D000
|
trusted library allocation
|
page execute and read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B302000
|
trusted library allocation
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
213FC9CF000
|
heap
|
page read and write
|
||
7FFD9B4CB000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
217FABBB000
|
heap
|
page read and write
|
||
1CE10521000
|
trusted library allocation
|
page read and write
|
||
2178046A000
|
trusted library allocation
|
page read and write
|
||
217801D9000
|
trusted library allocation
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
EF97CFE000
|
stack
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2ED000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B2B2000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
1CAA0651000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2ED000
|
trusted library allocation
|
page execute and read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
2C9F000
|
heap
|
page read and write
|
||
7FFD9B386000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
EF981FE000
|
stack
|
page read and write
|
||
238EA4D0000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
4170000
|
trusted library allocation
|
page execute and read and write
|
||
24297231000
|
trusted library allocation
|
page read and write
|
||
213E38E0000
|
heap
|
page read and write
|
||
41C5000
|
heap
|
page read and write
|
||
7FFD9B4D0000
|
trusted library allocation
|
page read and write
|
||
24C1D891000
|
unkown
|
page readonly
|
||
2178019D000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
238EB4A2000
|
heap
|
page read and write
|
||
1E1D08BD000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6760000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4C4000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
217FC268000
|
heap
|
page read and write
|
||
58FF6FD000
|
stack
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7EE373C000
|
stack
|
page read and write
|
||
27ED000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
2257000
|
stack
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4E9000
|
trusted library allocation
|
page read and write
|
||
213E399B000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6AAE000
|
stack
|
page read and write
|
||
24C1D860000
|
unkown
|
page readonly
|
||
673E000
|
stack
|
page read and write
|
||
19DB6400000
|
heap
|
page execute and read and write
|
||
217FC263000
|
heap
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
4C60000
|
trusted library allocation
|
page read and write
|
||
217FC5E6000
|
heap
|
page read and write
|
||
238EA4B7000
|
heap
|
page read and write
|
||
5A7E0FF000
|
stack
|
page read and write
|
||
6D70000
|
heap
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
7FFD9B376000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
4414000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
238EABC0000
|
heap
|
page execute and read and write
|
||
24F7000
|
stack
|
page read and write
|
||
7FFD9B490000
|
trusted library allocation
|
page read and write
|
||
1CA8FC70000
|
heap
|
page read and write
|
||
2D4E000
|
heap
|
page read and write
|
||
6FE0000
|
remote allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
217FC070000
|
heap
|
page read and write
|
||
4CA6000
|
trusted library allocation
|
page read and write
|
||
21780135000
|
trusted library allocation
|
page read and write
|
||
67E0000
|
trusted library allocation
|
page read and write
|
||
19DB644F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2F0000
|
trusted library allocation
|
page read and write
|
||
2D35000
|
heap
|
page read and write
|
||
4182000
|
trusted library allocation
|
page read and write
|
||
67BC000
|
trusted library allocation
|
page read and write
|
||
21780906000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6FE0000
|
heap
|
page read and write
|
||
217FAE75000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
5611000
|
trusted library allocation
|
page read and write
|
||
238EA3D0000
|
heap
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
7FFD9B501000
|
trusted library allocation
|
page read and write
|
||
6F49000
|
trusted library allocation
|
page read and write
|
||
267E000
|
stack
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B500000
|
trusted library allocation
|
page execute and read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
43A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4A0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
238EA390000
|
heap
|
page read and write
|
||
2240000
|
heap
|
page read and write
|
||
169F7828000
|
unkown
|
page readonly
|
||
24C1D88D000
|
unkown
|
page readonly
|
||
49D0000
|
heap
|
page readonly
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
1CAA8ED0000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
5A7E5FD000
|
stack
|
page read and write
|
||
7FFD9B2DD000
|
trusted library allocation
|
page execute and read and write
|
||
2320000
|
heap
|
page read and write
|
||
CB7D6FD000
|
stack
|
page read and write
|
||
1CA907A1000
|
trusted library allocation
|
page read and write
|
||
169F77B2000
|
unkown
|
page readonly
|
||
19DB5BD0000
|
heap
|
page read and write
|
||
217FC0AF000
|
heap
|
page read and write
|
||
19DB653F000
|
trusted library allocation
|
page read and write
|
||
66D6000
|
trusted library allocation
|
page execute and read and write
|
||
217FC5CF000
|
heap
|
page read and write
|
||
458D000
|
stack
|
page read and write
|
||
1CE0064F000
|
trusted library allocation
|
page read and write
|
||
5B555FE000
|
stack
|
page read and write
|
||
24C1D913000
|
heap
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
217FBCA0000
|
unkown
|
page read and write
|
||
169F6930000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
1CA8FE52000
|
heap
|
page read and write
|
||
7FFD9B300000
|
trusted library allocation
|
page read and write
|
||
27B4000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
217805D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3AC000
|
trusted library allocation
|
page execute and read and write
|
||
24C04720000
|
unkown
|
page readonly
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
79B000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
217803EB000
|
trusted library allocation
|
page read and write
|
||
242AF947000
|
heap
|
page read and write
|
||
7FFD9B2CD000
|
trusted library allocation
|
page execute and read and write
|
||
242A70E1000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
4248000
|
trusted library allocation
|
page read and write
|
||
495A000
|
heap
|
page read and write
|
||
21780682000
|
trusted library allocation
|
page read and write
|
||
24296B65000
|
heap
|
page read and write
|
||
4A60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B396000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
263E000
|
stack
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2D4000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4AE000
|
trusted library allocation
|
page read and write
|
||
67B5000
|
trusted library allocation
|
page read and write
|
||
24297235000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4BB0000
|
heap
|
page execute and read and write
|
||
238EA4DE000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
454C000
|
stack
|
page read and write
|
||
1E1B631D000
|
heap
|
page read and write
|
||
7FFD9B4F0000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
4DFB5FC000
|
stack
|
page read and write
|
||
475E000
|
stack
|
page read and write
|
||
6FC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B486000
|
trusted library allocation
|
page read and write
|
||
19DB5BE0000
|
heap
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
238EB4B5000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
1E1D084B000
|
heap
|
page read and write
|
||
696E000
|
stack
|
page read and write
|
||
7FFD9B5F0000
|
trusted library allocation
|
page read and write
|
||
217806E4000
|
trusted library allocation
|
page read and write
|
||
6EA09FE000
|
stack
|
page read and write
|
||
19DB5BD5000
|
heap
|
page read and write
|
||
24C1D987000
|
heap
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
217800E3000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
74FE000
|
stack
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
1CA8FE38000
|
heap
|
page read and write
|
||
213E428F000
|
trusted library allocation
|
page read and write
|
||
6F45000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
19DB6250000
|
heap
|
page execute and read and write
|
||
16980155000
|
trusted library allocation
|
page read and write
|
||
7FFD9B480000
|
trusted library allocation
|
page read and write
|
||
418B000
|
trusted library allocation
|
page execute and read and write
|
||
2770000
|
heap
|
page read and write
|
||
242A70ED000
|
trusted library allocation
|
page read and write
|
||
213E3920000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
238EA6F5000
|
heap
|
page read and write
|
||
7FFD9B48E000
|
trusted library allocation
|
page read and write
|
||
6F45000
|
trusted library allocation
|
page read and write
|
||
217801E9000
|
trusted library allocation
|
page read and write
|
||
1CE7F4BC000
|
heap
|
page read and write
|
||
7FFD9B4B6000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
21780908000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4B7000
|
trusted library allocation
|
page read and write
|
||
213E4393000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
24296F30000
|
trusted library allocation
|
page read and write
|
||
7FFD9B30C000
|
trusted library allocation
|
page execute and read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
7FFD9B540000
|
trusted library allocation
|
page execute and read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
1E1B62B0000
|
heap
|
page read and write
|
||
7EE2E3D000
|
stack
|
page read and write
|
||
7FFD9B550000
|
trusted library allocation
|
page execute and read and write
|
||
89E000
|
stack
|
page read and write
|
||
297A000
|
heap
|
page read and write
|
||
7EE3631000
|
stack
|
page read and write
|
||
7FFD9B2FD000
|
trusted library allocation
|
page execute and read and write
|
||
169F77AE000
|
unkown
|
page readonly
|
||
7FFD9B3B6000
|
trusted library allocation
|
page execute and read and write
|
||
6801000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67F4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2F4000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
717F000
|
stack
|
page read and write
|
||
23880151000
|
trusted library allocation
|
page read and write
|
||
217FC266000
|
heap
|
page read and write
|
||
6F84000
|
trusted library allocation
|
page read and write
|
||
217802AA000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
67F1000
|
trusted library allocation
|
page read and write
|
||
78109FE000
|
stack
|
page read and write
|
||
4C56000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B34C000
|
trusted library allocation
|
page execute and read and write
|
||
2680000
|
heap
|
page read and write
|
||
1B8000
|
stack
|
page read and write
|
||
169F69C0000
|
trusted library allocation
|
page read and write
|
||
4B29000
|
heap
|
page read and write
|
||
4FE000
|
stack
|
page read and write
|
||
7FFD9B540000
|
trusted library allocation
|
