Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
ArchivoNuevo.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: PDQConnectAgent, Author: PDQ.com, Keywords: Installer, Comments: This installer database contains the logic
and data required to install PDQConnectAgent., Template: x64;1033, Revision Number: {85C6D84F-37EC-4D4B-94DE-DB23DEF61F1F},
Create Time/Date: Wed Nov 6 23:53:40 2024, Last Saved Time/Date: Wed Nov 6 23:53:40 2024, Number of Pages: 200, Number of
Words: 2, Name of Creating Application: WiX Toolset (5.0.0.0), Security: 2
|
initial sample
|
||
C:\Program Files\PDQ\PDQConnectAgent\pdq-connect-agent.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Config.Msi\54241a.rbs
|
data
|
dropped
|
||
C:\Config.Msi\54241e.rbs
|
data
|
modified
|
||
C:\Program Files\PDQ\PDQConnectAgent\LICENSE.html
|
HTML document, ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\Program Files\PDQ\PDQConnectUpdater\pdq-connect-updater.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\ProgramData\PDQ\PDQConnectAgent\PDQConnectAgent.db
|
SQLite 3.x database, user version 7, last written using SQLite version 3046000, file counter 4, database pages 9, cookie 0x8,
schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\ProgramData\PDQ\PDQConnectAgent\PDQConnectAgent.db-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\ProgramData\PDQ\PDQConnectAgent\Updates\PDQConnectUpdater-0.3.0.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: PDQConnectUpdater, Author: PDQ.com, Keywords: Installer, Comments: This installer database contains the
logic and data required to install PDQConnectUpdater., Template: x64;1033, Revision Number: {B086F434-9ED9-4857-9B74-509A6B3D31F3},
Create Time/Date: Thu Oct 10 16:36:06 2024, Last Saved Time/Date: Thu Oct 10 16:36:06 2024, Number of Pages: 200, Number of
Words: 2, Name of Creating Application: WiX Toolset (5.0.0.0), Security: 2
|
dropped
|
||
C:\ProgramData\PDQ\PDQConnectAgent\Updates\updater_install.log
|
Unicode text, UTF-16, little-endian text, with very long lines (386), with CRLF, LF line terminators
|
dropped
|
||
C:\ProgramData\PDQ\PDQConnectAgent\token
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\rundll32.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\Installer\542419.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: PDQConnectAgent, Author: PDQ.com, Keywords: Installer, Comments: This installer database contains the logic
and data required to install PDQConnectAgent., Template: x64;1033, Revision Number: {85C6D84F-37EC-4D4B-94DE-DB23DEF61F1F},
Create Time/Date: Wed Nov 6 23:53:40 2024, Last Saved Time/Date: Wed Nov 6 23:53:40 2024, Number of Pages: 200, Number of
Words: 2, Name of Creating Application: WiX Toolset (5.0.0.0), Security: 2
|
dropped
|
||
C:\Windows\Installer\54241b.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: PDQConnectAgent, Author: PDQ.com, Keywords: Installer, Comments: This installer database contains the logic
and data required to install PDQConnectAgent., Template: x64;1033, Revision Number: {85C6D84F-37EC-4D4B-94DE-DB23DEF61F1F},
Create Time/Date: Wed Nov 6 23:53:40 2024, Last Saved Time/Date: Wed Nov 6 23:53:40 2024, Number of Pages: 200, Number of
Words: 2, Name of Creating Application: WiX Toolset (5.0.0.0), Security: 2
|
dropped
|
||
C:\Windows\Installer\54241c.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: PDQConnectUpdater, Author: PDQ.com, Keywords: Installer, Comments: This installer database contains the
logic and data required to install PDQConnectUpdater., Template: x64;1033, Revision Number: {B086F434-9ED9-4857-9B74-509A6B3D31F3},
Create Time/Date: Thu Oct 10 16:36:06 2024, Last Saved Time/Date: Thu Oct 10 16:36:06 2024, Number of Pages: 200, Number of
Words: 2, Name of Creating Application: WiX Toolset (5.0.0.0), Security: 2
|
dropped
|
||
C:\Windows\Installer\54241f.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: PDQConnectUpdater, Author: PDQ.com, Keywords: Installer, Comments: This installer database contains the
logic and data required to install PDQConnectUpdater., Template: x64;1033, Revision Number: {B086F434-9ED9-4857-9B74-509A6B3D31F3},
Create Time/Date: Thu Oct 10 16:36:06 2024, Last Saved Time/Date: Thu Oct 10 16:36:06 2024, Number of Pages: 200, Number of
Words: 2, Name of Creating Application: WiX Toolset (5.0.0.0), Security: 2
|
dropped
|
||
C:\Windows\Installer\MSI25AF.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI307E.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSI308F.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI30BF.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI3861.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI3891.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI392E.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI3EBD.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI45D2.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI4D55.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI4D85.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI73EA.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI7979.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSI798A.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI7A36.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI7EDB.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCA0AFEF201D34F9FEB9B68C29FF1DEA299\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\SFXCA0AFEF201D34F9FEB9B68C29FF1DEA299\WixSharp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCA0AFEF201D34F9FEB9B68C29FF1DEA299\WixToolset.Dtf.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCA0AFEF201D34F9FEB9B68C29FF1DEA299\pdqconnectagent-setup.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCA0ED2EC38E74DD8E8B1AFF51FA0AC9210\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\SFXCA0ED2EC38E74DD8E8B1AFF51FA0AC9210\WixSharp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCA0ED2EC38E74DD8E8B1AFF51FA0AC9210\WixToolset.Dtf.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCA0ED2EC38E74DD8E8B1AFF51FA0AC9210\pdqconnectagent-setup.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCA2D62C371EC4462894F00FB8E155458C3\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\SFXCA2D62C371EC4462894F00FB8E155458C3\WixSharp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCA2D62C371EC4462894F00FB8E155458C3\WixToolset.Dtf.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCA2D62C371EC4462894F00FB8E155458C3\pdqconnectupdater-setup.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCA2D62C371EC4462894F00FB8E155458C3\pdqconnectupdater-setup.pdb
|
MSVC program database ver 7.00, 512*51 bytes
|
dropped
|
||
C:\Windows\Installer\SFXCA346E64854645062B71D18DA79DA4EE43\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\SFXCA346E64854645062B71D18DA79DA4EE43\WixSharp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCA346E64854645062B71D18DA79DA4EE43\WixToolset.Dtf.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCA346E64854645062B71D18DA79DA4EE43\pdqconnectagent-setup.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCA346E64854645062B71D18DA79DA4EE43\pdqconnectagent-setup.pdb
|
MSVC program database ver 7.00, 512*59 bytes
|
dropped
|
||
C:\Windows\Installer\SFXCABB31053B1D4845A965C92D7ACB4427E9\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\SFXCABB31053B1D4845A965C92D7ACB4427E9\WixSharp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCABB31053B1D4845A965C92D7ACB4427E9\WixToolset.Dtf.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCABB31053B1D4845A965C92D7ACB4427E9\pdqconnectagent-setup.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCABB31053B1D4845A965C92D7ACB4427E9\pdqconnectagent-setup.pdb
|
MSVC program database ver 7.00, 512*59 bytes
|
dropped
|
||
C:\Windows\Installer\SFXCAC25C26A72E4A6B69ED3BA12DF4525456\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\SFXCAC25C26A72E4A6B69ED3BA12DF4525456\WixSharp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCAC25C26A72E4A6B69ED3BA12DF4525456\WixToolset.Dtf.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCAC25C26A72E4A6B69ED3BA12DF4525456\pdqconnectagent-setup.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCAC25C26A72E4A6B69ED3BA12DF4525456\pdqconnectagent-setup.pdb
|
MSVC program database ver 7.00, 512*59 bytes
|
dropped
|
||
C:\Windows\Installer\SFXCAD45AA528324E95A938548E4BDEFAECCD\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\SFXCAD45AA528324E95A938548E4BDEFAECCD\WixSharp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCAD45AA528324E95A938548E4BDEFAECCD\WixToolset.Dtf.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SourceHash{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\SourceHash{F03416B2-8C97-4CC4-8578-5F6A58033B84}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}\app_icon.ico
|
MS Windows icon resource - 4 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
|
dropped
|
||
C:\Windows\Installer\{F03416B2-8C97-4CC4-8578-5F6A58033B84}\app_icon.ico
|
MS Windows icon resource - 4 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\rundll32.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_0gmc1xpq.45e.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_2mg222ch.kvp.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_34dm3cgj.baf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_3s35suwm.sj2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_4g5muoa3.ksl.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_5cxobujq.wdr.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_io4zihet.1bh.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_j1r1lpq1.uij.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_j25gu0yn.hqn.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_llmoqnvo.nuh.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_nxuczmpm.vkh.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_rltd2vtr.rer.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_sepyllgf.0en.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_smr3w5xl.i0v.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_vih42yy4.412.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_x213e1mu.wu1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\~DF00B60B6640158ABD.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF04B56EE4FE0C85B9.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF068413FD4572B18B.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF081FDE5C5C4F8C40.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF123623DC0DBC14E1.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF396B647460244CB8.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF39785F1C7EAC9544.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF40101C4164EE1389.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF427C9CD0A0F61B51.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF6DAA4C518DA0BEE2.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF78D3429EAC201473.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF799661E2806E9310.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF7C8F5E9AA3F7E2DA.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF8D3C4B8E96645F00.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF94219595E4254551.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFA4F7A66D8A531DF3.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFB26093FE399E8175.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFB7A2BBBADFBA6F6F.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFD0ED53F7D32255F4.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFD37AACF6C66EB826.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFD714D47762D76C2E.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFF3F720C887E9CF67.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFFE1C461AF89FBC57.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFFE29409A32CCE350.TMP
|
data
|
dropped
|
There are 101 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI25AF.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5515890 2 WixSharp!WixSharp.ManagedProjectActions.WixSharp_InitRuntime_Action
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI30BF.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5517562 16 WixSharp!WixSharp.ManagedProjectActions.WixSharp_BeforeInstall_Action
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI392E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5519718 38 pdqconnectagent-setup!pdqconnectagent_setup.CustomActions.CreateEventSource
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI3EBD.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5521109 44 pdqconnectagent-setup!pdqconnectagent_setup.CustomActions.WriteToken
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI45D2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5522921 50 pdqconnectagent-setup!pdqconnectagent_setup.CustomActions.StartService
|
||
C:\Program Files\PDQ\PDQConnectAgent\pdq-connect-agent.exe
|
"C:\Program Files\PDQ\PDQConnectAgent\pdq-connect-agent.exe" --service
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI73EA.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5534781 61 WixSharp!WixSharp.ManagedProjectActions.WixSharp_InitRuntime_Action
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI7A36.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5536343 77 pdqconnectupdater-setup!pdqconnectupdater_setup.CustomActions.CreateEventSource
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass -Command -
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass -Command -
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass -Command -
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass -Command -
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\ArchivoNuevo.msi"
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k LocalService -s W32Time
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\System32\MsiExec.exe -Embedding D76B6F71B87802B3ACFEEA578FA9D516
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\System32\MsiExec.exe -Embedding 7A304B5B3B95AEB5D3F9D9F785650ADA E Global\MSI0000
|
||
C:\Windows\System32\sc.exe
|
"C:\Windows\system32\sc.exe" start "PDQConnectAgent"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\msiexec.exe
|
"msiexec" /i C:\ProgramData\PDQ\PDQConnectAgent\Updates\PDQConnectUpdater-0.3.0.msi /quiet /qn /norestart /L*V C:\ProgramData\PDQ\PDQConnectAgent\Updates\updater_install.log
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\System32\MsiExec.exe -Embedding 20DA56B5F1114D07CD140C2FB8662C4F E Global\MSI0000
|
||
C:\Program Files\PDQ\PDQConnectUpdater\pdq-connect-updater.exe
|
"C:\Program Files\PDQ\PDQConnectUpdater\pdq-connect-updater.exe" --service