page execute and read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
4DFB9FB000
|
stack
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
2A35000
|
heap
|
page read and write
|
||
4CAA000
|
trusted library allocation
|
page read and write
|
||
24296B60000
|
heap
|
page read and write
|
||
CB7DDFE000
|
stack
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3A0000
|
trusted library allocation
|
page execute and read and write
|
||
27B0000
|
trusted library allocation
|
page read and write
|
||
7EE343E000
|
stack
|
page read and write
|
||
213FC910000
|
heap
|
page read and write
|
||
1E1B64B0000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4E1000
|
trusted library allocation
|
page read and write
|
||
217FAE10000
|
trusted library allocation
|
page read and write
|
||
24C1D8F9000
|
unkown
|
page readonly
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
1CE004B0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
19DB5ADF000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
5B550FE000
|
stack
|
page read and write
|
||
BB2754D000
|
stack
|
page read and write
|
||
7FFD9B3AC000
|
trusted library allocation
|
page execute and read and write
|
||
2833000
|
heap
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
1E1D0835000
|
heap
|
page read and write
|
||
6850000
|
heap
|
page read and write
|
||
213E3AE5000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
425E000
|
stack
|
page read and write
|
||
7FFD9B310000
|
trusted library allocation
|
page read and write
|
||
169F6BF0000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
670E6FF000
|
stack
|
page read and write
|
||
1CE18DA1000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
21780658000
|
trusted library allocation
|
page read and write
|
||
27A0000
|
trusted library allocation
|
page read and write
|
||
4426000
|
trusted library allocation
|
page read and write
|
||
217FADB5000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B300000
|
trusted library allocation
|
page read and write
|
||
2429711F000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
217FC9A0000
|
heap
|
page read and write
|
||
7EE352B000
|
stack
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
24C049D6000
|
heap
|
page read and write
|
||
4BA0000
|
trusted library allocation
|
page read and write
|
||
42EE000
|
stack
|
page read and write
|
||
7FFD9B2E5000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
169F77AA000
|
unkown
|
page readonly
|
||
7FFD9B4B0000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
27DA000
|
heap
|
page read and write
|
||
7FC00000
|
trusted library allocation
|
page execute and read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B400000
|
trusted library allocation
|
page execute and read and write
|
||
169F7817000
|
unkown
|
page readonly
|
||
498E000
|
stack
|
page read and write
|
||
6B8E000
|
stack
|
page read and write
|
||
7FFD9B520000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B3F0000
|
trusted library allocation
|
page execute and read and write
|
||
670DF81000
|
stack
|
page read and write
|
||
7FFD9B4D0000
|
trusted library allocation
|
page execute and read and write
|
||
6A6E000
|
stack
|
page read and write
|
||
2389000D000
|
trusted library allocation
|
page read and write
|
||
2D4E000
|
heap
|
page read and write
|
||
7FFD9B2E4000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
217803D8000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3A0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
42AF000
|
heap
|
page read and write
|
||
238EA480000
|
heap
|
page execute and read and write
|
||
7FFD9B566000
|
trusted library allocation
|
page read and write
|
||
217FABC5000
|
heap
|
page read and write
|
||
4427000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B2F0000
|
trusted library allocation
|
page read and write
|
||
24C1D8BC000
|
unkown
|
page readonly
|
||
7FFD9B4D0000
|
trusted library allocation
|
page execute and read and write
|
||
1CA8FE56000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
5A7E4FE000
|
stack
|
page read and write
|
||
2178012E000
|
trusted library allocation
|
page read and write
|
||
213E428D000
|
trusted library allocation
|
page read and write
|
||
169F6850000
|
heap
|
page read and write
|
||
169F77BA000
|
unkown
|
page readonly
|
||
7FFD9B2D5000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
5615000
|
trusted library allocation
|
page read and write
|
||
7FFD9B506000
|
trusted library allocation
|
page read and write
|
||
169F779D000
|
unkown
|
page readonly
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
238EB49F000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
19DB6561000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7F348000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B492000
|
trusted library allocation
|
page read and write
|
||
7FFD9B480000
|
trusted library allocation
|
page read and write
|
||
24C1D8D3000
|
unkown
|
page readonly
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
5B54981000
|
stack
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
1E1B6170000
|
heap
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
27AA000
|
heap
|
page read and write
|
||
4187000
|
trusted library allocation
|
page execute and read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
213FC963000
|
heap
|
page read and write
|
||
EF976F1000
|
stack
|
page read and write
|
||
7FFD9B2FD000
|
trusted library allocation
|
page execute and read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3A0000
|
trusted library allocation
|
page read and write
|
||
4927000
|
trusted library allocation
|
page execute and read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6850000
|
remote allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
238EA2B0000
|
heap
|
page read and write
|
||
7FFD9B4E0000
|
trusted library allocation
|
page read and write
|
||
4230000
|
heap
|
page readonly
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
2429720F000
|
trusted library allocation
|
page read and write
|
||
238EB48C000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2B4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B48E000
|
trusted library allocation
|
page read and write
|
||
217FC13C000
|
heap
|
page read and write
|
||
24C05131000
|
trusted library allocation
|
page read and write
|
||
24C04F68000
|
unkown
|
page readonly
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
4180000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
169F78F0000
|
heap
|
page read and write
|
||
238EB44D000
|
heap
|
page read and write
|
||
1E1D0844000
|
heap
|
page read and write
|
||
2CC2000
|
heap
|
page read and write
|
||
24C0501D000
|
trusted library allocation
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
48F4000
|
trusted library allocation
|
page read and write
|
||
7810BFE000
|
stack
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2E2000
|
trusted library allocation
|
page read and write
|
||
217800D7000
|
trusted library allocation
|
page read and write
|
||
45FB000
|
heap
|
page read and write
|
||
4DFB4FC000
|
stack
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
1CE18DC9000
|
heap
|
page read and write
|
||
7FFD9B30D000
|
trusted library allocation
|
page execute and read and write
|
||
7B9000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B30D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B516000
|
trusted library allocation
|
page read and write
|
||
1CE7F49E000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
21780054000
|
trusted library allocation
|
page read and write
|
||
1CE00671000
|
trusted library allocation
|
page read and write
|
||
2423AAA0000
|
heap
|
page read and write
|
||
1CA907A5000
|
trusted library allocation
|
page read and write
|
||
7EE1F26000
|
stack
|
page read and write
|
||
24C1D88F000
|
unkown
|
page readonly
|
||
238EA4D6000
|
heap
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
238EA513000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
7FFD9B31B000
|
trusted library allocation
|
page execute and read and write
|
||
1CA8FE4D000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
4360000
|
trusted library allocation
|
page read and write
|
||
217FC255000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2E3000
|
trusted library allocation
|
page execute and read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
43D6000
|
trusted library allocation
|
page read and write
|
||
1CA8FDE0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
213FC98A000
|
heap
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
67E0000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
69ED000
|
stack
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4E6000
|
trusted library allocation
|
page read and write
|
||
19DB5AC6000
|
heap
|
page read and write
|
||
7FFD9B3F0000
|
trusted library allocation
|
page execute and read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
743F000
|
stack
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
169F77ED000
|
unkown
|
page readonly
|
||
6820000
|
trusted library allocation
|
page execute and read and write
|
||
4270000
|
trusted library allocation
|
page read and write
|
||
6760000
|
trusted library allocation
|
page read and write
|
||
7FFD9B530000
|
trusted library allocation
|
page execute and read and write
|
||
1CE7F705000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B396000
|
trusted library allocation
|
page read and write
|
||
7FFD9B490000
|
trusted library allocation
|
page read and write
|
||
24C04980000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4E5000
|
trusted library allocation
|
page read and write
|
||
7EE273E000
|
stack
|
page read and write
|
||
217FC12E000
|
heap
|
page read and write
|
||
217FB350000
|
heap
|
page read and write
|
||
169F78AB000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B482000
|
trusted library allocation
|
page read and write
|
||
66D9000
|
trusted library allocation
|
page execute and read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
169F77EB000
|
unkown
|
page readonly
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
78106F1000
|
stack
|
page read and write
|
||
238EA6F0000
|
heap
|
page read and write
|
||
238EA3B0000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
23890011000
|
trusted library allocation
|
page read and write
|
||
217801D0000
|
trusted library allocation
|
page read and write
|
||
58FF1FE000
|
stack
|
page read and write
|
||
7FFD9B2C2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2FD000
|
trusted library allocation
|
page execute and read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
238EA4CE000
|
heap
|
page read and write
|
||
1E1D083D000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4B0000
|
trusted library allocation
|
page read and write
|
||
7EE2027000
|
stack
|
page read and write
|
||
29B7000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4E0000
|
trusted library allocation
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
19DB5CE0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
2868000
|
heap
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
2CB8000
|
heap
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
4680000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B4C0000
|
trusted library allocation