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 16 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://app.pdq.com/v1/devices/release-channels/stable/manifest.jsonD
|
unknown
|
||
https://github.com/clap-rs/clap/issuesh~
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/netfx-WixToolset.Http.wixext
|
unknown
|
||
https://app.pdq.com/%pU
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/difxappZhttp://wixtoolset.org/schemas/v4/wxs/firewallRhttp://wi
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/powershellNhttp://wixtoolset.org/schemas/v4/wxs/vsRhttp://wixto
|
unknown
|
||
http://www.micom/pkiops/Docs/ry.htm0
|
unknown
|
||
http://www.microsoft.co
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-support
|
unknown
|
||
https://app.pdq.com/v1/devices/release-channels/emergency/manifest.jsonCouldn
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/vs-WixToolset.Msmq.wixext
|
unknown
|
||
https://app.pdq.com/Hardcoded
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/difxapp5WixToolset.Firewall.wixext
|
unknown
|
||
https://pdqinstallers.e9d69694c3d8f7465fd531512c22bd0f.r2.cloudflarestorage.com/connect-agent/PDQCon
|
unknown
|
||
https://github.com/clap-rs/clap/issues
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/dependency3WixToolset.DirectX.wixext
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/ui9WixToolset.PowerShell.wixext
|
unknown
|
||
https://app.pdq.com/v1/devices/release-channels/stable/manifest.json
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://oneget.orgX
|
unknown
|
||
https://github.com/clap-rs/clap/issuesservice
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/iis
|
unknown
|
||
https://app.pdq.com/
|
unknown
|
||
https://app.pdq.com/v1/devices/auth-challenge
|
unknown
|
||
https://app.pdq.com/v1/devices/register05
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/firewall-WixToolset.Util.wixext
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
https://github.com/clap-rs/clap/issuesC:
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/directx
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/bal
|
unknown
|
||
https://github.com/clap-rs/clap/issuesP
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://github.com/clap-rs/clap/issuescannot
|
unknown
|
||
https://o192192.ingest.sentry.io/api/6095569/envelope/
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/msmq3WixToolset.ComPlus.wixext
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://app.pdq.com/v1/devices/release-channels/emergency/manifest.jsony
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/dependencyXhttp://wixtoolset.org/schemas/v4/wxs/directx
|
unknown
|
||
https://app.pdq.com/v1/devices/register
|
unknown
|
||
https://app.pdq.com/v1/devices/release-channels/emergency/manifest.json
|
unknown
|
||
https://github.com/oleg-shilo/wixsharp/issues/1396#issuecomment-1849731522
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/powershell=WixToolset.VisualStudio.wixext
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/complus9WixToolset.Dependency.wixext
|
unknown
|
||
https://websocket.app.pdq.com:443/v1/devices/socket/websocket?device_id=dvc_63f55ebc1302b93d178c5d51bd3d0717
|
34.128.163.126
|
||
http://wixtoolset.org/schemas/v4/wxs
|
unknown
|
||
https://wixtoolset.org/
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/sql/WixToolset.Netfx.wixext
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/http
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://www.test.com/xml/2015
|
unknown
|
||
http://crl.microsoftL
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/util
|
unknown
|
||
https://oneget.org
|
unknown
|
There are 50 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
pdqinstallers.e9d69694c3d8f7465fd531512c22bd0f.r2.cloudflarestorage.com
|
162.159.140.238
|
||
app.pdq.com
|
104.16.77.47
|
||
websocket.app.pdq.com
|
34.128.163.126
|
||
time.windows.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
34.128.163.126
|
websocket.app.pdq.com
|
United States
|
||
104.16.77.47
|
app.pdq.com
|
United States
|
||
162.159.140.238
|
pdqinstallers.e9d69694c3d8f7465fd531512c22bd0f.r2.cloudflarestorage.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\54241a.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\54241a.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2B61430F79C84CC45887F5A6386C99F8
|
2B61430F79C84CC45887F5A68530B348
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2B61430F79C84CC45887F5A6C3D6A20F
|
2B61430F79C84CC45887F5A68530B348
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2B61430F79C84CC45887F5A61DD4B302
|
2B61430F79C84CC45887F5A68530B348
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2B61430F79C84CC45887F5A65E431729
|
2B61430F79C84CC45887F5A68530B348
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2B61430F79C84CC45887F5A6ACEAC9E8
|
2B61430F79C84CC45887F5A68530B348
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\ProgramData\PDQ\PDQConnectAgent\Downloads\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files\PDQ\PDQConnectAgent\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files\PDQ\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\2B61430F79C84CC45887F5A6803ABC48
|
2B61430F79C84CC45887F5A68530B348
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\2B61430F79C84CC45887F5A68530B348
|
Complete
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\Features
|
Complete
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Windows\Installer\{F03416B2-8C97-4CC4-8578-5F6A58033B84}\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348
|
ProductIcon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\2B61430F79C84CC45887F5A6803ABC48
|
2B61430F79C84CC45887F5A68530B348
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348\SourceList
|
LastUsedSource
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\54241e.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\54241e.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8DC50CE071D8C27468ADFAE1EF40C1CD
|
8DC50CE071D8C27468ADFAE1356552F6
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files\PDQ\PDQConnectUpdater\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\8DC50CE071D8C27468ADFAE1356251F6
|
8DC50CE071D8C27468ADFAE1356552F6
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\8DC50CE071D8C27468ADFAE1356552F6
|
Complete
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\Features
|
Complete
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Windows\Installer\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6
|
ProductIcon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\8DC50CE071D8C27468ADFAE1356251F6
|
8DC50CE071D8C27468ADFAE1356552F6
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6\SourceList
|
LastUsedSource
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\W32Time\Config
|
LastKnownGoodTime
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\PDQ.com
|
MaxSize
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\PDQ.com
|
AutoBackupLogFiles
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\PDQ.com\PDQ.com
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\PDQ.com\PDQConnectAgent
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\PDQ.com
|
MaxSize
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\PDQ.com\PDQConnectUpdater
|
EventMessageFile
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
There are 173 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
22AB5F80000
|
heap
|
page read and write
|
||
2728D8E0000
|
heap
|
page read and write
|
||
2728D8E9000
|
heap
|
page read and write
|
||
22D0EDE0000
|
heap
|
page read and write
|
||
1C71CDE8000
|
heap
|
page read and write
|
||
7FFAAB4F6000
|
trusted library allocation
|
page execute and read and write
|
||
2728DC3B000
|
heap
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
1C7066DC000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
2831C4C0000
|
heap
|
page read and write
|
||
7FFAAB746000
|
trusted library allocation
|
page read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
2754274A000
|
heap
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
28BA8D70000
|
trusted library allocation
|
page read and write
|
||
28335519000
|
heap
|
page read and write
|
||
23203B90000
|
trusted library allocation
|
page read and write
|
||
96F897D000
|
stack
|
page read and write
|
||
1FB1F566000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
F5CBE7E000
|
stack
|
page read and write
|
||
1C71CEF0000
|
heap
|
page execute and read and write
|
||
7FFAAB3DC000
|
trusted library allocation
|
page execute and read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
1DFF9080000
|
trusted library allocation
|
page read and write
|
||
7FFAAB5E0000
|
trusted library allocation
|
page read and write
|
||
2831C7E0000
|
heap
|
page read and write
|
||
22AB6680000
|
trusted library allocation
|
page read and write
|
||
22ACEF62000
|
heap
|
page read and write
|
||
2D8147AD000
|
heap
|
page read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
2728D8DF000
|
heap
|
page read and write
|
||
7FF792381000
|
unkown
|
page execute read
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3F0000
|
trusted library allocation
|
page read and write
|
||
2728D0A0000
|
heap
|
page read and write
|
||
7FFAAB4D8000
|
trusted library allocation
|
page execute and read and write
|
||
1FB0E860000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
1FB0F281000
|
trusted library allocation
|
page read and write
|
||
2728D827000
|
heap
|
page read and write
|
||
7FFAAB313000
|
trusted library allocation
|
page execute and read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
2D8162B0000
|
heap
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
28BA8D90000
|
trusted library allocation
|
page read and write
|
||
1DFF90CF000
|
heap
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
1FB274FB000
|
heap
|
page read and write
|
||
22ACEF06000
|
heap
|
page execute and read and write
|
||
7FFAAB426000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB330000
|
trusted library allocation
|
page read and write
|
||
7FFAAB71C000
|
trusted library allocation
|
page read and write
|
||
1EF206AF000
|
heap
|
page read and write
|
||
23203B52000
|
heap
|
page read and write
|
||
27544320000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
2256A2F0000
|
heap
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
1EF20820000
|
trusted library allocation
|
page read and write
|
||
26033FE000
|
stack
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
7FFAAB510000
|
trusted library allocation
|
page execute and read and write
|
||
2D816331000
|
trusted library allocation
|
page read and write
|
||
B5E80E3000
|
stack
|
page read and write
|
||
7FFAAB440000
|
trusted library allocation
|
page execute and read and write
|
||
27544313000
|
trusted library allocation
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
2831DAB6000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4D0000
|
trusted library allocation
|
page read and write
|
||
22D0EDF0000
|
heap
|
page read and write
|
||
2728D8B0000
|
heap
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
7FFAAB770000
|
trusted library allocation
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
23202108000
|
heap
|
page read and write
|
||
7FFAAB550000
|
trusted library allocation
|
page read and write
|
||
7FFAAB592000
|
trusted library allocation
|
page read and write
|
||
96F8313000
|
stack
|
page read and write
|
||
232021BD000
|
heap
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
2D816360000
|
trusted library allocation
|
page read and write
|
||
2728D280000
|
heap
|
page read and write
|
||
7FFAAB520000
|
trusted library allocation
|
page execute and read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
7FFAAB34B000
|
trusted library allocation
|
page read and write
|
||
22D0EE62000
|
heap
|
page read and write
|
||
22D0EE5A000
|
heap
|
page read and write
|
||
28E16B85000
|
heap
|
page read and write
|
||
23203DC0000
|
trusted library allocation
|
page read and write
|
||
1FB0EFD0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB590000
|
trusted library allocation
|
page read and write
|
||
2728DCFD000
|
heap
|
page read and write
|
||
98D9963000
|
stack
|
page read and write
|
||
1C705440000
|
trusted library allocation
|
page read and write
|
||
7FFAAB322000
|
trusted library allocation
|
page read and write
|
||
2728D8CF000
|
heap
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
2831D71F000
|
trusted library allocation
|
page read and write
|
||
7FFB23B00000
|
unkown
|
page read and write
|
||
2728DCB5000
|
heap
|
page read and write
|
||
1EF206FF000
|
heap
|
page read and write
|
||
B9CBAFD000
|
stack
|
page read and write
|
||
7FFAAB4E0000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3D0000
|
trusted library allocation
|
page execute and read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
7FFAAB510000
|
trusted library allocation
|
page read and write
|
||
B86147D000
|
stack
|
page read and write
|
||
7FFAAB450000
|
trusted library allocation
|
page execute and read and write
|
||
2728D881000
|
heap
|
page read and write
|
||
2728D34A000
|
heap
|
page read and write
|
||
7FFAAB760000
|
trusted library allocation
|
page read and write
|
||
1EF206BA000
|
heap
|
page read and write
|
||
28BA7201000
|
heap
|
page read and write
|
||
23203DA0000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
7FFAAB780000
|
trusted library allocation
|
page read and write
|
||
7FFAAB5A2000
|
trusted library allocation
|
page read and write
|
||
2728D840000
|
heap
|
page read and write
|
||
F6624FE000
|
stack
|
page read and write
|
||
2728DC7A000
|
heap
|
page read and write
|
||
2831DAA7000
|
trusted library allocation
|
page read and write
|
||
2256A3A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB520000
|
trusted library allocation
|
page read and write
|
||
B5E90FF000
|
stack
|
page read and write
|
||
2728DCE5000
|
heap
|
page read and write
|
||
7FFAAB312000
|
trusted library allocation
|
page read and write
|
||
1DFF9170000
|
trusted library allocation
|
page read and write
|
||
1FB27400000
|
heap
|
page read and write
|
||
1FB0E8C0000
|
heap
|
page read and write
|
||
1DFF91D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4D0000
|
trusted library allocation
|
page read and write
|
||
98D9C7E000
|
stack
|
page read and write
|
||
7FFAAB4E0000
|
trusted library allocation
|
page read and write
|
||
2831D210000
|
heap
|
page execute and read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
2728DCE5000
|
heap
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
1DFF9170000
|
trusted library allocation
|
page read and write
|
||
1C705187000
|
trusted library allocation