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
44CE000
|
stack
|
page read and write
|
||
217FBBBE000
|
heap
|
page read and write
|
||
7FFD9B314000
|
trusted library allocation
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
28C7000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
169F783C000
|
unkown
|
page readonly
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
1E1C7E11000
|
trusted library allocation
|
page read and write
|
||
2178094A000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4E7000
|
trusted library allocation
|
page read and write
|
||
217807C2000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4C8000
|
trusted library allocation
|
page read and write
|
||
21780632000
|
trusted library allocation
|
page read and write
|
||
7FFD9B304000
|
trusted library allocation
|
page read and write
|
||
4DFA7FE000
|
stack
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
1E1D0672000
|
unkown
|
page readonly
|
||
2388012F000
|
trusted library allocation
|
page read and write
|
||
1CA8FFD5000
|
heap
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
7FFD9B2C4000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
217FC5E8000
|
heap
|
page read and write
|
||
7FFD9B396000
|
trusted library allocation
|
page execute and read and write
|
||
24C1D894000
|
unkown
|
page readonly
|
||
7FFD9B2F2000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4B0000
|
trusted library allocation
|
page read and write
|
||
1CA8FD50000
|
heap
|
page read and write
|
||
723E000
|
stack
|
page read and write
|
||
7FFD9B2EB000
|
trusted library allocation
|
page execute and read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
7FFD9B4CE000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
217FABEA000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
4405000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
5A7E6FE000
|
stack
|
page read and write
|
||
6EA03FE000
|
stack
|
page read and write
|
||
7EE243B000
|
stack
|
page read and write
|
||
7FFD9B40B000
|
trusted library allocation
|
page execute and read and write
|
||
1E1D0886000
|
heap
|
page read and write
|
||
7FFD9B510000
|
trusted library allocation
|
page read and write
|
||
1E1D0599000
|
heap
|
page read and write
|
||
7FFD9B33C000
|
trusted library allocation
|
page execute and read and write
|
||
169F7804000
|
unkown
|
page readonly
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
24C049F2000
|
heap
|
page read and write
|
||
7FFD9B460000
|
trusted library allocation
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3A6000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
58FF7FE000
|
stack
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
670E5FC000
|
stack
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
1CE18D95000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
2CFA000
|
heap
|
page read and write
|
||
24C1D8F7000
|
unkown
|
page readonly
|
||
19DB5B24000
|
heap
|
page read and write
|
||
4260000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4D4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2F2000
|
trusted library allocation
|
page read and write
|
||
25B0000
|
heap
|
page read and write
|
||
2A1E000
|
heap
|
page read and write
|
||
7F540000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B4B6000
|
trusted library allocation
|
page read and write
|
||
6C6E000
|
stack
|
page read and write
|
||
459E000
|
stack
|
page read and write
|
||
7FFD9B4F4000
|
trusted library allocation
|
page read and write
|
||
4DFBAFE000
|
stack
|
page read and write
|
||
1E1D0847000
|
heap
|
page read and write
|
||
5A7DEFD000
|
stack
|
page read and write
|
||
7FFD9B4D0000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
670EAFE000
|
stack
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7EE2C3D000
|
stack
|
page read and write
|
||
7FFD9B4EE000
|
trusted library allocation
|
page read and write
|
||
217800A5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B390000
|
trusted library allocation
|
page execute and read and write
|
||
5B556FD000
|
stack
|
page read and write
|
||
169F77B0000
|
unkown
|
page readonly
|
||
670E3FE000
|
stack
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
1CE18D9A000
|
heap
|
page read and write
|
||
2429711B000
|
trusted library allocation
|
page read and write
|
||
79C000
|
heap
|
page read and write
|
||
442A000
|
trusted library allocation
|
page read and write
|
||
5A7DDFF000
|
stack
|
page read and write
|
||
7FFD9B2FD000
|
trusted library allocation
|
page execute and read and write
|
||
58FF4FE000
|
stack
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
217FAE70000
|
heap
|
page read and write
|
||
7FFD9B3B6000
|
trusted library allocation
|
page execute and read and write
|
||
217FB510000
|
trusted library allocation
|
page read and write
|
||
21780A66000
|
trusted library allocation
|
page read and write
|
||
217803DC000
|
trusted library allocation
|
page read and write
|
||
1CE7F4E5000
|
heap
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
5711000
|
trusted library allocation
|
page read and write
|
||
217800AA000
|
trusted library allocation
|
page read and write
|
||
238EB482000
|
heap
|
page read and write
|
||
1E1D08BA000
|
heap
|
page read and write
|
||
7FFD9B470000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2CD000
|
trusted library allocation
|
page execute and read and write
|
||
169F69A0000
|
trusted library allocation
|
page read and write
|
||
7F330000
|
trusted library allocation
|
page execute and read and write
|
||
24C048B0000
|
heap
|
page read and write
|
||
217FBECE000
|
unkown
|
page readonly
|
||
7FFD9B550000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4F9000
|
trusted library allocation
|
page read and write
|
||
217801B5000
|
trusted library allocation
|
page read and write
|
||
58FEFFC000
|
stack
|
page read and write
|
||
7FFD9B49E000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6EA07FF000
|
stack
|
page read and write
|
||
7FFD9B4D8000
|
trusted library allocation
|
page read and write
|
||
6F8C000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
22C0000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
1CE18D54000
|
heap
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
1CE7F4E3000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7F558000
|
trusted library allocation
|
page execute and read and write
|
||
24C1D88B000
|
unkown
|
page readonly
|
||
7FFD9B4A5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4F0000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
217FC5E4000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
213E43A5000
|
trusted library allocation
|
page read and write
|
||
49E8000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6D6E000
|
stack
|
page read and write
|
||
5B54CFE000
|
stack
|
page read and write
|
||
2429711D000
|
trusted library allocation
|
page read and write
|
||
1E1D05CE000
|
heap
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B360000
|
trusted library allocation
|
page read and write
|
||
169F6950000
|
heap
|
page read and write
|
||
7FFD9B4B0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
24C04A0C000
|
heap
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4E0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
19DCEB24000
|
heap
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B34C000
|
trusted library allocation
|
page execute and read and write
|
||
4ABE000
|
stack
|
page read and write
|
||
217801C5000
|
trusted library allocation
|
page read and write
|
||
23A0000
|
heap
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
169F77DA000
|
unkown
|
page readonly
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
439D000
|
trusted library allocation
|
page read and write
|
||
169F7799000
|
unkown
|
page readonly
|
||
1CE0055B000
|
trusted library allocation
|
page read and write
|
||
1E1B6270000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
670E4FE000
|
stack
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
48ED000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B39C000
|
trusted library allocation
|
page execute and read and write
|
||
4DFA9FF000
|
stack
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
2178089C000
|
trusted library allocation
|
page read and write
|
||
431D000
|
trusted library allocation
|
page execute and read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4FE000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4C0000
|
trusted library allocation
|
page read and write
|
||
238EB4B3000
|
heap
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
25FD000
|
stack
|
page read and write
|
||
7FFD9B510000
|
trusted library allocation
|
page execute and read and write
|
||
433E000
|
stack
|
page read and write
|
||
217807C6000
|
trusted library allocation
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page execute and read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B530000
|
trusted library allocation
|
page execute and read and write
|
||
16980151000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3D0000
|
trusted library allocation
|
page execute and read and write
|
||
217801F1000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7EE1A3D000
|
stack
|
page read and write
|
||
7FFD9B4E0000
|
trusted library allocation
|
page execute and read and write
|
||
2CFA000
|
heap
|
page read and write
|
||
213E3C80000
|
heap
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
42C0000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
heap
|
page execute and read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
169F77C0000
|
unkown
|
page readonly
|
||
7FFD9B2E0000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
67B4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2F3000
|
trusted library allocation
|
page execute and read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
19DB5ADB000
|
heap
|
page read and write
|
||
1CAA8F84000
|
heap
|
page read and write
|
||
1699000D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2D8000
|
trusted library allocation
|
page read and write
|
||
169F77AC000
|
unkown
|
page readonly
|
||
4910000
|
heap
|
page read and write
|
||
217FBC05000
|
heap
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
26E0000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
32D000
|
stack
|
page read and write
|
||
2730000
|
trusted library allocation
|
page read and write
|
||
7FFD9B37C000
|
trusted library allocation
|
page execute and read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
2388003F000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B520000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
4388000
|
trusted library allocation
|
page read and write
|
||
27D2000
|
heap
|
page read and write
|
||
19DB5AFD000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4F0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
698000
|
heap
|
page read and write
|
||
217FAE43000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
1CE18CF8000
|
heap
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
1CE18D83000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
24C048D5000
|
heap
|
page read and write
|
||
7FFD9B33C000
|
trusted library allocation
|
page execute and read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