|
page read and write
|
||
28E167C0000
|
heap
|
page read and write
|
||
2728DCE5000
|
heap
|
page read and write
|
||
F66267C000
|
stack
|
page read and write
|
||
7FFAAB510000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB333000
|
trusted library allocation
|
page execute and read and write
|
||
2833556E000
|
heap
|
page read and write
|
||
27544330000
|
trusted library allocation
|
page read and write
|
||
7FF792381000
|
unkown
|
page execute read
|
||
7FFAAB4CD000
|
trusted library allocation
|
page execute and read and write
|
||
22AB82DA000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
1FB1066F000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
23203C50000
|
heap
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
7FFAAB5A0000
|
trusted library allocation
|
page read and write
|
||
1EF2072C000
|
heap
|
page read and write
|
||
7FFAAB4C4000
|
trusted library allocation
|
page execute and read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
1EF207C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB59B000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
2831C57C000
|
heap
|
page read and write
|
||
7FF649391000
|
unkown
|
page execute read
|
||
7FFAAB334000
|
trusted library allocation
|
page read and write
|
||
96F86FE000
|
stack
|
page read and write
|
||
7FFAAB350000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4D5000
|
trusted library allocation
|
page read and write
|
||
1DFF91D0000
|
trusted library allocation
|
page read and write
|
||
1EF20820000
|
trusted library allocation
|
page read and write
|
||
1C7042A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4E9000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
1FB0E650000
|
heap
|
page read and write
|
||
2728DC3C000
|
heap
|
page read and write
|
||
1EF20813000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
28BA8BE1000
|
trusted library allocation
|
page read and write
|
||
7FFAAB750000
|
trusted library allocation
|
page execute and read and write
|
||
2832D319000
|
trusted library allocation
|
page read and write
|
||
7DF48F190000
|
trusted library allocation
|
page execute and read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
28BA72D0000
|
heap
|
page read and write
|
||
7FFAAB5C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4C3000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4C0000
|
trusted library allocation
|
page read and write
|
||
B5E7AEE000
|
stack
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB5D0000
|
trusted library allocation
|
page read and write
|
||
23203DC0000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
2256898B000
|
heap
|
page read and write
|
||
22AB6D27000
|
heap
|
page read and write
|
||
2728DCA2000
|
heap
|
page read and write
|
||
1EF20820000
|
trusted library allocation
|
page read and write
|
||
275426C2000
|
heap
|
page read and write
|
||
2728D82D000
|
heap
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
2832D2A1000
|
trusted library allocation
|
page read and write
|
||
7FFAAB512000
|
trusted library allocation
|
page read and write
|
||
2D8146D0000
|
heap
|
page read and write
|
||
2831EB6A000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
1DFF91C0000
|
heap
|
page execute and read and write
|
||
22ACEF10000
|
heap
|
page read and write
|
||
7FFAAB5D0000
|
trusted library allocation
|
page read and write
|
||
A6E447C000
|
stack
|
page read and write
|
||
7FF649BCF000
|
unkown
|
page write copy
|
||
275426DB000
|
heap
|
page read and write
|
||
1FD08709000
|
heap
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
28BA727C000
|
heap
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB320000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
2831CC60000
|
trusted library allocation
|
page read and write
|
||
1EF205B0000
|
heap
|
page read and write
|
||
2728D8C1000
|
heap
|
page read and write
|
||
7FFAAB4E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB592000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
2728D83D000
|
heap
|
page read and write
|
||
1DFF9170000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3E0000
|
trusted library allocation
|
page execute and read and write
|
||
2728D8AD000
|
heap
|
page read and write
|
||
A6E3FCD000
|
stack
|
page read and write
|
||
98D99EF000
|
stack
|
page read and write
|
||
96F984C000
|
stack
|
page read and write
|
||
22AC7052000
|
trusted library allocation
|
page read and write
|
||
2728D28C000
|
heap
|
page read and write
|
||
1C7065B4000
|
trusted library allocation
|
page read and write
|
||
26035FD000
|
stack
|
page read and write
|
||
1EF20813000
|
trusted library allocation
|
page read and write
|
||
2728D325000
|
heap
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
B860ED3000
|
stack
|
page read and write
|
||
B9CB5CF000
|
stack
|
page read and write
|
||
2831CFD2000
|
heap
|
page read and write
|
||
2728D8C8000
|
heap
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
1C70552C000
|
trusted library allocation
|
page read and write
|
||
B5E82EE000
|
stack
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
275426D7000
|
heap
|
page read and write
|
||
7FFAAB663000
|
trusted library allocation
|
page read and write
|
||
2728DCDD000
|
heap
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
1FB0E8A0000
|
trusted library allocation
|
page read and write
|
||
7FF649BC8000
|
unkown
|
page write copy
|
||
7FFAAB713000
|
trusted library allocation
|
page read and write
|
||
28BA8D70000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4F0000
|
trusted library allocation
|
page execute and read and write
|
||
28335551000
|
heap
|
page read and write
|
||
7FFAAB790000
|
trusted library allocation
|
page read and write
|
||
7FFAAB653000
|
trusted library allocation
|
page read and write
|
||
22D0EE02000
|
heap
|
page read and write
|
||
2831EAE3000
|
trusted library allocation
|
page read and write
|
||
1FB1F574000
|
trusted library allocation
|
page read and write
|
||
260337E000
|
stack
|
page read and write
|
||
7FFAAB502000
|
trusted library allocation
|
page read and write
|
||
2256A240000
|
heap
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4D2000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4EE000
|
trusted library allocation
|
page read and write
|
||
2D816323000
|
trusted library allocation
|
page read and write
|
||
22568980000
|
heap
|
page read and write
|
||
B5E71FE000
|
stack
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
98D9CFE000
|
stack
|
page read and write
|
||
7DF4930D0000
|
trusted library allocation
|
page execute and read and write
|
||
1FB0E6DC000
|
heap
|
page read and write
|
||
1DFF7790000
|
heap
|
page read and write
|
||
7FFAAB5B0000
|
trusted library allocation
|
page read and write
|
||
B5E8FFF000
|
stack
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
7C88DFC000
|
stack
|
page read and write
|
||
2831D256000
|
heap
|
page execute and read and write
|
||
27544320000
|
trusted library allocation
|
page read and write
|
||
7FFAAB540000
|
trusted library allocation
|
page read and write
|
||
7FFAAB430000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB406000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB3F6000
|
trusted library allocation
|
page execute and read and write
|
||
2728DCDC000
|
heap
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
26039FC000
|
stack
|
page read and write
|
||
7FFAAB33B000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4ED000
|
trusted library allocation
|
page execute and read and write
|
||
2251000F000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
96F8B78000
|
stack
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
2831D4C9000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4EA000
|
trusted library allocation
|
page read and write
|
||
283354A0000
|
heap
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
119DAFE000
|
stack
|
page read and write
|
||
7FFAAB550000
|
trusted library allocation
|
page read and write
|
||
22D0F602000
|
trusted library allocation
|
page read and write
|
||
B9CC98C000
|
stack
|
page read and write
|
||
7FFAAB7A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB34B000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
22510009000
|
trusted library allocation
|
page read and write
|
||
22AC7056000
|
trusted library allocation
|
page read and write
|
||
7561E7B000
|
stack
|
page read and write
|
||
2728D30A000
|
heap
|
page read and write
|
||
225688E0000
|
heap
|
page read and write
|
||
28BA8BF0000
|
heap
|
page read and write
|
||
2728D827000
|
heap
|
page read and write
|
||
7FFAAB5F0000
|
trusted library allocation
|
page read and write
|
||
1EF20830000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
2D826409000
|
trusted library allocation
|
page read and write
|
||
22AB5FE6000
|
heap
|
page read and write
|
||
28BA8D90000
|
trusted library allocation
|
page read and write
|
||
119DD7C000
|
stack
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
7FFAAB730000
|
trusted library allocation
|
page read and write
|
||
22AB6170000
|
heap
|
page read and write
|
||
283353A0000
|
heap
|
page read and write
|
||
B86153F000
|
stack
|
page read and write
|
||
23203D80000
|
trusted library allocation
|
page read and write
|
||
2728DCD6000
|
heap
|
page read and write
|
||
2831C580000
|
heap
|
page read and write
|
||
7FFAAB4E0000
|
trusted library allocation
|
page read and write
|
||
1FB10E91000
|
trusted library allocation
|
page read and write
|
||
1C706567000
|
trusted library allocation
|
page read and write
|
||
1EF207D0000
|
heap
|
page readonly
|
||
28BA8DEE000
|
trusted library allocation
|
page read and write
|
||
7561D7F000
|
stack
|
page read and write
|
||
2728D857000
|
heap
|
page read and write
|
||
28BA8DA0000
|
trusted library allocation
|
page read and write
|
||
27544210000
|
trusted library allocation
|
page read and write
|
||
1FD086EC000
|
heap
|
page read and write
|
||
2831C59C000
|
heap
|
page read and write
|
||
2256A390000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3D0000
|
trusted library allocation
|
page execute and read and write
|
||
2728DC30000
|
heap
|
page read and write
|
||
28BA71D8000
|
heap
|
page read and write
|
||
2728D8C6000
|
heap
|
page read and write
|
||
7FFAAB3D6000
|
trusted library allocation
|
page read and write
|
||
1FD08766000
|
heap
|
page read and write
|
||
22AB815A000
|
trusted library allocation
|
page read and write
|
||
B9CBC38000
|
stack
|
page read and write
|
||
28BA8BD0000
|
heap
|
page read and write
|
||
7FFAAB340000
|
trusted library allocation
|
page read and write
|
||
8E85A7E000
|
stack
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
1EF206F5000
|
heap
|
page read and write
|
||
7FFAAB776000
|
trusted library allocation
|
page read and write
|
||
1C71CD9D000
|
heap
|
page read and write
|
||
260387F000
|
stack
|
page read and write
|
||
1EF22170000
|
heap
|
page read and write
|
||
1DFF9143000
|
trusted library allocation
|
page read and write
|
||
2728DCB2000
|
heap
|
page read and write
|
||
1C704810000
|
heap
|
page read and write
|
||
2D816350000
|
trusted library allocation
|
page read and write
|
||
23203F70000
|
heap
|
page execute and read and write
|
||
1FD08790000
|
heap
|
page read and write
|
||
2728D881000
|
heap
|
page read and write
|
||
7FFAAB660000
|
trusted library allocation
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
2832D58C000
|
trusted library allocation
|
page read and write
|
||
2831E609000
|
trusted library allocation
|
page read and write
|
||
1DFF7658000
|
heap
|
page read and write
|
||
7FFAAB334000
|
trusted library allocation
|
page read and write
|
||
1DFF9170000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4EA000
|
trusted library allocation
|
page read and write
|
||
2728D8B6000
|
heap
|
page read and write
|
||
1EF20830000
|
trusted library allocation
|
page read and write
|
||
2603579000
|
stack
|
page read and write
|
||
27544330000
|
trusted library allocation
|
page read and write
|
||
1DFF7630000
|
heap
|
page read and write
|
||
7FFAAB426000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB4ED000
|
trusted library allocation
|
page execute and read and write
|
||
2728D8A8000
|
heap
|
page read and write
|
||
2D814768000
|
heap
|
page read and write
|
||
7FFAAB5C2000
|
trusted library allocation
|
page read and write
|
||
1C704D10000
|
heap
|
page execute and read and write
|
||
1DFF9170000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
2754276C000
|
heap
|
page read and write
|
||
1EF22130000
|
heap
|
page execute and read and write
|
||
232021A0000
|
heap
|
page read and write
|
||
2D816370000
|
trusted library allocation
|
page read and write
|
||
2728DC65000
|
heap
|
page read and write
|
||
7FFAAB550000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
2D816350000
|
trusted library allocation
|
page read and write
|
||
7FFAAB684000
|
trusted library allocation
|
page read and write
|
||
7DF49FD10000
|
trusted library allocation
|
page execute and read and write
|
||
B5E79FF000
|
stack
|
page read and write
|
||
26034FF000
|
stack
|
page read and write
|
||
2D816360000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
7FFAAB592000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
CEED3FE000
|
stack
|
page read and write
|
||
23203C40000
|
trusted library allocation
|
page read and write
|
||
27544320000
|
trusted library allocation
|
page read and write
|
||
27544280000
|
trusted library allocation
|
page read and write
|
||
2728D730000
|
remote allocation
|
page read and write
|
||
7FFAAB653000
|
trusted library allocation
|
page read and write
|
||
119DBFF000
|
stack
|
page read and write
|
||
1DFF7704000
|
heap
|
page read and write
|
||
7FFAAB32D000
|
trusted library allocation
|
page execute and read and write
|
||
28BA70D0000
|
heap
|
page read and write
|
||
7FFAAB682000
|
trusted library allocation
|
page read and write
|
||
1C714D41000
|
trusted library allocation
|
page read and write
|
||
7FFAAB71A000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4D4000
|
trusted library allocation
|
page execute and read and write
|
||
1FB0E69E000
|
heap
|
page read and write
|
||
2728D87F000
|
heap
|
page read and write
|
||
23203DB0000
|
trusted library allocation
|
page read and write
|
||
27544233000
|
heap
|
page read and write
|
||
B5E7CF2000
|
stack
|
page read and write
|
||
1C7065FB000
|
trusted library allocation
|
page read and write
|
||
22AB6CE4000
|
heap
|
page read and write
|
||
7FFAAB4F0000
|
trusted library allocation
|
page read and write
|
||
2256A301000
|
trusted library allocation
|
page read and write
|
||
7DF449BA0000
|
trusted library allocation
|
page execute and read and write
|
||
1FB0F714000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
B5E6DFF000
|
stack
|
page read and write
|
||
7DF48F1A0000
|
trusted library allocation
|
page execute and read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
2728D8DF000
|
heap
|
page read and write
|
||
1FD087E0000
|
heap
|
page read and write
|
||
27544313000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
1C71CD4F000
|
heap
|
page read and write
|
||
1FD086D0000
|
remote allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB530000
|
trusted library allocation
|
page read and write
|
||
23202102000
|
heap
|
page read and write
|
||
1FB0F0E0000
|
heap
|
page read and write
|
||
7FFAAB570000
|
trusted library allocation
|
page read and write
|
||
2728DC35000
|
heap
|
page read and write
|
||
2256A246000
|
heap
|
page read and write
|
||
22AC6D80000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3F6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB34D000
|
trusted library allocation
|
page execute and read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
2D816350000
|
trusted library allocation
|
page read and write
|
||
2728DC99000
|
heap
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
1C71D048000
|
heap
|
page read and write
|
||
2256A3B0000
|
heap
|
page execute and read and write
|
||
2D8147DE000
|
heap
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
2728DCC2000
|
heap
|
page read and write
|
||
B86137E000
|
stack
|
page read and write
|
||
1C7042C5000
|
heap
|
page read and write
|
||
7FFAAB313000
|
trusted library allocation
|
page execute and read and write
|
||
27544220000
|
heap
|
page read and write
|
||
7FFB23B05000
|
unkown
|
page readonly
|
||
2831C4F0000
|
heap
|
page read and write
|
||
7FFAAB3E0000
|
trusted library allocation
|
page execute and read and write
|
||
1C71CE20000
|
trusted library allocation
|
page read and write
|
||
28BA73B0000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
7FFAAB5BB000
|
trusted library allocation
|
page read and write
|
||
28BA8D80000
|
trusted library allocation
|
page read and write
|
||
CEECEFD000
|
stack
|
page read and write
|
||
7FFAAB59B000
|
trusted library allocation
|
page read and write
|
||
2831D71D000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4D6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB4C6000
|
trusted library allocation
|
page execute and read and write
|
||
28BA8D90000
|
trusted library allocation
|
page read and write
|
||
2728D827000
|
heap
|
page read and write
|
||
7FFAAB502000
|
trusted library allocation
|
page read and write
|
||
2728D817000
|
heap
|
page read and write
|
||
1FB10B4A000
|
trusted library allocation
|
page read and write
|
||
28BA8D90000
|
trusted library allocation
|
page read and write
|
||
28BA8DC0000
|
heap
|
page read and write
|
||
2831D290000
|
heap
|
page execute and read and write
|
||
2256A390000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4E3000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
1DFF9090000
|
heap
|
page readonly
|
||
1FD0870F000
|
heap
|
page read and write
|
||
7FFAAB689000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4E2000
|
trusted library allocation
|
page read and write
|
||
7FFAAB692000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
7FFAAB560000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3EC000
|
trusted library allocation
|
page execute and read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
1C714D21000
|
trusted library allocation
|
page read and write
|
||
1FB105EB000
|
trusted library allocation
|
page read and write
|
||
2831C830000
|
trusted library allocation
|
page read and write
|
||
7FF792557000
|
unkown
|
page readonly
|
||
23203C66000
|
heap
|
page read and write
|
||
225689BB000
|
heap
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
1FB272B5000
|
heap
|
page read and write
|
||
7FFAAB688000
|
trusted library allocation
|
page read and write
|
||
22AB6D1B000
|
heap
|
page read and write
|
||
22AB80DB000
|
trusted library allocation
|
page read and write
|
||
1DFF9170000
|
trusted library allocation
|
page read and write
|
||
22AB6D71000
|
trusted library allocation
|
page read and write
|
||
1FB27329000
|
heap
|
page read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
1FD0873D000
|
heap
|
page read and write
|
||
7FFAAB530000
|
trusted library allocation
|
page read and write
|
||
1DFF9170000
|
trusted library allocation
|
page read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
2D816350000
|
trusted library allocation
|
page read and write
|
||
23202030000
|
heap
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
27544340000
|
trusted library allocation
|
page read and write
|
||
26037F9000
|
stack
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
28BA8D70000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
1FD08790000
|
heap
|
page read and write
|
||
27544330000
|
trusted library allocation
|
page read and write
|
||
CEED0FF000
|
stack
|
page read and write
|
||
7FFAAB406000
|
trusted library allocation
|
page execute and read and write
|
||
1FB0E690000
|
heap
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
7FF792699000
|
unkown
|
page read and write
|
||
28BA8DEB000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3D6000
|
trusted library allocation
|
page read and write
|
||
7FFAAB33D000
|
trusted library allocation
|
page execute and read and write
|
||
28BA721A000
|
heap
|
page read and write
|
||
E409E7E000
|
stack
|
page read and write
|
||
7DF48E810000
|
trusted library allocation
|
page execute and read and write
|
||
7DF4F20A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB4C2000
|
trusted library allocation
|
page read and write
|
||
22AB6C6F000
|
heap
|
page read and write
|
||
1FB27337000
|
heap
|
page read and write
|
||
22AB66D0000
|
trusted library allocation
|
page read and write
|
||
2833536F000
|
heap
|
page read and write
|
||
7DF4AE350000
|
trusted library allocation
|
page execute and read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
2728DC7B000
|
heap
|
page read and write
|
||
2602FFE000
|
stack
|
page read and write
|
||
2256A390000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
2831D2A1000
|
trusted library allocation
|
page read and write
|
||
2256A2C0000
|
trusted library allocation
|
page read and write
|
||
96F8C7F000
|
stack
|
page read and write
|
||
225689A7000
|
heap
|
page read and write
|
||
1EF20820000
|
trusted library allocation
|
page read and write
|
||
22ACEFE6000
|
heap
|
page read and write
|
||
7C88D7D000
|
stack
|
page read and write
|
||
28BA7247000
|
heap
|
page read and write
|
||
7DF4AE330000
|
trusted library allocation
|
page execute and read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
28BA71B0000
|
heap
|
page read and write
|
||
2728D8AF000
|
heap
|
page read and write
|
||
1DFF76D1000
|
heap
|
page read and write
|
||
7FFAAB5E0000
|
trusted library allocation
|
page read and write
|
||
22ACEE00000
|
heap
|
page read and write
|
||
7FFAAB342000
|
trusted library allocation
|
page read and write
|
||
7FFAAB322000
|
trusted library allocation
|
page read and write
|
||
22ACEF89000
|
heap
|
page read and write
|
||
26043CE000
|
stack
|
page read and write
|
||
22ACEF5C000
|
heap
|
page read and write
|
||
2831C57E000
|
heap
|
page read and write
|
||
2D814730000
|
heap
|
page read and write
|
||
7C888A3000
|
stack
|
page read and write
|
||
2256A3A0000
|
trusted library allocation
|
page read and write
|
||
22AB8985000
|
trusted library allocation
|
page read and write
|
||
7FFAAB720000
|
trusted library allocation
|
page read and write
|
||
1C704B66000
|
heap
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
27544320000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
1FB10AEF000
|
trusted library allocation
|
page read and write
|
||
B9CBE39000
|
stack
|
page read and write
|
||
7FFAAB5A8000
|
trusted library allocation
|
page read and write
|
||
7FFAAB504000
|
trusted library allocation
|
page read and write
|
||
7FFAAB5A1000
|
trusted library allocation
|
page read and write
|
||
2D8149E0000
|
heap
|
page readonly
|
||
28BA8D73000
|
trusted library allocation
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
7FFAAB600000
|
trusted library allocation
|
page read and write
|
||
2728D837000
|
heap
|
page read and write
|
||
2728D83C000
|
heap
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
1C704815000
|
heap
|
page read and write
|
||
28BA8D80000
|
trusted library allocation
|
page read and write
|
||
1DFF74D0000
|
heap
|
page read and write
|
||
225689B2000
|
heap
|
page read and write
|
||
7FF649BD4000
|
unkown
|
page readonly
|
||
28E16830000
|
heap
|
page read and write
|
||
22ACEF00000
|
heap
|
page execute and read and write
|
||
7FFAAB514000
|
trusted library allocation
|
page read and write
|
||
7FFAAB560000
|
trusted library allocation
|
page read and write
|
||
1FB1F28F000
|
trusted library allocation
|
page read and write
|
||
2831C540000
|
heap
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
7FFAAB695000
|
trusted library allocation
|
page read and write
|
||
7FFAAB580000
|
trusted library allocation
|
page read and write
|
||
7FFAAB406000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB519000
|
trusted library allocation
|
page read and write
|
||
2728DCC2000
|
heap
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
23203B40000
|
heap
|
page read and write
|
||
F66257E000
|
stack
|
page read and write
|
||
96F8CFE000
|
stack
|
page read and write
|
||
7FFAAB5B1000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
7C889AE000
|
stack
|
page read and write
|
||
7FF79269C000
|
unkown
|
page readonly
|
||
2728DCA4000
|
heap
|
page read and write
|
||
23202194000
|
heap
|
page read and write
|
||
2728DC65000
|
heap
|
page read and write
|
||
2833553D000
|
heap
|
page read and write
|
||
225689C7000
|
heap
|
page read and write
|
||
7FFAAB355000
|
trusted library allocation
|
page read and write
|
||
26044CE000
|
stack
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
7DF4930F0000
|
trusted library allocation
|
page execute and read and write
|
||
283354FD000
|
heap
|
page read and write
|
||
756207E000
|
stack
|
page read and write
|
||
96F839E000
|
stack
|
page read and write
|
||
1FD0876D000
|
heap
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
27544313000
|
trusted library allocation
|
page read and write
|
||
28BA8BD5000
|
heap
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
7FFAAB790000
|
trusted library allocation
|
page read and write
|
||
1C71CF20000
|
heap
|
page read and write
|
||
7FFAAB332000
|
trusted library allocation
|
page read and write
|
||
7FFAAB500000
|
trusted library allocation
|
page read and write
|
||
2728DCB3000
|
heap
|
page read and write
|
||
7FFAAB500000
|
trusted library allocation
|
page read and write
|
||
7FFAAB5C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB5BB000
|
trusted library allocation
|
page read and write
|
||
2728D35A000
|
heap
|
page read and write
|
||
2728D8B5000
|
heap
|
page read and write
|
||
7FFAAB630000
|
trusted library allocation
|
page read and write
|
||
232020D0000
|
heap
|
page read and write
|
||
7FFB23AE0000
|
unkown
|
page readonly
|
||
7FFAAB5B0000
|
trusted library allocation
|
page read and write
|
||
2728D815000
|
heap
|
page read and write
|
||
1C706939000
|
trusted library allocation
|
page read and write
|
||
2832D58A000
|
trusted library allocation
|
page read and write
|
||
1EF2068B000
|
heap
|
page read and write
|
||
1EF20813000
|
trusted library allocation
|
page read and write
|
||
7FFAAB580000
|
trusted library allocation
|
page read and write
|
||
2256A390000
|
trusted library allocation
|
page read and write
|
||
96F974E000
|
stack
|
page read and write
|
||
7DF42DF00000
|
trusted library allocation
|
page execute and read and write
|
||
1EF20820000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
7FFAAB324000
|
trusted library allocation
|
page read and write
|
||
7DF4AE340000
|
trusted library allocation
|
page execute and read and write
|
||
22AB6A8C000
|
heap
|
page read and write
|
||
1EF20820000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
2728D8AF000
|
heap
|
page read and write
|
||
1FD0870F000
|
heap
|
page read and write
|
||
2728D7F3000
|
heap
|
page read and write
|
||
27544313000
|
trusted library allocation
|
page read and write
|
||
22ACEEE0000
|
heap
|
page execute and read and write
|
||
23203F90000
|
heap
|
page execute and read and write
|
||
7FFAAB33D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB322000
|
trusted library allocation
|
page read and write
|
||
1C71D036000
|
heap
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
B9CCA89000
|
stack
|
page read and write
|
||
98D9DFC000
|
stack
|
page read and write
|
||
1DFF76DC000
|
heap
|
page read and write
|
||
1FB0F270000
|
heap
|
page execute and read and write
|
||
2728DC84000
|
heap
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
2833555D000
|
heap
|
page read and write
|
||
7FFAAB520000
|
trusted library allocation
|
page execute and read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
1EF20650000
|
heap
|
page read and write
|
||
7FFAAB500000
|
trusted library allocation
|
page read and write
|
||
B5E82EC000
|
stack
|
page read and write
|
||
2831C58A000
|
heap
|
page read and write
|
||
7FFAAB610000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
275426CC000
|
heap
|
page read and write
|
||
275441D0000
|
heap
|
page read and write
|
||
2D8146C0000
|
heap
|
page read and write
|
||
B5E7EEC000
|
stack
|
page read and write
|
||
1EF206F7000
|
heap
|
page read and write
|
||
1EF20820000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
1C71CD20000
|
heap
|
page read and write
|
||
7561C7F000
|
stack
|
page read and write
|
||
A6E3F43000
|
stack
|
page read and write
|
||
1C704115000
|
heap
|
page read and write
|
||
7FFAAB692000
|
trusted library allocation
|
page read and write
|
||
2D816360000
|
trusted library allocation
|
page read and write
|
||
7FFAAB756000
|
trusted library allocation
|
page read and write
|
||
2728D369000
|
heap
|
page read and write
|
||
7FFAAB416000
|
trusted library allocation
|
page execute and read and write
|
||
2603677000
|
stack
|
page read and write
|
||
275543E1000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
28BA7217000
|
heap
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
1DFF9160000
|
trusted library allocation
|
page read and write
|
||
7FFAAB760000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
28BA8DA0000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
1DFF9160000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
1DFF9173000
|
trusted library allocation
|
page read and write
|
||
7FFAAB580000