19DB5AE7000
|
heap
|
page read and write
|
||
4669000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B2B3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B4C0000
|
trusted library allocation
|
page read and write
|
||
67E0000
|
trusted library allocation
|
page read and write
|
||
217806D8000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
21790013000
|
trusted library allocation
|
page read and write
|
||
4350000
|
trusted library allocation
|
page execute and read and write
|
||
1E1B6450000
|
heap
|
page execute and read and write
|
||
19DCEB66000
|
heap
|
page read and write
|
||
217802AD000
|
trusted library allocation
|
page read and write
|
||
24C04975000
|
heap
|
page read and write
|
||
1CE1052D000
|
trusted library allocation
|
page read and write
|
||
66DC000
|
trusted library allocation
|
page execute and read and write
|
||
213E39AB000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2DD000
|
trusted library allocation
|
page execute and read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
276E000
|
stack
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
213E3900000
|
heap
|
page read and write
|
||
7FFD9B2E3000
|
trusted library allocation
|
page execute and read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
1CE0055F000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
2D62000
|
heap
|
page read and write
|
||
1E1B631B000
|
heap
|
page read and write
|
||
7FFD9B47E000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
213E428B000
|
trusted library allocation
|
page read and write
|
||
5A7DCFE000
|
stack
|
page read and write
|
||
7FFD9B4A6000
|
trusted library allocation
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
1E1B60E4000
|
unkown
|
page readonly
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
4640000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
24C0510C000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
2875000
|
heap
|
page read and write
|
||
7FFD9B540000
|
trusted library allocation
|
page execute and read and write
|
||
29F7000
|
stack
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
2A3F000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6F91000
|
trusted library allocation
|
page read and write
|
||
7FFD9B510000
|
trusted library allocation
|
page execute and read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B500000
|
trusted library allocation
|
page read and write
|
||
670ECFD000
|
stack
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
43DB000
|
trusted library allocation
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
1CE0064C000
|
trusted library allocation
|
page read and write
|
||
217FB4D0000
|
heap
|
page execute and read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
5A7DAF1000
|
stack
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4E0000
|
trusted library allocation
|
page read and write
|
||
1E1D087A000
|
heap
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
169F67A9000
|
heap
|
page read and write
|
||
2178095A000
|
trusted library allocation
|
page read and write
|
||
7EE1E3D000
|
stack
|
page read and write
|
||
24C049EE000
|
heap
|
page read and write
|
||
217808CD000
|
trusted library allocation
|
page read and write
|
||
1CE7F55B000
|
heap
|
page read and write
|
||
2423A920000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page execute and read and write
|
||
6FC0000
|
trusted library allocation
|
page read and write
|
||
24C1D910000
|
heap
|
page read and write
|
||
6F83000
|
trusted library allocation
|
page read and write
|
||
7EE0E3F000
|
stack
|
page read and write
|
||
238EA4B9000
|
heap
|
page read and write
|
||
2178008C000
|
trusted library allocation
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
7FFD9B498000
|
trusted library allocation
|
page read and write
|
||
19DB644D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B450000
|
trusted library allocation
|
page read and write
|
||
1E1D088E000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
213F4251000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
282A000
|
heap
|
page read and write
|
||
45B0000
|
heap
|
page read and write
|
||
217FBE22000
|
unkown
|
page readonly
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
217800DB000
|
trusted library allocation
|
page read and write
|
||
169F77EF000
|
unkown
|
page readonly
|
||
7FFD9B6A0000
|
trusted library allocation
|
page read and write
|
||
217801BD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B400000
|
trusted library allocation
|
page execute and read and write
|
||
217FC107000
|
heap
|
page read and write
|
||
7EE2629000
|
stack
|
page read and write
|
||
7FFD9B2B5000
|
trusted library allocation
|
page read and write
|
||
2720000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7F1A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B2D2000
|
trusted library allocation
|
page read and write
|
||
2ECD000
|
stack
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B400000
|
trusted library allocation
|
page execute and read and write
|
||
2970000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B509000
|
trusted library allocation
|
page read and write
|
||
1CA8FE98000
|
heap
|
page read and write
|
||
1CA8FE6E000
|
heap
|
page read and write
|
||
7FFD9B366000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6E0000
|
trusted library allocation
|
page read and write
|
||
78107FF000
|
stack
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
169F67A5000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
1E1B6290000
|
heap
|
page read and write
|
||
7FFD9B2F0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2D0000
|
trusted library allocation
|
page read and write
|
||
2179000E000
|
trusted library allocation
|
page read and write
|
||
242AF9CA000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2C8000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B390000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4F9000
|
trusted library allocation
|
page read and write
|
||
24C1D87B000
|
unkown
|
page readonly
|
||
169F77BE000
|
unkown
|
page readonly
|
||
7FFD9B510000
|
trusted library allocation
|
page read and write
|
||
447E000
|
heap
|
page read and write
|
||
7FFD9B3DB000
|
trusted library allocation
|
page execute and read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B690000
|
trusted library allocation
|
page read and write
|
||
217FADC0000
|
heap
|
page read and write
|
||
24BB000
|
stack
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B530000
|
trusted library allocation
|
page execute and read and write
|
||
2375000
|
heap
|
page read and write
|
||
7EE11FD000
|
stack
|
page read and write
|
||
24C14FF1000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
169F67E8000
|
heap
|
page read and write
|
||
42A0000
|
heap
|
page read and write
|
||
1E1D0820000
|
heap
|
page read and write
|
||
1CAA8F22000
|
heap
|
page read and write
|
||
1CA8FEF5000
|
heap
|
page read and write
|
||
238EA4EC000
|
heap
|
page read and write
|
||
7EE293E000
|
stack
|
page read and write
|
||
CB7DEFE000
|
stack
|
page read and write
|
||
58FF5FE000
|
stack
|
page read and write
|
||
7FFD9B396000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6B0000
|
trusted library allocation
|
page read and write
|
||
1CAA8F82000
|
heap
|
page read and write
|
||
217FAD90000
|
heap
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
217800CF000
|
trusted library allocation
|
page read and write
|
||
213F425D000
|
trusted library allocation
|
page read and write
|
||
238EA4DA000
|
heap
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B486000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
79F000
|
heap
|
page read and write
|
||
217FC200000
|
heap
|
page read and write
|
||
43FD000
|
trusted library allocation
|
page execute and read and write
|
||
16990011000
|
trusted library allocation
|
page read and write
|
||
7FFD9B31D000
|
trusted library allocation
|
page execute and read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
21780468000
|
trusted library allocation
|
page read and write
|
||
42E0000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
4A00000
|
trusted library allocation
|
page execute and read and write
|
||
21780918000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
66BE000
|
stack
|
page read and write
|
||
24C04A34000
|
heap
|
page read and write
|
||
217801F5000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
6750000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
24C1D8D5000
|
unkown
|
page readonly
|
||
21780638000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
4B90000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
2D61000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
242AF905000
|
heap
|
page read and write
|
||
299F000
|
heap
|
page read and write
|
||
2423AD70000
|
heap
|
page read and write
|
||
6F81000
|
trusted library allocation
|
page read and write
|
||
21780A64000
|
trusted library allocation
|
page read and write
|
||
7EE2331000
|
stack
|
page read and write
|
||
24C1D9CE000
|
heap
|
page read and write
|
||
242AF99E000
|
heap
|
page read and write
|
||
21780958000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3C6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B49C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2D0000
|
trusted library allocation
|
page read and write
|
||
6F84000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2F3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B530000
|
trusted library allocation
|
page execute and read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4AA000
|
trusted library allocation
|
page read and write
|
||
217FC184000
|
heap
|
page read and write
|
||
21790001000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2FB000
|
trusted library allocation
|
page execute and read and write
|
||
78111FE000
|
stack
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
217FC280000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
2CA3000
|
heap
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
4C94000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
29B5000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
217FC2E0000
|
heap
|
page read and write
|
||
1CA9068D000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
41A0000
|
trusted library allocation
|
page read and write
|
||
1E1C7E1F000
|
trusted library allocation
|
page read and write
|
||
217801F9000
|
trusted library allocation
|
page read and write
|
||
1E1D05CA000
|
heap
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
EF97AFD000
|
stack
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
238EA3F5000
|
heap
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
217FC5A0000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7EE16E9000
|
stack
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
213E437C000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
5B552FE000
|
stack
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2FD000
|
trusted library allocation
|
page execute and read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
670E8FE000
|
stack
|
page read and write
|
||
7FFD9B4C8000
|
trusted library allocation
|
page read and write
|
||
19DC6411000
|
trusted library allocation
|
page read and write
|
||
7FFD9B48A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3B0000
|
trusted library allocation
|
page execute and read and write
|
||
4940000
|
trusted library allocation
|
page read and write
|
||
6814000
|
trusted library allocation
|
page read and write
|
||
24C1D90A000
|
unkown
|
page readonly
|
||
6FD0000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
242AF90F000
|
heap
|
page read and write
|
||
1CA9077C000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
217FC23E000
|
heap
|
page read and write
|
||
1E1B6410000
|
trusted library allocation
|
page read and write
|
||
4C1D000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
6D2E000
|
stack
|
page read and write
|
||
1CA90640000
|
heap
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
670EBFE000
|
stack
|
page read and write
|
||
1CAA065D000
|
trusted library allocation
|
page read and write
|
||
1CA9068F000
|
trusted library allocation
|
page read and write
|
||
21780177000
|
trusted library allocation
|
page read and write
|
||
CB7D3FE000
|
stack
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
4C21000
|
trusted library allocation
|
page read and write
|
||
1CA9077F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4D6000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
7FFD9B510000
|
trusted library allocation
|
page execute and read and write
|
||
24C047D0000
|
heap
|
page read and write
|
||
24C0501F000
|
trusted library allocation
|
page read and write
|
||
217FBE20000
|
unkown
|
page readonly
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
2423AAA8000
|
heap
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
1CE7F3C0000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
66D3000
|
trusted library allocation
|
page read and write
|
||
67FE000
|
trusted library allocation
|
page read and write
|
||
217809C6000
|
trusted library allocation
|
page read and write
|
||
EF982FE000
|
stack
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
42AC000
|
stack
|
page read and write
|
||
42F0000
|
heap
|
page read and write
|
||
5B554FE000
|
stack
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
217801B9000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2F0000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
217FBC02000
|
heap
|
page read and write
|
||
5B54FFD000
|
stack
|
page read and write
|
||
7FFD9B452000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
6FC0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4B0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
2842000
|
heap
|
page read and write
|
||
7EE1D3C000
|
stack
|
page read and write
|
||
213FC9CB000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6850000
|
remote allocation
|
page read and write
|
||
217FBBA0000
|
heap
|
page read and write
|
||
41CE000
|
stack
|
page read and write
|
||
67C0000
|
trusted library allocation
|
page read and write
|
||
58FECFE000
|
stack
|
page read and write
|
||
7FFD9B2E0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
7FFD9B390000
|
trusted library allocation
|
page read and write
|
||
217801B1000
|
trusted library allocation
|
page read and write
|
||
4690000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
455F000
|
stack
|
page read and write
|
||
7FFD9B470000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
217801DD000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
24296894000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3A0000
|
trusted library allocation
|
page execute and read and write
|
||
23890001000
|
trusted library allocation
|
page read and write
|
||
238EA430000
|
trusted library allocation
|
page read and write
|
||
7FFD9B511000
|
trusted library allocation
|
page read and write
|
||
169F70C0000
|
heap
|
page execute and read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
7EE1B64000
|
stack
|
page read and write
|
||
7FFD9B30B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B3A6000
|
trusted library allocation
|
page execute and read and write
|
||
5A7E2FE000
|
stack
|
page read and write
|
||
19DCEB3D000
|
heap
|
page read and write
|
||
4670000
|
trusted library allocation
|
page read and write
|
||
26FF000
|
stack
|
page read and write
|
||
EF97FFE000
|
stack
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
4A70000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2F4000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
169F77F3000
|
unkown
|
page readonly
|
||
2178095E000
|
trusted library allocation
|
page read and write
|
||
43A1000
|
trusted library allocation
|
page read and write
|
||
1CE004D0000
|
heap
|
page execute and read and write
|
||
1CA90085000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7EE173E000
|
stack
|
page read and write
|
||
7FFD9B4B2000
|
trusted library allocation
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
45A0000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
4440000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
2767000
|
trusted library allocation
|
page execute and read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4A0000
|
trusted library allocation
|
page read and write
|
||
1E1B7F82000
|
trusted library allocation
|
page read and write
|
||
217807CA000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7EE2A3D000
|
stack
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4A3000
|
trusted library allocation
|
page read and write
|
||
2429686D000
|
heap
|
page read and write
|
||
4643000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
2A2C000
|
heap
|
page read and write
|
||
24C1D86C000
|
unkown
|
page readonly
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
2CAC000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
2570000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
43F3000
|
trusted library allocation
|
page execute and read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
69AE000
|
stack
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B396000
|
trusted library allocation
|
page execute and read and write
|
||
19DB6200000
|
heap
|
page read and write
|
||
2A36000
|
heap
|
page read and write
|
||
7FFD9B4C2000
|
trusted library allocation
|
page read and write
|
||
24C1D881000
|
unkown
|
page readonly
|
||
7FFD9B524000
|
trusted library allocation
|
page read and write
|
||
7FFD9B520000
|
trusted library allocation
|
page read and write
|
||
6E9FF21000
|
stack
|
page read and write
|
||
7FFD9B500000
|
trusted library allocation
|
page execute and read and write
|
||
213E3800000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6EA0AFE000
|
stack
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
21780095000
|
trusted library allocation
|
page read and write
|
||
7FC18000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B2D4000
|
trusted library allocation
|
page read and write
|
||
24C14FED000
|
trusted library allocation
|
page read and write
|
||
67B9000
|
trusted library allocation
|
page read and write
|
||
24296836000
|
heap
|
page read and write
|
||
4711000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B514000
|
trusted library allocation
|
page read and write
|
||
213E3C85000
|
heap
|
page read and write
|
||
471D000
|
stack
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B497000
|
trusted library allocation
|
page read and write
|
||
48D0000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
217807C8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B520000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
727E000
|
stack
|
page read and write
|
||
7FFD9B38C000
|
trusted library allocation
|
page execute and read and write
|
||
21780131000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B410000
|
trusted library allocation
|
page execute and read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2DD000
|
trusted library allocation
|
page execute and read and write
|
||
6FE0000
|
remote allocation
|
page read and write
|
||
7FFD9B2F4000
|
trusted library allocation
|
page read and write
|
||
24C1D9BB000
|
heap
|
page read and write
|
||
6C2E000
|
stack
|
page read and write
|
||
7FFD9B2DB000
|
trusted library allocation
|
page execute and read and write
|
||
5715000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4D0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
2560000
|
heap
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
1CE7F4A0000
|
heap
|
page read and write
|
||
4B63000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
2848000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
19DC6421000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
1CE7F400000
|
heap
|
page read and write
|
||
242AF966000
|
heap
|
page read and write
|
||
7FFD9B590000
|
trusted library allocation
|
page read and write
|
||
29DF000
|
stack
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
27C4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4A0000
|
trusted library allocation
|
page read and write
|
||
23BE000
|
stack
|
page read and write
|
||
6DA3000
|
heap
|
page read and write
|
||
24296F10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4D9000
|
trusted library allocation
|
page read and write
|
||
45DF000
|
stack
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
217800CB000
|
trusted library allocation
|
page read and write
|
||
1E1B63C7000
|
heap
|
page read and write
|
||
EF97EFE000
|
stack
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
2734000
|
trusted library allocation
|
page read and write
|
||
2178091E000
|
trusted library allocation
|
page read and write
|
||
4B60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B610000
|
trusted library allocation
|
page execute and read and write
|
||
4B6C000
|
trusted library allocation
|
page execute and read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B30C000
|
trusted library allocation
|
page execute and read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
19DB5BA0000
|
heap
|
page read and write
|
||
24C1D896000
|
unkown
|
page readonly
|
||
2423AD75000
|
heap
|
page read and write
|
||
2CB8000
|
heap
|
page read and write
|
||
78108FE000
|
stack
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
1CAA0661000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2D3000
|
trusted library allocation
|
page execute and read and write
|
||
6EE000
|
stack
|
page read and write
|
||
7FFD9B4B9000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
242970A0000
|
heap
|
page execute and read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B490000
|
trusted library allocation
|
page read and write
|
||
24C1D862000
|
unkown
|
page readonly
|
||
3E0000
|
heap
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4A6000
|
trusted library allocation
|
page read and write
|
||
1E1D08A3000
|
heap
|
page read and write
|
||
1E1D058D000
|
heap
|
page read and write
|
||
7C9000
|
heap
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
1CAA9000000
|
heap
|
page execute and read and write
|
||
1FC000
|
stack
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
1CA905C0000
|
heap
|
page execute and read and write
|
||
281A000
|
heap
|
page read and write
|
||
2D1F000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
217FBC07000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
1CE7F3E0000
|
heap
|
page read and write
|
||
58FF0FF000
|
stack
|
page read and write
|
||