|
trusted library allocation
|
page read and write
|
||
28BA8DB0000
|
heap
|
page execute and read and write
|
||
2831CC20000
|
trusted library allocation
|
page read and write
|
||
2728DCE5000
|
heap
|
page read and write
|
||
1C704670000
|
heap
|
page readonly
|
||
7FFAAB355000
|
trusted library allocation
|
page read and write
|
||
28BA8CFB000
|
heap
|
page read and write
|
||
B9CBCB9000
|
stack
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
7FFAAB406000
|
trusted library allocation
|
page execute and read and write
|
||
1C71CEF6000
|
heap
|
page execute and read and write
|
||
22AC6DE5000
|
trusted library allocation
|
page read and write
|
||
7FFAAB400000
|
trusted library allocation
|
page execute and read and write
|
||
2D816360000
|
trusted library allocation
|
page read and write
|
||
B8616B8000
|
stack
|
page read and write
|
||
1EF208B5000
|
heap
|
page read and write
|
||
7FFAAB510000
|
trusted library allocation
|
page execute and read and write
|
||
28BA8D90000
|
trusted library allocation
|
page read and write
|
||
2D816360000
|
trusted library allocation
|
page read and write
|
||
7FFAAB416000
|
trusted library allocation
|
page execute and read and write
|
||
B9CBEBE000
|
stack
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
27544320000
|
trusted library allocation
|
page read and write
|
||
28BA7202000
|
heap
|
page read and write
|
||
7FFAAB650000
|
trusted library allocation
|
page read and write
|
||
B8612F9000
|
stack
|
page read and write
|
||
27544320000
|
trusted library allocation
|
page read and write
|
||
7FFAAB640000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
7FFAAB343000
|
trusted library allocation
|
page execute and read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
1FB27531000
|
heap
|
page read and write
|
||
1C70553A000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
7FFAAB698000
|
trusted library allocation
|
page read and write
|
||
7FFAAB790000
|
trusted library allocation
|
page read and write
|
||
1FD086E0000
|
heap
|
page read and write
|
||
275543E9000
|
trusted library allocation
|
page read and write
|
||
28BB8DD1000
|
trusted library allocation
|
page read and write
|
||
7FFAAB560000
|
trusted library allocation
|
page read and write
|
||
1FD08717000
|
heap
|
page read and write
|
||
2728D8D0000
|
heap
|
page read and write
|
||
2320216F000
|
heap
|
page read and write
|
||
1EF208B0000
|
heap
|
page read and write
|
||
7FFAAB5D0000
|
trusted library allocation
|
page read and write
|
||
CEECFFF000
|
stack
|
page read and write
|
||
2728DCE7000
|
heap
|
page read and write
|
||
7FF649390000
|
unkown
|
page readonly
|
||
7FFAAB4E0000
|
trusted library allocation
|
page execute and read and write
|
||
22AB66A0000
|
trusted library allocation
|
page read and write
|
||
27544320000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4E1000
|
trusted library allocation
|
page read and write
|
||
1DFF9170000
|
trusted library allocation
|
page read and write
|
||
28BA7209000
|
heap
|
page read and write
|
||
2D8163D0000
|
heap
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
7FFAAB591000
|
trusted library allocation
|
page read and write
|
||
119DC7E000
|
stack
|
page read and write
|
||
7561E7F000
|
stack
|
page read and write
|
||
28BA7245000
|
heap
|
page read and write
|
||
7FFAAB450000
|
trusted library allocation
|
page execute and read and write
|
||
1DF90001000
|
trusted library allocation
|
page read and write
|
||
7FFAAB312000
|
trusted library allocation
|
page read and write
|
||
23203D91000
|
trusted library allocation
|
page read and write
|
||
1EF20820000
|
trusted library allocation
|
page read and write
|
||
7FFAAB786000
|
trusted library allocation
|
page read and write
|
||
7FFAAB340000
|
trusted library allocation
|
page read and write
|
||
2728D8DF000
|
heap
|
page read and write
|
||
7FFAAB4E8000
|
trusted library allocation
|
page execute and read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
2728D8CF000
|
heap
|
page read and write
|
||
7FFAAB334000
|
trusted library allocation
|
page read and write
|
||
96F83DE000
|
stack
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
2728D824000
|
heap
|
page read and write
|
||
7FFAAB3EC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB324000
|
trusted library allocation
|
page read and write
|
||
96F8BFE000
|
stack
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
1C704118000
|
heap
|
page read and write
|
||
7FFAAB5F0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3F0000
|
trusted library allocation
|
page execute and read and write
|
||
1C7065EE000
|
trusted library allocation
|
page read and write
|
||
1FB0E6B0000
|
heap
|
page read and write
|
||
7FFAAB4F0000
|
trusted library allocation
|
page read and write
|
||
7FF792698000
|
unkown
|
page write copy
|
||
260347A000
|
stack
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
2D814960000
|
heap
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
2831C845000
|
heap
|
page read and write
|
||
2D814A00000
|
trusted library allocation
|
page read and write
|
||
1C7040D4000
|
heap
|
page read and write
|
||
1DFF9170000
|
trusted library allocation
|
page read and write
|
||
27544270000
|
trusted library allocation
|
page read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
7FFAAB68A000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB5B4000
|
trusted library allocation
|
page read and write
|
||
7FFAAB663000
|
trusted library allocation
|
page read and write
|
||
28BA8BA0000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4F9000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
1C714D8C000
|
trusted library allocation
|
page read and write
|
||
2728D881000
|
heap
|
page read and write
|
||
7FFAAB620000
|
trusted library allocation
|
page read and write
|
||
7DF449B90000
|
trusted library allocation
|
page execute and read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
7FFAAB5A0000
|
trusted library allocation
|
page read and write
|
||
96F8DFE000
|
stack
|
page read and write
|
||
27544330000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
7FFAAB72C000
|
trusted library allocation
|
page read and write
|
||
1FB274E0000
|
heap
|
page read and write
|
||
22AB873C000
|
trusted library allocation
|
page read and write
|
||
2728D82D000
|
heap
|
page read and write
|
||
1C7040EC000
|
heap
|
page read and write
|
||
1FB2734D000
|
heap
|
page read and write
|
||
2D816350000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
2831CBE0000
|
heap
|
page readonly
|
||
1FB273C0000
|
trusted library allocation
|
page read and write
|
||
26038FE000
|
stack
|
page read and write
|
||
7FFAAB4DA000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
1FB0E696000
|
heap
|
page read and write
|
||
7FFAAB4F0000
|
trusted library allocation
|
page read and write
|
||
1C71CD74000
|
heap
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
22AB88BC000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4C5000
|
trusted library allocation
|
page read and write
|
||
1EF204D0000
|
heap
|
page read and write
|
||
28BC1260000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4D2000
|
trusted library allocation
|
page read and write
|
||
275428C5000
|
heap
|
page read and write
|
||
7FFAAB4B0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB332000
|
trusted library allocation
|
page read and write
|
||
7DF42D8B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB4C0000
|
trusted library allocation
|
page read and write
|
||
2728DCE9000
|
heap
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3F0000
|
trusted library allocation
|
page read and write
|
||
22510001000
|
trusted library allocation
|
page read and write
|
||
28BA8DD1000
|
trusted library allocation
|
page read and write
|
||
2728D710000
|
heap
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
1EF2073A000
|
heap
|
page read and write
|
||
1C706593000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
2831EEB0000
|
trusted library allocation
|
page read and write
|
||
1EF208A0000
|
trusted library allocation
|
page read and write
|
||
2D816350000
|
trusted library allocation
|
page read and write
|
||
7DF48E820000
|
trusted library allocation
|
page execute and read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
2D816350000
|
trusted library allocation
|
page read and write
|
||
B86228E000
|
stack
|
page read and write
|
||
7FFAAB640000
|
trusted library allocation
|
page read and write
|
||
8E8576C000
|
stack
|
page read and write
|
||
119DCFD000
|
stack
|
page read and write
|
||
23203DA0000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
7FFAAB440000
|
trusted library allocation
|
page execute and read and write
|
||
A6E427E000
|
stack
|
page read and write
|
||
2728DCE5000
|
heap
|
page read and write
|
||
23203B50000
|
heap
|
page read and write
|
||
2728DCE5000
|
heap
|
page read and write
|
||
2831C5C8000
|
heap
|
page read and write
|
||
2728DCAE000
|
heap
|
page read and write
|
||
2831CC85000
|
heap
|
page read and write
|
||
1C704D9A000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4EE000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
1FB0F307000
|
trusted library allocation
|
page read and write
|
||
7FFAAB582000
|
trusted library allocation
|
page read and write
|
||
1DFF9205000
|
heap
|
page read and write
|
||
7FFAAB4B0000
|
trusted library allocation
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4D1000
|
trusted library allocation
|
page read and write
|
||
2728D7E5000
|
heap
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
27544320000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3E0000
|
trusted library allocation
|
page read and write
|
||
23203DB0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4D6000
|
trusted library allocation
|
page execute and read and write
|
||
22AB6730000
|
heap
|
page read and write
|
||
1FB0E6D8000
|
heap
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
2728D8B9000
|
heap
|
page read and write
|
||
B9CBBBE000
|
stack
|
page read and write
|
||
283354C0000
|
heap
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
2728D8D8000
|
heap
|
page read and write
|
||
B5E73FF000
|
stack
|
page read and write
|
||
2728D817000
|
heap
|
page read and write
|
||
1C70686F000
|
trusted library allocation
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
225689B8000
|
heap
|
page read and write
|
||
7FFAAB540000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
2831EB0F000
|
trusted library allocation
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
2256A810000
|
trusted library allocation
|
page read and write
|
||
96F87FA000
|
stack
|
page read and write
|
||
1EF3A7C0000
|
heap
|
page execute and read and write
|
||
23203DB0000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB550000
|
trusted library allocation
|
page read and write
|
||
2D8149C0000
|
heap
|
page read and write
|
||
2728DC65000
|
heap
|
page read and write
|
||
1FB10589000
|
trusted library allocation
|
page read and write
|
||
28BA8D60000
|
trusted library allocation
|
page read and write
|
||
1C704730000
|
heap
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
27542704000
|
heap
|
page read and write
|
||
7FFAAB590000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
1FB10E95000
|
trusted library allocation
|
page read and write
|
||
1C71CD76000
|
heap
|
page read and write
|
||
1DF80001000
|
trusted library allocation
|
page read and write
|
||
7FFAAB584000
|
trusted library allocation
|
page read and write
|
||
23203DB0000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4D0000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB520000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB680000
|
trusted library allocation
|
page read and write
|
||
27544320000
|
trusted library allocation
|
page read and write
|
||
22AB6660000
|
trusted library allocation
|
page read and write
|
||
28E16841000
|
heap
|
page read and write
|
||
7FFAAB5AA000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
2D81477C000
|
heap
|
page read and write
|
||
28335579000
|
heap
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
2D816350000
|
trusted library allocation
|
page read and write
|
||
7FF64993A000
|
unkown
|
page readonly
|
||
2256A810000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
B5E88FE000
|
stack
|
page read and write
|
||
7FFAAB674000
|
trusted library allocation
|
page read and write
|
||
2256A2E0000
|
trusted library allocation
|
page read and write
|
||
22D0EE00000
|
heap
|
page read and write
|
||
275441C5000
|
heap
|
page read and write
|
||
1EF206A6000
|
heap
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
1FB10667000
|
trusted library allocation
|
page read and write
|
||
7FF64993A000
|
unkown
|
page readonly
|
||
1FB2736B000
|
heap
|
page read and write
|
||
22AB71E1000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4E4000
|
trusted library allocation
|
page execute and read and write
|
||
1FB10172000
|
trusted library allocation
|
page read and write
|
||
2728D730000
|
remote allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
2D816350000
|
trusted library allocation
|
page read and write
|
||
B9CBA7B000
|
stack
|
page read and write
|
||
23203DE0000
|
heap
|
page read and write
|
||
23202164000
|
heap
|
page read and write
|
||
22D0F570000
|
remote allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4F0000
|
trusted library allocation
|
page execute and read and write
|
||
1DFF76A9000
|
heap
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
1FB275AD000
|
heap
|
page read and write
|
||
7FFAAB34D000
|
trusted library allocation
|
page execute and read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4B3000
|
trusted library allocation
|
page read and write
|
||
260377C000
|
stack
|
page read and write
|
||
1DFF90A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB31D000
|
trusted library allocation
|
page execute and read and write
|
||
1EF205D0000
|
heap
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
2D8164B0000
|
heap
|
page read and write
|
||
7C88C7E000
|
stack
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
22AB6280000
|
heap
|
page read and write
|
||
23202430000
|
heap
|
page read and write
|
||
27542880000
|
heap
|
page read and write
|
||
2728DCB0000
|
heap
|
page read and write
|
||
1EF20820000
|
trusted library allocation
|
page read and write
|
||
1FB0E69A000
|
heap
|
page read and write
|
||
22AB5FDC000
|
heap
|
page read and write
|
||
2D8147A5000
|
heap
|
page read and write
|
||
1C706934000
|
trusted library allocation
|
page read and write
|
||
2D8149D0000
|
trusted library allocation
|
page read and write
|
||
23203D93000
|
trusted library allocation