4DFB6FE000
|
stack
|
page read and write
|
||
EF980FE000
|
stack
|
page read and write
|
||
4BA0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2E2000
|
trusted library allocation
|
page read and write
|
||
5A7DFFF000
|
stack
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
4DFA4F4000
|
stack
|
page read and write
|
||
1CA8FE58000
|
heap
|
page read and write
|
||
1CA8FE96000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
463D000
|
stack
|
page read and write
|
||
27C3000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
5B54DFF000
|
stack
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B500000
|
trusted library allocation
|
page execute and read and write
|
||
1E1B63F0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
1CE7F700000
|
heap
|
page read and write
|
||
7574000
|
heap
|
page read and write
|
||
4460000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2ED000
|
trusted library allocation
|
page execute and read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
4925000
|
trusted library allocation
|
page execute and read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
169F77C9000
|
unkown
|
page readonly
|
||
43F4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4B0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
1E1B6443000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
2178006A000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
713E000
|
stack
|
page read and write
|
||
21780A62000
|
trusted library allocation
|
page read and write
|
||
4A5C000
|
stack
|
page read and write
|
||
42E0000
|
trusted library allocation
|
page read and write
|
||
48E4000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B420000
|
trusted library allocation
|
page execute and read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
217807C4000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
24C05123000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B580000
|
trusted library allocation
|
page execute and read and write
|
||
1CE18DA3000
|
heap
|
page read and write
|
||
213E39A9000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
169F779B000
|
unkown
|
page readonly
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
27C0000
|
trusted library allocation
|
page read and write
|
||
19DB644B000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
42D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2C0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
2388012C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B380000
|
trusted library allocation
|
page execute and read and write
|
||
217FC25A000
|
heap
|
page read and write
|
||
27BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B30B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B4F0000
|
trusted library allocation
|
page execute and read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3D0000
|
trusted library allocation
|
page execute and read and write
|
||
217FC4B0000
|
unkown
|
page readonly
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2F8000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7EE393D000
|
stack
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
4C0F000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
58FEDFE000
|
stack
|
page read and write
|
||
7F1B8000
|
trusted library allocation
|
page execute and read and write
|
||
4180000
|
heap
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
238EA450000
|
trusted library allocation
|
page read and write
|
||
7FFD9B510000
|
trusted library allocation
|
page read and write
|
||
7EE13FE000
|
stack
|
page read and write
|
||
7FFD9B4A0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
263E000
|
stack
|
page read and write
|
||
6B4E000
|
stack
|
page read and write
|
||
24296A20000
|
heap
|
page read and write
|
||
217FC1A5000
|
heap
|
page read and write
|
||
7FFD9B540000
|
trusted library allocation
|
page execute and read and write
|
||
1E1B6317000
|
heap
|
page read and write
|
||
7EE12FE000
|
stack
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
1698012C000
|
trusted library allocation
|
page read and write
|
||
169F7806000
|
unkown
|
page readonly
|
||
7FFD9B476000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
2733000
|
trusted library allocation
|
page execute and read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
2178005B000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2C2000
|
trusted library allocation
|
page read and write
|
||
217FC5A6000
|
heap
|
page read and write
|
||
67B5000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4BA000
|
trusted library allocation
|
page read and write
|
||
16990001000
|
trusted library allocation
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6F44000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7EE383D000
|
stack
|
page read and write
|
||
21780934000
|
trusted library allocation
|
page read and write
|
||
EF97DFF000
|
stack
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4D7000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
6FC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B600000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
1CE7F550000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
169F77F1000
|
unkown
|
page readonly
|
||
7FFD9B570000
|
trusted library allocation
|
page read and write
|
||
169F7840000
|
heap
|
page read and write
|
||
3AD000
|
stack
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
2C8A000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
7FFD9B480000
|
trusted library allocation
|
page read and write
|
||
27F3000
|
heap
|
page read and write
|
||
7FFD9B4D0000
|
trusted library allocation
|
page read and write
|
||
4DFA8FC000
|
stack
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
2D55000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
24C0510F000
|
trusted library allocation
|
page read and write
|
||
7EE333B000
|
stack
|
page read and write
|
||
67FC000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
4340000
|
trusted library allocation
|
page read and write
|
||
17B000
|
stack
|
page read and write
|
||
217FAE40000
|
trusted library allocation
|
page read and write
|
||
4700000
|
heap
|
page execute and read and write
|
||
7810FFE000
|
stack
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
4B69000
|
trusted library allocation
|
page execute and read and write
|
||
19DB5A70000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
4DFB0FB000
|
stack
|
page read and write
|
||
7FFD9B31C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B4C9000
|
trusted library allocation
|
page read and write
|
||
2760000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4C0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
23880143000
|
trusted library allocation
|
page read and write
|
||
44D0000
|
heap
|
page read and write
|
||
6B0E000
|
stack
|
page read and write
|
||
7FFD9B2E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B560000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2FD000
|
trusted library allocation
|
page execute and read and write
|
||
28AB000
|
heap
|
page read and write
|
||
7FFD9B510000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B4D9000
|
trusted library allocation
|
page read and write
|
||
7EE2229000
|
stack
|
page read and write
|
||
788000
|
heap
|
page read and write
|
||
43DE000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B530000
|
trusted library allocation
|
page execute and read and write
|
||
78112FE000
|
stack
|
page read and write
|
||
67F3000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
24C1D926000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
753E000
|
stack
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
24C1D8BE000
|
unkown
|
page readonly
|
||
21790021000
|
trusted library allocation
|
page read and write
|
||
76F000
|
stack
|
page read and write
|
||
24C04FD0000
|
heap
|
page read and write
|
||
757C000
|
heap
|
page read and write
|
||
217806DC000
|
trusted library allocation
|
page read and write
|
||
19DB653C000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
CB7D9FE000
|
stack
|
page read and write
|
||
7FFD9B4A0000
|
trusted library allocation
|
page read and write
|
||
217FC5A3000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
169F6740000
|
heap
|
page read and write
|
||
217807CC000
|
trusted library allocation
|
page read and write
|
||
169F6680000
|
unkown
|
page readonly
|
||
217801C9000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6EA08FE000
|
stack
|
page read and write
|
||
217FABE6000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6EA0CFD000
|
stack
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
6F8E000
|
trusted library allocation
|
page read and write
|
||
169F77C7000
|
unkown
|
page readonly
|
||
660000
|
heap
|
page read and write
|
||
448E000
|
stack
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4D0000
|
trusted library allocation
|
page read and write
|
||
70F0000
|
heap
|
page execute and read and write
|
||
7FFD9B49A000
|
trusted library allocation
|
page read and write
|
||
5A7E3FE000
|
stack
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6ACE000
|
stack
|
page read and write
|
||
7FFD9B530000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67B5000
|
trusted library allocation
|
page read and write
|
||
7EE14FE000
|
stack
|
page read and write
|
||
45FE000
|
stack
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3C6000
|
trusted library allocation
|
page execute and read and write
|
||
6FB0000
|
trusted library allocation
|
page execute and read and write
|
||
71BE000
|
stack
|
page read and write
|
||
7FFD9B4F0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
1CA8FD70000
|
heap
|
page read and write
|
||
72E000
|
stack
|
page read and write
|
||
7FFD9B4A8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B310000
|
trusted library allocation
|
page read and write
|
||
217802A1000
|
trusted library allocation
|
page read and write
|
||
217FABFC000
|
heap
|
page read and write
|
||
23880155000
|
trusted library allocation
|
page read and write
|
||
2429720C000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
24C048D0000
|
heap
|
page read and write
|
||
7FFD9B300000
|
trusted library allocation
|
page read and write
|
||
6EA0BFE000
|
stack
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4AB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B300000
|
trusted library allocation
|
page read and write
|
||
4330000
|
heap
|
page read and write
|
||
2178017C000
|
trusted library allocation
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
213E3A70000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3C6000
|
trusted library allocation
|
page execute and read and write
|
||
438F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2B8000
|
trusted library allocation
|
page read and write
|
||
4BA0000
|
trusted library allocation
|
page read and write
|
||
4DFADFF000
|
stack
|
page read and write
|
||
4310000
|
trusted library allocation
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
EF977FE000
|
stack
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2ED000
|
trusted library allocation
|
page execute and read and write
|
||
466C000
|
trusted library allocation
|
page execute and read and write
|
||
4B3E000
|
stack
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B46E000
|
trusted library allocation
|
page read and write
|
||
19DB5990000
|
heap
|
page read and write
|
||
5A7DBFE000
|
stack
|
page read and write
|
||
1E1D04D0000
|
heap
|
page read and write
|
||
6760000
|
trusted library allocation
|
page read and write
|
||
67E0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
16980143000
|
trusted library allocation
|
page read and write
|
||
6FC0000
|
trusted library allocation
|
page read and write
|
||
283C000
|
heap
|
page read and write
|
||
280D000
|
heap
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
421E000
|
stack
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
169F6FA0000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
4DFACFE000
|
stack
|
page read and write
|
||
217FC22F000
|
heap
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
5BC5000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4A2000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
1E1D0823000
|
heap
|
page read and write
|
||
169F784A000
|
heap
|
page read and write
|
||
7EE15FE000
|
stack
|
page read and write
|
||
217801E1000
|
trusted library allocation
|
page read and write
|
||
213F4261000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
217803E6000
|
trusted library allocation
|
page read and write
|
||
1E1D0830000
|
heap
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
217800DF000
|
trusted library allocation
|
page read and write
|
||
43D3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B410000
|
trusted library allocation
|
page execute and read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
7EE303E000
|
stack
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2E4000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
1CA8FD90000
|
heap
|
page read and write
|
||
7FFD9B304000
|
trusted library allocation
|
page read and write
|
||
2996000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B520000
|
trusted library allocation
|
page read and write
|
||
1E1B7E00000
|
heap
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
78110FE000
|
stack
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B490000
|
trusted library allocation
|
page read and write
|
||
4DFABFE000
|
stack
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
24C1D9A7000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
27B3000
|
trusted library allocation
|
page execute and read and write
|
||
24C1D87D000
|
unkown
|
page readonly
|
||
27D5000
|
heap
|
page read and write
|
||
7EE2D3D000
|
stack
|
page read and write
|
||
169F77C3000
|
unkown
|
page readonly
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
24C1D8BA000
|
unkown
|
page readonly
|
||
4B66000
|
trusted library allocation
|
page execute and read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B496000
|
trusted library allocation
|
page read and write
|
||
282E000
|
stack
|
page read and write
|
||
213E39BD000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
19DB6565000
|
trusted library allocation
|
page read and write
|
||
BB2797E000
|
stack
|
page read and write
|
||
23FF000
|
stack
|
page read and write
|
||
7FFD9B500000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
1CE18E60000
|
heap
|
page execute and read and write
|
||
213E40B0000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
4B4D000
|
trusted library allocation
|
page execute and read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
7FFD9B32C000
|
trusted library allocation
|
page execute and read and write
|
||
217FC602000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
7EE1BBE000
|
unkown
|
page read and write
|
||
217FBCB0000
|
heap
|
page execute and read and write
|
||
24C1D89A000
|
unkown
|
page readonly
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
242AFA80000
|
heap
|
page execute and read and write
|
||
2423AA20000
|
heap
|
page read and write
|
||
6850000
|
remote allocation
|
page read and write
|
||
1CE7F7C5000
|
heap
|
page read and write
|
||
7FFD9B4C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3D6000
|
trusted library allocation
|
page execute and read and write
|
||
24C1D8C0000
|
unkown
|
page readonly
|
||
4A10000
|
heap
|
page read and write
|
||
BB2787F000
|
stack
|
page read and write
|
||
2740000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F81000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
169F67C1000
|
heap
|
page read and write
|
||
7FFD9B470000
|
trusted library allocation
|
page read and write
|
||
4DFB2FC000
|
stack
|
page read and write
|
||
442B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B2BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B4C9000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
4300000
|
trusted library allocation
|
page read and write
|
||
21780998000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
242AF97D000
|
heap
|
page read and write
|
||
7FFD9B2D0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
7FFD9B480000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
4391000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
7EE1829000
|
stack
|
page read and write
|
||
1CA8FE54000
|
heap
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
41EE000
|
stack
|
page read and write
|
||
2A48000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
217801ED000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
1E1D0630000
|
heap
|
page execute and read and write
|
||
1E1B6265000
|
heap
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
4B40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2F4000
|
trusted library allocation
|
page read and write
|
||
217801E5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4E9000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
1CE18CF0000
|
heap
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
CB7DBFE000
|
stack
|
page read and write
|
||
1CE7F4A4000
|
heap
|
page read and write
|
||
1E1B7F8A000
|
trusted library allocation
|
page read and write
|
||
1698012F000
|
trusted library allocation
|
page read and write
|
||
1E1D0561000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
24296A40000
|
heap
|
page read and write
|
||
7FFD9B2E0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2E4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B510000
|
trusted library allocation
|
page execute and read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
4B50000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2F2000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
213FC942000
|
heap
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
CB7DCFE000
|
stack
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B314000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
2D4E000
|
heap
|
page read and write
|
||
238EAC80000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
21780170000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B46E000
|
trusted library allocation
|
page read and write
|
||
4CA2000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4E0000
|
trusted library allocation
|
page execute and read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4C0000
|
trusted library allocation
|
page read and write
|
||
24C04F50000
|
unkown
|
page readonly
|
||
2429684B000
|
heap
|
page read and write
|
||
6EA05FD000
|
stack
|
page read and write
|
||
7FFD9B2B0000
|
trusted library allocation
|
page read and write
|
||
24C0501B000
|
trusted library allocation
|
page read and write
|
||
670EDFE000
|
stack
|
page read and write
|
||
7FFD9B3D6000
|
trusted library allocation
|
page execute and read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
217FC14E000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
7FFD9B496000
|
trusted library allocation
|
page read and write
|
||
4B43000
|
trusted library allocation
|
page read and write
|
||
1CE10531000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
73FD000
|
stack
|
page read and write
|
||
1E1B6525000
|
heap
|
page read and write
|
||
4922000
|
trusted library allocation
|
page read and write
|
||
4394000
|
heap
|
page read and write
|
||
7FFD9B500000
|
trusted library allocation
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
62F000
|
unkown
|
page read and write
|
||
2388003D000
|
trusted library allocation
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4F0000
|
trusted library allocation
|
page read and write
|
||
6F4C000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
2DB5000
|
heap
|
page read and write
|
||
217FC240000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
4DFAFFC000
|
stack
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
2D56000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B486000
|
trusted library allocation
|
page read and write
|
||
24C04900000
|
heap
|
page read and write
|
||
217803F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2ED000
|
trusted library allocation
|
page execute and read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2CD000
|
trusted library allocation
|
page execute and read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
4C85000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B500000
|
trusted library allocation
|
page read and write
|
||
7FFD9B490000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
2178005D000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
19DC641D000
|
trusted library allocation
|
page read and write
|
||
1E1B64D0000
|
heap
|
page execute and read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
217800C7000
|
trusted library allocation
|
page read and write
|
||
217801CD000
|
trusted library allocation
|
page read and write
|
||
58FF2FE000
|
stack
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
24C1D934000
|
heap
|
page read and write
|
||
24C1D898000
|
unkown
|
page readonly
|
||
217FAD70000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
1CA8FE00000
|
trusted library allocation
|
page read and write
|
||
1E1D0573000
|
heap
|
page read and write
|
||
1E1B62FA000
|
heap
|
page read and write
|
||
EF978FE000
|
stack
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2E2000
|
trusted library allocation
|
page read and write
|
||
24C1D879000
|
unkown
|
page readonly
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
24296853000
|
heap
|
page read and write
|
||
7FFD9B5B0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2DD000
|
trusted library allocation
|
page execute and read and write
|
||
7EE2829000
|
stack
|
page read and write
|
||
1CE7F4AA000
|
heap
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
66C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2BD000
|
trusted library allocation
|
page execute and read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
213E437F000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
1E1D053D000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2E8000
|
trusted library allocation
|
page read and write
|
||
29BB000
|
stack
|
page read and write
|
||
217FC18E000
|
heap
|
page read and write
|
||
4AFE000
|
stack
|
page read and write
|
||
7FFD9B370000
|
trusted library allocation
|
page execute and read and write
|
||
169F6730000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
1CE00510000
|
heap
|
page read and write
|
||
213E4140000
|
heap
|
page execute and read and write
|
||