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB710000
|
trusted library allocation
|
page read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
1FB0FA95000
|
trusted library allocation
|
page read and write
|
||
7FFAAB5A6000
|
trusted library allocation
|
page read and write
|
||
2D816370000
|
trusted library allocation
|
page read and write
|
||
7FFAAB430000
|
trusted library allocation
|
page execute and read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
7FFAAB344000
|
trusted library allocation
|
page read and write
|
||
7DF4F2080000
|
trusted library allocation
|
page execute and read and write
|
||
1FB272B7000
|
heap
|
page read and write
|
||
7FFAAB4F0000
|
trusted library allocation
|
page execute and read and write
|
||
2728D8C3000
|
heap
|
page read and write
|
||
7FFAAB4E5000
|
trusted library allocation
|
page read and write
|
||
7FFAAB590000
|
trusted library allocation
|
page read and write
|
||
1EF20820000
|
trusted library allocation
|
page read and write
|
||
22AB6DF6000
|
trusted library allocation
|
page read and write
|
||
B86127F000
|
stack
|
page read and write
|
||
98D9D7D000
|
stack
|
page read and write
|
||
283352A0000
|
heap
|
page read and write
|
||
7FF649BC8000
|
unkown
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
7FFAAB32D000
|
trusted library allocation
|
page execute and read and write
|
||
1FB0E820000
|
heap
|
page read and write
|
||
1EF20830000
|
trusted library allocation
|
page read and write
|
||
22D0EE62000
|
heap
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
B5E6CFE000
|
stack
|
page read and write
|
||
7FFAAB4D0000
|
trusted library allocation
|
page read and write
|
||
2D8163F5000
|
heap
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
2728D824000
|
heap
|
page read and write
|
||
2728DCB4000
|
heap
|
page read and write
|
||
1DFF77E5000
|
heap
|
page read and write
|
||
7FFAAB689000
|
trusted library allocation
|
page read and write
|
||
23203D70000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
B9CB8FE000
|
stack
|
page read and write
|
||
28BA8D80000
|
trusted library allocation
|
page read and write
|
||
7FFAAB590000
|
trusted library allocation
|
page read and write
|
||
22500001000
|
trusted library allocation
|
page read and write
|
||
1FB0FA86000
|
trusted library allocation
|
page read and write
|
||
2D816401000
|
trusted library allocation
|
page read and write
|
||
1EF32181000
|
trusted library allocation
|
page read and write
|
||
283354D1000
|
heap
|
page read and write
|
||
2728D824000
|
heap
|
page read and write
|
||
7FFAAB782000
|
trusted library allocation
|
page read and write
|
||
7FFAAB69C000
|
trusted library allocation
|
page read and write
|
||
1C705B26000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
1DFF77C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB620000
|
trusted library allocation
|
page read and write
|
||
28335514000
|
heap
|
page read and write
|
||
7FFAAB584000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB323000
|
trusted library allocation
|
page execute and read and write
|
||
2728D850000
|
heap
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
1C70610E000
|
trusted library allocation
|
page read and write
|
||
7FFAAB460000
|
trusted library allocation
|
page execute and read and write
|
||
1EF22181000
|
trusted library allocation
|
page read and write
|
||
1C704050000
|
heap
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
28BA7272000
|
heap
|
page read and write
|
||
2728D87F000
|
heap
|
page read and write
|
||
7FFAAB4F8000
|
trusted library allocation
|
page execute and read and write
|
||
2728DCE5000
|
heap
|
page read and write
|
||
28BA73D0000
|
heap
|
page read and write
|
||
1DF90009000
|
trusted library allocation
|
page read and write
|
||
7FFAAB68C000
|
trusted library allocation
|
page read and write
|
||
275543EF000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
B86238E000
|
stack
|
page read and write
|
||
28BA720C000
|
heap
|
page read and write
|
||
A6E43FD000
|
stack
|
page read and write
|
||
2256A3A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB5A0000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
7FFAAB780000
|
trusted library allocation
|
page read and write
|
||
1C704F48000
|
trusted library allocation
|
page read and write
|
||
22AB8643000
|
trusted library allocation
|
page read and write
|
||
1C706106000
|
trusted library allocation
|
page read and write
|
||
7DF42DF20000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB500000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB3E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB590000
|
trusted library allocation
|
page read and write
|
||
23203BB0000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
2728D842000
|
heap
|
page read and write
|
||
7FF649BCE000
|
unkown
|
page read and write
|
||
22D0EDC0000
|
heap
|
page read and write
|
||
275426B9000
|
heap
|
page read and write
|
||
27544340000
|
trusted library allocation
|
page read and write
|
||
7FFAAB58A000
|
trusted library allocation
|
page read and write
|
||
7FFAAB598000
|
trusted library allocation
|
page read and write
|
||
1DFF77E0000
|
heap
|
page read and write
|
||
22568955000
|
heap
|
page read and write
|
||
1EF20890000
|
trusted library allocation
|
page read and write
|
||
27544320000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3D6000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
96F867E000
|
stack
|
page read and write
|
||
7FFAAB720000
|
trusted library allocation
|
page read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
1C7042C0000
|
heap
|
page read and write
|
||
2755C3E3000
|
heap
|
page read and write
|
||
7FFAAB69A000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
22ACEF7D000
|
heap
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
23213FAE000
|
trusted library allocation
|
page read and write
|
||
2256A820000
|
trusted library allocation
|
page read and write
|
||
7FF792697000
|
unkown
|
page read and write
|
||
7FFAAB520000
|
trusted library allocation
|
page execute and read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
28BA8B90000
|
heap
|
page readonly
|
||
22AB6D60000
|
heap
|
page execute and read and write
|
||
22AB760E000
|
trusted library allocation
|
page read and write
|
||
7FFAAB640000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
7561F7E000
|
stack
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
2728D8EE000
|
heap
|
page read and write
|
||
7FFAAB540000
|
trusted library allocation
|
page read and write
|
||
1EF20680000
|
heap
|
page read and write
|
||
7FFAAB3D0000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
2D814778000
|
heap
|
page read and write
|
||
2832D2C1000
|
trusted library allocation
|
page read and write
|
||
2728D8DB000
|
heap
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
B9CB97A000
|
stack
|
page read and write
|
||
23202435000
|
heap
|
page read and write
|
||
7FFAAB323000
|
trusted library allocation
|
page execute and read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
2728D80B000
|
heap
|
page read and write
|
||
7FFAAB4F9000
|
trusted library allocation
|
page read and write
|
||
27544260000
|
trusted library allocation
|
page read and write
|
||
2831D31B000
|
trusted library allocation
|
page read and write
|
||
1DFF7770000
|
heap
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
1FD086D0000
|
remote allocation
|
page read and write
|
||
96F8A76000
|
stack
|
page read and write
|
||
F662113000
|
stack
|
page read and write
|
||
1EF207F0000
|
trusted library allocation
|
page read and write
|
||
23203DB0000
|
trusted library allocation
|
page read and write
|
||
B5E8AFC000
|
stack
|
page read and write
|
||
A6E42FE000
|
stack
|
page read and write
|
||
1C705BF3000
|
trusted library allocation
|
page read and write
|
||
1C71D046000
|
heap
|
page read and write
|
||
E409F7C000
|
stack
|
page read and write
|
||
2728D2BD000
|
heap
|
page read and write
|
||
2D8149F0000
|
trusted library allocation
|
page read and write
|
||
2728D8C7000
|
heap
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
7FFAAB416000
|
trusted library allocation
|
page execute and read and write
|
||
1FD0878E000
|
heap
|
page read and write
|
||
7FFAAB570000
|
trusted library allocation
|
page read and write
|
||
7FFAAB344000
|
trusted library allocation
|
page read and write
|
||
1EF20830000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
2754270C000
|
heap
|
page read and write
|
||
2603273000
|
stack
|
page read and write
|
||
1C705181000
|
trusted library allocation
|
page read and write
|
||
2831CC80000
|
heap
|
page read and write
|
||
7FFAAB3E6000
|
trusted library allocation
|
page read and write
|
||
7FFAAB323000
|
trusted library allocation
|
page execute and read and write
|
||
2728D8C2000
|
heap
|
page read and write
|
||
2D816350000
|
trusted library allocation
|
page read and write
|
||
1C71CDDA000
|
heap
|
page read and write
|
||
28BA8BB0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3E6000
|
trusted library allocation
|
page read and write
|
||
23202117000
|
heap
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
7FFAAB32D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB5F0000
|
trusted library allocation
|
page read and write
|
||
2320211B000
|
heap
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
1FB27282000
|
heap
|
page read and write
|
||
28BA8D60000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
7FFAAB69C000
|
trusted library allocation
|
page read and write
|
||
22AB6D84000
|
trusted library allocation
|
page read and write
|
||
7FF792697000
|
unkown
|
page write copy
|
||
2728DCB0000
|
heap
|
page read and write
|
||
E409D7D000
|
stack
|
page read and write
|
||
1DFF91F0000
|
heap
|
page read and write
|
||
2728D8D3000
|
heap
|
page read and write
|
||
2832D594000
|
trusted library allocation
|
page read and write
|
||
28BB8DDE000
|
trusted library allocation
|
page read and write
|
||
28BA8B80000
|
trusted library allocation
|
page read and write
|
||
7FFAAB630000
|
trusted library allocation
|
page read and write
|
||
7FFAAB330000
|
trusted library allocation
|
page read and write
|
||
7FFAAB760000
|
trusted library allocation
|
page execute and read and write
|
||
1FD08710000
|
heap
|
page read and write
|
||
22ACEFAB000
|
heap
|
page read and write
|
||
2728DCB5000
|
heap
|
page read and write
|
||
1DFF90B0000
|
heap
|
page read and write
|
||
1FB0E890000
|
heap
|
page readonly
|
||
7FFAAB750000
|
trusted library allocation
|
page read and write
|
||
B8613FB000
|
stack
|
page read and write
|
||
2728D81E000
|
heap
|
page read and write
|
||
22568900000
|
heap
|
page read and write
|
||
28BA8D70000
|
trusted library allocation
|
page read and write
|
||
1C705CB1000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
22AB5FE8000
|
heap
|
page read and write
|
||
1EF20811000
|
trusted library allocation
|
page read and write
|
||
22AC7071000
|
trusted library allocation
|
page read and write
|
||
2728DCD5000
|
heap
|
page read and write
|
||
B86230C000
|
stack
|
page read and write
|
||
2728DCE5000
|
heap
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
7FFAAB690000
|
trusted library allocation
|
page read and write
|
||
B5E6FFE000
|
stack
|
page read and write
|
||
7FFAAB594000
|
trusted library allocation
|
page read and write
|
||
7FFAAB324000
|
trusted library allocation
|
page read and write
|
||
2D816370000
|
trusted library allocation
|
page read and write
|
||
1C714D98000
|
trusted library allocation
|
page read and write
|
||
F5CBBAF000
|
stack
|
page read and write
|
||
27544433000
|
heap
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
7FFAAB684000
|
trusted library allocation
|
page read and write
|
||
1FB1F281000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
1FB0E692000
|
heap
|
page read and write
|
||
27544240000
|
trusted library allocation
|
page read and write
|
||
2831D100000
|
heap
|
page read and write
|
||
7DF470220000
|
trusted library allocation
|
page execute and read and write
|
||
1FB1F2A1000
|
trusted library allocation
|
page read and write
|
||
1DFF9170000
|
trusted library allocation
|
page read and write
|
||
283354B9000
|
heap
|
page read and write
|
||
7FFAAB400000
|
trusted library allocation
|
page execute and read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
23203BC0000
|
heap
|
page readonly
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB580000
|
trusted library allocation
|
page read and write
|
||
7FF649BCD000
|
unkown
|
page write copy
|
||
2728D8A8000
|
heap
|
page read and write
|
||
1EF20820000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4FE000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
27544320000
|
trusted library allocation
|
page read and write
|
||
2256A280000
|
trusted library allocation
|
page read and write
|
||
2D816350000
|
trusted library allocation
|
page read and write
|
||
2D8146F0000
|
heap
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
27544320000
|
trusted library allocation
|
page read and write
|
||
23202150000
|
heap
|
page read and write
|
||
22AB5FDE000
|
heap
|
page read and write
|
||
7FFAAB680000
|
trusted library allocation
|
page read and write
|
||
E409C72000
|
stack
|
page read and write
|
||
27544330000
|
trusted library allocation
|
page read and write
|
||
7FFAAB343000
|
trusted library allocation
|
page execute and read and write
|
||
26032FD000
|
stack
|
page read and write
|
||
27544330000
|
trusted library allocation
|
page read and write
|
||
2D814738000
|
heap
|
page read and write
|
||
1EF20890000
|
trusted library allocation
|
page read and write
|
||
2755C900000
|
heap
|
page execute and read and write
|
||
7FFAAB5B8000
|
trusted library allocation
|
page read and write
|
||
7DF448CC0000
|
trusted library allocation
|
page execute and read and write
|
||
22AB7238000
|
trusted library allocation
|
page read and write
|
||
7FFAAB33D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB5F0000
|
trusted library allocation
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
2D8147EA000
|
heap
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
28BA71F8000
|
heap
|
page read and write
|
||
1EF207A0000
|
trusted library allocation
|
page read and write
|
||
2728D836000
|
heap
|
page read and write
|
||
B9CBD3E000
|
stack
|
page read and write
|
||
7FFAAB4C4000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB510000
|
trusted library allocation
|
page read and write
|
||
28BA71D0000
|
heap
|
page read and write
|
||
7FFAAB6A0000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
2728D823000
|
heap
|
page read and write
|
||
1EF207E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB72A000
|
trusted library allocation
|