1CE7F3B0000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
49CE000
|
stack
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
7CA000
|
heap
|
page read and write
|
||
24296A00000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
27EF000
|
stack
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4E0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3A6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4C5000
|
trusted library allocation
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3B0000
|
trusted library allocation
|
page execute and read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
24C04F40000
|
heap
|
page execute and read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
1CA8FFD0000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
43A0000
|
trusted library allocation
|
page read and write
|
||
42C4000
|
trusted library allocation
|
page read and write
|
||
2780000
|
trusted library allocation
|
page read and write
|
||
1E1B6440000
|
heap
|
page read and write
|
||
7FFD9B2C0000
|
trusted library allocation
|
page read and write
|
||
7EE2529000
|
stack
|
page read and write
|
||
47D000
|
stack
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B480000
|
trusted library allocation
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
7FFD9B304000
|
trusted library allocation
|
page read and write
|
||
4420000
|
trusted library allocation
|
page read and write
|
||
4C5B000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
213E39A3000
|
heap
|
page read and write
|
||
7FFD9B370000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
217FBBED000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B520000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B49D000
|
trusted library allocation
|
page read and write
|
||
5B54EFE000
|
stack
|
page read and write
|
||
66E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3FB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B2E3000
|
trusted library allocation
|
page execute and read and write
|
||
217800E7000
|
trusted library allocation
|
page read and write
|
||
7EE3128000
|
stack
|
page read and write
|
||
5B557FE000
|
stack
|
page read and write
|
||
7FFD9B2F0000
|
trusted library allocation
|
page read and write
|
||
2178091A000
|
trusted library allocation
|
page read and write
|
||
955000
|
heap
|
page read and write
|
||
27CC000
|
heap
|
page read and write
|
||
169F69F5000
|
heap
|
page read and write
|
||
24C05135000
|
trusted library allocation
|
page read and write
|
||
19DB5D00000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
213E3986000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
heap
|
page execute and read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
4650000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
24C1D889000
|
unkown
|
page readonly
|
||
7FFD9B4C0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
5B551FE000
|
stack
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
169F77BC000
|
unkown
|
page readonly
|
||
42F0000
|
heap
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B39C000
|
trusted library allocation
|
page execute and read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
2856000
|
heap
|
page read and write
|
||
6BCF000
|
stack
|
page read and write
|
||
44E0000
|
heap
|
page readonly
|
||
7810CFE000
|
stack
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
67F1000
|
trusted library allocation
|
page read and write
|
||
217805C8000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
heap
|
page read and write
|
||
4DFA6FE000
|
stack
|
page read and write
|
||
442C000
|
heap
|
page read and write
|
||
4422000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
6A2E000
|
stack
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
19DCEB88000
|
heap
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
EF979FE000
|
stack
|
page read and write
|
||
4320000
|
heap
|
page execute and read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
43E4000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2D2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4A0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
217FB36F000
|
heap
|
page read and write
|
||
294E000
|
stack
|
page read and write
|
||
670E7FE000
|
stack
|
page read and write
|
||
7FFD9B4A0000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6EA02FE000
|
stack
|
page read and write
|
||
2423AA00000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
7EE3228000
|
stack
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
CB7D5FE000
|
stack
|
page read and write
|
||
2178022E000
|
trusted library allocation
|
page read and write
|
||
1E1B60C0000
|
unkown
|
page readonly
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
217FC146000
|
heap
|
page read and write
|
||
670E9FF000
|
stack
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B410000
|
trusted library allocation
|
page execute and read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6BD0000
|
heap
|
page read and write
|
||
21780066000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2C3000
|
trusted library allocation
|
page execute and read and write
|
||
24C1D92E000
|
heap
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
670E2FE000
|
stack
|
page read and write
|
||
169F78DF000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
58FEEFF000
|
stack
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
1E1B60C0000
|
unkown
|
page readonly
|
||
169F678D000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
169F7839000
|
unkown
|
page readonly
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
21780172000
|
trusted library allocation
|
page read and write
|
||
24C1D95B000
|
heap
|
page read and write
|
||
6A8E000
|
stack
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
213E4240000
|
heap
|
page execute and read and write
|
||
19DB5AEB000
|
heap
|
page read and write
|
||
7FFD9B2B3000
|
trusted library allocation
|
page execute and read and write
|
||
7B9000
|
heap
|
page read and write
|
||
7FFD9B4CD000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
6EA0DFF000
|
stack
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6FE0000
|
remote allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
2178091C000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
4DFB3FA000
|
stack
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
24C1D915000
|
heap
|
page read and write
|
||
7FFD9B32C000
|
trusted library allocation
|
page execute and read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
492B000
|
trusted library allocation
|
page execute and read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
4DFAEFC000
|
stack
|
page read and write
|
||
7FFD9B4A0000
|
trusted library allocation
|
page read and write
|
||
CB7D4FF000
|
stack
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
4C53000
|
trusted library allocation
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
7FFD9B3F0000
|
trusted library allocation
|
page execute and read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
21780956000
|
trusted library allocation
|
page read and write
|
||
24C1D8D7000
|
unkown
|
page readonly
|
||
7FFD9B31B000
|
trusted library allocation
|
page execute and read and write
|
||
5345000
|
trusted library allocation
|
page read and write
|
||
24C04F30000
|
heap
|
page execute and read and write
|
||
1E1B7F88000
|
trusted library allocation
|
page read and write
|
||
2D1F000
|
heap
|
page read and write
|
||
21780411000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
1CE00675000
|
trusted library allocation
|
page read and write
|
||
58FE9E1000
|
stack
|
page read and write
|
||
7FFD9B500000
|
trusted library allocation
|
page execute and read and write
|
||
169F77C5000
|
unkown
|
page readonly
|
||
217801C1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2D3000
|
trusted library allocation
|
page execute and read and write
|
||
79B000
|
heap
|
page read and write
|
||
242A70F1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B31D000
|
trusted library allocation
|
page execute and read and write
|
||
1CE00663000
|
trusted library allocation
|
page read and write
|
||
7FFD9B460000
|
trusted library allocation
|
page read and write
|
||
7FFD9B480000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
1E1D0670000
|
unkown
|
page readonly
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
7CF000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
217FC3E0000
|
heap
|
page execute and read and write
|
||
4660000
|
trusted library allocation
|
page read and write
|
||
4890000
|
heap
|
page read and write
|
||
4DFAAFE000
|
stack
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
7810DFE000
|
stack
|
page read and write
|
||
217806C8000
|
trusted library allocation
|
page read and write
|
||
24C1D86A000
|
unkown
|
page readonly
|
||
4DFB7FD000
|
stack
|
page read and write
|
||
217803F7000
|
trusted library allocation
|
page read and write
|
||
217FC0C3000
|
heap
|
page read and write
|
||
7EE2B3F000
|
stack
|
page read and write
|
||
1E1D0704000
|
unkown
|
page readonly
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
4C08000
|
trusted library allocation
|
page read and write
|
||
CB7D8FE000
|
stack
|
page read and write
|
||
217800D3000
|
trusted library allocation
|
page read and write
|
||
217803F3000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6FC0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
24C048E0000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
19DCEB5B000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
2178009E000
|
trusted library allocation
|
page read and write
|
||
2D36000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6C0000
|
trusted library allocation
|
page read and write
|
||
19DB5D25000
|
heap
|
page read and write
|
||
EF97BFE000
|
stack
|
page read and write
|
||
7FFD9B3E0000
|
trusted library allocation
|
page execute and read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2D4000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B476000
|
trusted library allocation
|
page read and write
|
||
5B553FE000
|
stack
|
page read and write
|
||
2965000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
213E43A1000
|
trusted library allocation
|
page read and write
|
||
217FC4B2000
|
unkown
|
page readonly
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page execute and read and write
|
||
CB7DAFE000
|
stack
|
page read and write
|
||
4600000
|
heap
|
page execute and read and write
|
||
CB7D7FF000
|
stack
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4A4000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
4DFB1FD000
|
stack
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
45E0000
|
heap
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
19DB5AED000
|
heap
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
242AF900000
|
heap
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4F0000
|
trusted library allocation
|
page read and write
|
||
24C1D9C0000
|
heap
|
page read and write
|
||
71FF000
|
stack
|
page read and write
|
||
7FFD9B2E8000
|
trusted library allocation
|
page read and write
|
||
1E1B6331000
|
heap
|
page read and write
|
||
7FFD9B366000
|
trusted library allocation
|
page read and write
|
There are 2654 hidden memdumps, click here to show them.