page read and write
|
||
2D8163F0000
|
heap
|
page read and write
|
||
28BA8D73000
|
trusted library allocation
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
7FFAAB33B000
|
trusted library allocation
|
page read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
F66247E000
|
stack
|
page read and write
|
||
2728D315000
|
heap
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
2D816350000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB650000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
1C704260000
|
heap
|
page read and write
|
||
232020D8000
|
heap
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
7FFAAB324000
|
trusted library allocation
|
page read and write
|
||
22D0F570000
|
remote allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
1FD0871D000
|
heap
|
page read and write
|
||
7FFAAB4DD000
|
trusted library allocation
|
page execute and read and write
|
||
1FD08764000
|
heap
|
page read and write
|
||
1EF20813000
|
trusted library allocation
|
page read and write
|
||
2D816333000
|
trusted library allocation
|
page read and write
|
||
1FD08793000
|
heap
|
page read and write
|
||
1FB27380000
|
heap
|
page execute and read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
119DA73000
|
stack
|
page read and write
|
||
7FF792380000
|
unkown
|
page readonly
|
||
232021AE000
|
heap
|
page read and write
|
||
7FFAAB698000
|
trusted library allocation
|
page read and write
|
||
1FD08771000
|
heap
|
page read and write
|
||
28BA8D70000
|
trusted library allocation
|
page read and write
|
||
2728DC31000
|
heap
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
7FFAAB500000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB740000
|
trusted library allocation
|
page read and write
|
||
7FFAAB730000
|
trusted library allocation
|
page read and write
|
||
7FFAAB72C000
|
trusted library allocation
|
page read and write
|
||
1DFF7677000
|
heap
|
page read and write
|
||
1FB0F99A000
|
trusted library allocation
|
page read and write
|
||
7DF42DF10000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB4E0000
|
trusted library allocation
|
page execute and read and write
|
||
23203D93000
|
trusted library allocation
|
page read and write
|
||
1EF2206B000
|
heap
|
page read and write
|
||
2D82E950000
|
heap
|
page execute and read and write
|
||
7DF42D8A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB32D000
|
trusted library allocation
|
page execute and read and write
|
||
1C714D30000
|
trusted library allocation
|
page read and write
|
||
2831C4D0000
|
heap
|
page read and write
|
||
2728D831000
|
heap
|
page read and write
|
||
7DF470230000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB5B0000
|
trusted library allocation
|
page read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
2256A850000
|
heap
|
page execute and read and write
|
||
7561A7B000
|
stack
|
page read and write
|
||
1FD08771000
|
heap
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4BD000
|
trusted library allocation
|
page execute and read and write
|
||
23202106000
|
heap
|
page read and write
|
||
2831C810000
|
trusted library allocation
|
page read and write
|
||
2728D180000
|
heap
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
1DFF75D0000
|
heap
|
page read and write
|
||
7FFAAB314000
|
trusted library allocation
|
page read and write
|
||
2256A3A0000
|
trusted library allocation
|
page read and write
|
||
27544320000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
28BA8D70000
|
trusted library allocation
|
page read and write
|
||
1DFF91D0000
|
trusted library allocation
|
page read and write
|
||
28BA8D70000
|
trusted library allocation
|
page read and write
|
||
1DFF7660000
|
heap
|
page read and write
|
||
7FFAAB770000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
2728D377000
|
heap
|
page read and write
|
||
2256A3A0000
|
trusted library allocation
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
7FFAAB323000
|
trusted library allocation
|
page execute and read and write
|
||
22AB6710000
|
trusted library allocation
|
page read and write
|
||
B9CBF3B000
|
stack
|
page read and write
|
||
B9CBDBE000
|
stack
|
page read and write
|
||
7FFAAB4E9000
|
trusted library allocation
|
page read and write
|
||
2256A310000
|
heap
|
page read and write
|
||
1C70565A000
|
trusted library allocation
|
page read and write
|
||
28BC0DD3000
|
heap
|
page read and write
|
||
7FFB23B00000
|
unkown
|
page read and write
|
||
1C703F50000
|
heap
|
page read and write
|
||
7FFAAB4E0000
|
trusted library allocation
|
page read and write
|
||
1DFF76A5000
|
heap
|
page read and write
|
||
2D816350000
|
trusted library allocation
|
page read and write
|
||
7FFAAB660000
|
trusted library allocation
|
page read and write
|
||
B5E6911000
|
stack
|
page read and write
|
||
1DFF75B0000
|
heap
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
1EF20820000
|
trusted library allocation
|
page read and write
|
||
27544330000
|
trusted library allocation
|
page read and write
|
||
27544320000
|
trusted library allocation
|
page read and write
|
||
1EF20722000
|
heap
|
page read and write
|
||
1FB0E698000
|
heap
|
page read and write
|
||
225689F3000
|
heap
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4F4000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB4DA000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
27544390000
|
trusted library allocation
|
page read and write
|
||
2D816333000
|
trusted library allocation
|
page read and write
|
||
7FFAAB51E000
|
trusted library allocation
|
page read and write
|
||
7FFAAB750000
|
trusted library allocation
|
page execute and read and write
|
||
225689CD000
|
heap
|
page read and write
|
||
2728DCE5000
|
heap
|
page read and write
|
||
1FB273D7000
|
heap
|
page execute and read and write
|
||
7FF649390000
|
unkown
|
page readonly
|
||
B8617BE000
|
stack
|
page read and write
|
||
7FFAAB560000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4BD000
|
trusted library allocation
|
page execute and read and write
|
||
283354A6000
|
heap
|
page read and write
|
||
225689F8000
|
heap
|
page read and write
|
||
1C7040CE000
|
heap
|
page read and write
|
||
1FB10DCB000
|
trusted library allocation
|
page read and write
|
||
1DFF9130000
|
trusted library allocation
|
page read and write
|
||
7DF49FD00000
|
trusted library allocation
|
page execute and read and write
|
||
2728D82D000
|
heap
|
page read and write
|
||
7FFAAB5C2000
|
trusted library allocation
|
page read and write
|
||
28BA8D70000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
2256A446000
|
heap
|
page read and write
|
||
2256A2B0000
|
heap
|
page readonly
|
||
22568A2D000
|
heap
|
page read and write
|
||
275426CB000
|
heap
|
page read and write
|
||
22568950000
|
heap
|
page read and write
|
||
7FFB23B00000
|
unkown
|
page read and write
|
||
7FFAAB620000
|
trusted library allocation
|
page read and write
|
||
1FB27280000
|
heap
|
page read and write
|
||
2D816350000
|
trusted library allocation
|
page read and write
|
||
7FFAAB679000
|
trusted library allocation
|
page read and write
|
||
2D814758000
|
heap
|
page read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4D4000
|
trusted library allocation
|
page execute and read and write
|
||
2754273E000
|
heap
|
page read and write
|
||
2D816333000
|
trusted library allocation
|
page read and write
|
||
28BA724B000
|
heap
|
page read and write
|
||
1DFF9151000
|
trusted library allocation
|
page read and write
|
||
1C715005000
|
trusted library allocation
|
page read and write
|
||
2728D87F000
|
heap
|
page read and write
|
||
7FFAAB688000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
1C71D0E5000
|
heap
|
page read and write
|
||
7FFAAB5B2000
|
trusted library allocation
|
page read and write
|
||
2832D30D000
|
trusted library allocation
|
page read and write
|
||
22AB5FA0000
|
heap
|
page read and write
|
||
7FFAAB314000
|
trusted library allocation
|
page read and write
|
||
B9CCA0E000
|
stack
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
283353C0000
|
heap
|
page read and write
|
||
27544283000
|
trusted library allocation
|
page read and write
|
||
28BA8D90000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB320000
|
trusted library allocation
|
page read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
B5E92FF000
|
stack
|
page read and write
|
||
2D816380000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
1FB1F2F9000
|
trusted library allocation
|
page read and write
|
||
2831D240000
|
trusted library allocation
|
page read and write
|
||
1EF20830000
|
trusted library allocation
|
page read and write
|
||
7FF792380000
|
unkown
|
page readonly
|
||
7FFAAB650000
|
trusted library allocation
|
page read and write
|
||
23203DD0000
|
trusted library allocation
|
page read and write
|
||
23203FA1000
|
trusted library allocation
|
page read and write
|
||
7FFAAB770000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
1DFF91D0000
|
trusted library allocation
|
page read and write
|
||
23213FA9000
|
trusted library allocation
|
page read and write
|
||
2256A315000
|
heap
|
page read and write
|
||
28E16B80000
|
heap
|
page read and write
|
||
2D814A15000
|
heap
|
page read and write
|
||
22D0EE4C000
|
heap
|
page read and write
|
||
2728D8AA000
|
heap
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
7FFAAB5A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB650000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
1C704D21000
|
trusted library allocation
|
page read and write
|
||
7DF470210000
|
trusted library allocation
|
page execute and read and write
|
||
2256A2A0000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
7FFAAB350000
|
trusted library allocation
|
page read and write
|
||
2728D8C5000
|
heap
|
page read and write
|
||
7FFAAB68C000
|
trusted library allocation
|
page read and write
|
||
7FFAAB73C000
|
trusted library allocation
|
page read and write
|
||
CEED4FF000
|
stack
|
page read and write
|
||
2D814761000
|
heap
|
page read and write
|
||
2256A303000
|
trusted library allocation
|
page read and write
|
||
1EF32189000
|
trusted library allocation
|
page read and write
|
||
22AB7712000
|
trusted library allocation
|
page read and write
|
||
7FFAAB440000
|
trusted library allocation
|
page execute and read and write
|
||
2D81476C000
|
heap
|
page read and write
|
||
283354A9000
|
heap
|
page read and write
|
||
2256A3A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB670000
|
trusted library allocation
|
page read and write
|
||
B9CB87E000
|
stack
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
28BC1260000
|
trusted library allocation
|
page read and write
|
||
22AB6C88000
|
heap
|
page read and write
|
||
2728DCE5000
|
heap
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
1FB0F4A8000
|
trusted library allocation
|
page read and write
|
||
7FFAAB740000
|
trusted library allocation
|
page read and write
|
||
2256A3C6000
|
heap
|
page read and write
|
||
22AB6027000
|
heap
|
page read and write
|
||
B5E75FF000
|
stack
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
283352F3000
|
heap
|
page read and write
|
||
119DB7F000
|
stack
|
page read and write
|
||
7FFAAB5A2000
|
trusted library allocation
|
page read and write
|
||
260454C000
|
stack
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
1C705189000
|
trusted library allocation
|
page read and write
|
||
B5E8CFF000
|
stack
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4D8000
|
trusted library allocation
|
page execute and read and write
|
||
1EF20830000
|
trusted library allocation
|
page read and write
|
||
1FB27508000
|
heap
|
page read and write
|
||
7FFAAB5B0000
|
trusted library allocation
|
page read and write
|
||
2728D730000
|
remote allocation
|
page read and write
|
||
1DFF9170000
|
trusted library allocation
|
page read and write
|
||
275441C0000
|
heap
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
7FFAAB530000
|
trusted library allocation
|
page read and write
|
||
28E16838000
|
heap
|
page read and write
|
||
1C7040D6000
|
heap
|
page read and write
|
||
27542680000
|
heap
|
page read and write
|
||
22ACEF5E000
|
heap
|
page read and write
|
||
2728D87F000
|
heap
|
page read and write
|
||
1DFF9140000
|
trusted library allocation
|
page read and write
|
||
2728D2F1000
|
heap
|
page read and write
|
||
7FFAAB5C0000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
1FD088D0000
|
heap
|
page read and write
|
||
2832D2B0000
|
trusted library allocation
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
1FB10AC4000
|
trusted library allocation
|
page read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
23203D83000
|
trusted library allocation
|
page read and write
|
||
22AB6BD0000
|
heap
|
page read and write
|
||
2728D8C8000
|
heap
|
page read and write
|
||
2728DC65000
|
heap
|
page read and write
|
||
7FFAAB4C0000
|
trusted library allocation
|
page read and write
|
||
2831E227000
|
trusted library allocation
|
page read and write
|
||
2728D7E0000
|
heap
|
page read and write
|
||
7FFAAB5E0000
|
trusted library allocation
|
page read and write
|
||
7FFB23AE1000
|
unkown
|
page execute read
|
||
2728DCBE000
|
heap
|
page read and write
|
||
7DF49FD20000
|
trusted library allocation
|
page execute and read and write
|
||
2728D7F8000
|
heap
|
page read and write
|
||
260397E000
|
stack
|
page read and write
|
||
2728D7F0000
|
heap
|
page read and write
|
||
7FFAAB31D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB4F0000
|
trusted library allocation
|
page execute and read and write
|
||
2728D8CA000
|
heap
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
28BA8D80000
|
trusted library allocation
|
page read and write
|
||
B860FDF000
|
stack
|
page read and write
|
||
2728D89C000
|
heap
|
page read and write
|
||
28BA8D70000
|
trusted library allocation
|
page read and write
|
||
22D0F550000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
275443E1000
|
trusted library allocation
|
page read and write
|
||
7FFAAB460000
|
trusted library allocation
|
page execute and read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
2D82E40C000
|
heap
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
22AB6F99000
|
trusted library allocation
|
page read and write
|
||
2320216A000
|
heap
|
page read and write
|
||
1C71CD30000
|
heap
|
page read and write
|
||
260444D000
|
stack
|
page read and write
|
||
28BA8D70000
|
trusted library allocation
|
page read and write
|
||
2728DCBF000
|
heap
|
page read and write
|
||
22AB77DA000
|
trusted library allocation
|
page read and write
|
||
7FFAAB73C000
|
trusted library allocation
|
page read and write
|
||
96F88F9000
|
stack
|
page read and write
|
||
7FFB23B02000
|
unkown
|
page readonly
|
||
22D0F570000
|
remote allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
1C715013000
|
trusted library allocation
|
page read and write
|
||
1C7040DA000
|
heap
|
page read and write
|
||
7FFAAB3DC000
|
trusted library allocation
|
page execute and read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
28BA7360000
|
heap
|
page read and write
|
||
7FFAAB610000
|
trusted library allocation
|
page read and write
|
||
2728DC8E000
|
heap
|
page read and write
|
||
2728DC5D000
|
heap
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
2728D286000
|
heap
|
page read and write
|
||
27544320000
|
trusted library allocation
|
page read and write
|
||
232020F9000
|
heap
|
page read and write
|
||
7FFAAB630000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4E0000
|
trusted library allocation
|
page read and write
|
||
1DFF91E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB580000
|
trusted library allocation
|
page read and write
|
||
1EF206CC000
|
heap
|
page read and write
|
||
2728DCAF000
|
heap
|
page read and write
|
||
7FFAAB760000
|
trusted library allocation
|
page execute and read and write
|
||
28BA8D60000
|
trusted library allocation
|
page read and write
|
||
2728D83D000
|
heap
|
page read and write
|
||
7FFAAB3D0000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
7FF649BD0000
|
unkown
|
page read and write
|
||
CEEC90D000
|
stack
|
page read and write
|
||
1EF3A181000
|
heap
|
page read and write
|
||
1FB27540000
|
heap
|
page read and write
|
||
225689B0000
|
heap
|
page read and write
|
||
7FFAAB600000
|
trusted library allocation
|
page read and write
|
||
22568A22000
|
heap
|
page read and write
|
||
96F8D7B000
|
stack
|
page read and write
|
||
27544320000
|
trusted library allocation
|
page read and write
|
||
B9CBB77000
|
stack
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
96F877E000
|
stack
|
page read and write
|
||
7FFAAB519000
|
trusted library allocation
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
1EF20820000
|
trusted library allocation
|
page read and write
|
||
27542860000
|
heap
|
page read and write
|
||
B5E86FE000
|
stack
|
page read and write
|
||
7FFAAB5A0000
|
trusted library allocation
|
page read and write
|
||
1DFF9170000
|
trusted library allocation
|
page read and write
|
||
22D0EE40000
|
heap
|
page read and write
|
||
2D816333000
|
trusted library allocation
|
page read and write
|
||
2728D881000
|
heap
|
page read and write
|
||
96F97CE000
|
stack
|
page read and write
|
||
23203C55000
|
heap
|
page read and write
|
||
275426C8000
|
heap
|
page read and write
|
||
2256A2E3000
|
trusted library allocation
|
page read and write
|
||
22ACEDE0000
|
heap
|
page read and write
|
||
7FFAAB600000
|
trusted library allocation
|
page read and write
|
||
7C88CFE000
|
stack
|
page read and write
|
||
B9CC90E000
|
stack
|
page read and write
|
||
7FFAAB570000
|
trusted library allocation
|
page read and write
|
||
8E85B7E000
|
stack
|
page read and write
|
||
B862409000
|
stack
|
page read and write
|
||
7FFAAB570000
|
trusted library allocation
|
page read and write
|
||
2320210D000
|
heap
|
page read and write
|
||
2728DC65000
|
heap
|
page read and write
|
||
1FD085F0000
|
heap
|
page read and write
|
||
2D8147D4000
|
heap
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
2728D8C6000
|
heap
|
page read and write
|
||
7FFAAB685000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
22AB8152000
|
trusted library allocation
|
page read and write
|
||
23203DA0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB342000
|
trusted library allocation
|
page read and write
|
||
2728DCD3000
|
heap
|
page read and write
|
||
1EF20830000
|
trusted library allocation
|
page read and write
|
||
7FFAAB7A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB610000
|
trusted library allocation
|
page read and write
|
||
1DFF9170000
|
trusted library allocation
|
page read and write
|
||
2728D8CB000
|
heap
|
page read and write
|
||
7FFAAB330000
|
trusted library allocation
|
page read and write
|
||
7FFAAB5B0000
|
trusted library allocation
|
page read and write
|
||
1FD0876D000
|
heap
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
B8618BC000
|
stack
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
F5CBF7C000
|
stack
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
1C71D08D000
|
heap
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
2831C840000
|
heap
|
page read and write
|
||
2728DCB2000
|
heap
|
page read and write
|
||
27544311000
|
trusted library allocation
|
page read and write
|
||
2D816360000
|
trusted library allocation
|
page read and write
|
||
7FFAAB509000
|
trusted library allocation
|
page read and write
|
||
22AC7060000
|
trusted library allocation
|
page read and write
|
||
7C8892F000
|
stack
|
page read and write
|
||
28E167E0000
|
heap
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
B5E84FE000
|
stack
|
page read and write
|
||
2D816360000
|
trusted library allocation
|
page read and write
|
||
2728D8AC000
|
heap
|
page read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
1EF2226B000
|
heap
|
page read and write
|
||
7FFAAB790000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
B9CB543000
|
stack
|
page read and write
|
||
23203DB0000
|
trusted library allocation
|
page read and write
|
||
7DF4F2090000
|
trusted library allocation
|
page execute and read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4C6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB4E6000
|
trusted library allocation
|
page execute and read and write
|
||
B86183E000
|
stack
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
1DFF767A000
|
heap
|
page read and write
|
||
1FB0E8C5000
|
heap
|
page read and write
|
||
7FFAAB674000
|
trusted library allocation
|
page read and write
|
||
1C704680000
|
trusted library allocation
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
1DFF9153000
|
trusted library allocation
|
page read and write
|
||
283354DB000
|
heap
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
7FF649391000
|
unkown
|
page execute read
|
||
7FFAAB4C5000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
7FFAAB5C0000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
7FFAAB58B000
|
trusted library allocation
|
page read and write
|
||
2831DBD5000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
1DFF9170000
|
trusted library allocation
|
page read and write
|
||
1FB1067E000
|
trusted library allocation
|
page read and write
|
||
23213FA1000
|
trusted library allocation
|
page read and write
|
||
2728D816000
|
heap
|
page read and write
|
||
7FFAAB4F0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB640000
|
trusted library allocation
|
page read and write
|
||
1EF20820000
|
trusted library allocation
|
page read and write
|
||
2256A303000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
26036F8000
|
stack
|
page read and write
|
||
1C704090000
|
heap
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
225689CA000
|
heap
|
page read and write
|
||
F66219E000
|
stack
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
7FFAAB504000
|
trusted library allocation
|
page read and write
|
||
2603A7E000
|
stack
|
page read and write
|
||
1C7046B0000
|
trusted library allocation
|
page read and write
|
||
22AB872E000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
7FFAAB679000
|
trusted library allocation
|
page read and write
|
||
22568800000
|
heap
|
page read and write
|
||
2728D817000
|
heap
|
page read and write
|
||
7FFAAB55F000
|
trusted library allocation
|
page read and write
|
||
7FF79269C000
|
unkown
|
page readonly
|
||
2D816350000
|
trusted library allocation
|
page read and write
|
||
1EF20820000
|
trusted library allocation
|
page read and write
|
||
7FFAAB500000
|
trusted library allocation
|
page execute and read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
2D816350000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
2728D8B1000
|
heap
|
page read and write
|
||
7FFAAB4F8000
|
trusted library allocation
|
page execute and read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
7FFAAB514000
|
trusted library allocation
|
page read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
22AB6C71000
|
heap
|
page read and write
|
||
2728D8BF000
|
heap
|
page read and write
|
||
E409DFF000
|
stack
|
page read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
E409CFF000
|
stack
|
page read and write
|
||
1FB0F0F8000
|
heap
|
page read and write
|
||
7FFAAB540000
|
trusted library allocation
|
page read and write
|
||
7FFAAB730000
|
trusted library allocation
|
page read and write
|
||
2832D586000
|
trusted library allocation
|
page read and write
|
||
2728D82D000
|
heap
|
page read and write
|
||
7FFAAB325000
|
trusted library allocation
|
page read and write
|
||
1FB0E8B5000
|
heap
|
page read and write
|
||
F5CBEFD000
|
stack
|
page read and write
|
||
28BA8BC3000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
22AB6C5F000
|
heap
|
page read and write
|
||
275428C0000
|
heap
|
page read and write
|
||
22AB6735000
|
heap
|
page read and write
|
||
96F8AF9000
|
stack
|
page read and write
|
||
2831E68B000
|
trusted library allocation
|
page read and write
|
||
7FFAAB72A000
|
trusted library allocation
|
page read and write
|
||
22AB8981000
|
trusted library allocation
|
page read and write
|
||
1FD086D0000
|
remote allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
7FFAAB335000
|
trusted library allocation
|
page read and write
|
||
2831CBF0000
|
trusted library allocation
|
page read and write
|
||
2728DCE5000
|
heap
|
page read and write
|
||
7FFAAB345000
|
trusted library allocation
|
page read and write
|
||
28335501000
|
heap
|
page read and write
|
||
2728D336000
|
heap
|
page read and write
|
||
28BA8BE3000
|
trusted library allocation
|
page read and write
|
||
1EF20800000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
7FFAAB440000
|
trusted library allocation
|
page execute and read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
1FD08800000
|
heap
|
page read and write
|
||
7FFAAB4CD000
|
trusted library allocation
|
page execute and read and write
|
||
2256A2D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB500000
|
trusted library allocation
|
page execute and read and write
|
||
1DFF9170000
|
trusted library allocation
|
page read and write
|
||
22D0EE2B000
|
heap
|
page read and write
|
||
1C7040CC000
|
heap
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
7FF792557000
|
unkown
|
page readonly
|
||
7FFAAB512000
|
trusted library allocation
|
page read and write
|
||
B5E8BFF000
|
stack
|
page read and write
|
||
2728D815000
|
heap
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
22AB62C0000
|
heap
|
page read and write
|
||
2831D250000
|
heap
|
page execute and read and write
|
||
1FD0873D000
|
heap
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
2831C584000
|
heap
|
page read and write
|
||
1FD08764000
|
heap
|
page read and write
|
||
7FFAAB610000
|
trusted library allocation
|
page read and write
|
||
28E167B0000
|
heap
|
page read and write
|
||
F5CBB2F000
|
stack
|
page read and write
|
||
22AB5FE0000
|
heap
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
28BA8EFB000
|
heap
|
page read and write
|
||
7DF449BB0000
|
trusted library allocation
|
page execute and read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
2728DCD8000
|
heap
|
page read and write
|
||
28BA8D60000
|
trusted library allocation
|
page read and write
|
||
7FFAAB770000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4F4000
|
trusted library allocation
|
page execute and read and write
|
||
1FB0E5F0000
|
heap
|
page read and write
|
||
7FFAAB5C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB520000
|
trusted library allocation
|
page read and write
|
||
7FFAAB580000
|
trusted library allocation
|
page read and write
|
||
1EF20741000
|
heap
|
page read and write
|
||
1C71D0F4000
|
heap
|
page read and write
|
||
28BC1270000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
2728DC3D000
|
heap
|
page read and write
|
||
7FFAAB450000
|
trusted library allocation
|
page execute and read and write
|
||
2728DCD6000
|
heap
|
page read and write
|
||
2728D7FF000
|
heap
|
page read and write
|
||
2728DCE8000
|
heap
|
page read and write
|
||
F6625FD000
|
stack
|
page read and write
|
||
B8615B9000
|
stack
|
page read and write
|
||
7FFB23B00000
|
unkown
|
page read and write
|
||
7FFAAB4E5000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4C8000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB5C4000
|
trusted library allocation
|
page read and write
|
||
2728DC3F000
|
heap
|
page read and write
|
||
2D816350000
|
trusted library allocation
|
page read and write
|
||
2728DCC2000
|
heap
|
page read and write
|
||
22AB6024000
|
heap
|
page read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
1FD08766000
|
heap
|
page read and write
|
||
96F887E000
|
stack
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
2728DC4F000
|
heap
|
page read and write
|
||
7FFB23AF6000
|
unkown
|
page readonly
|
||
27542690000
|
heap
|
page read and write
|
||
1C71D000000
|
heap
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
1C7046F0000
|
trusted library allocation
|
page read and write
|
||
1FB0F6BC000
|
trusted library allocation
|
page read and write
|
||
2728D2D0000
|
heap
|
page read and write
|
||
7FFAAB600000
|
trusted library allocation
|
page read and write
|
||
2728DCC2000
|
heap
|
page read and write
|
||
7FFAAB5E0000
|
trusted library allocation
|
page read and write
|
||
232020F9000
|
heap
|
page read and write
|
||
7FFAAB530000
|
trusted library allocation
|
page read and write
|
||
7FFAAB740000
|
trusted library allocation
|
page read and write
|
||
2728D7F5000
|
heap
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3C0000
|
trusted library allocation
|
page read and write
|
||
22AB62C5000
|
heap
|
page read and write
|
||
275443D0000
|
heap
|
page execute and read and write
|
||
28BA8DA0000
|
trusted library allocation
|
page read and write
|
||
1FD088D5000
|
heap
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB5D0000
|
trusted library allocation
|
page read and write
|
||
27544290000
|
heap
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
1FB0EFA0000
|
trusted library allocation
|
page read and write
|
||
1EF20820000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
1FD08700000
|
heap
|
page read and write
|
||
2831EDEB000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3E0000
|
trusted library allocation
|
page read and write
|
||
283354EB000
|
heap
|
page read and write
|
||
1C71D0AF000
|
heap
|
page read and write
|
||
B5E7CF4000
|
stack
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4F6000
|
trusted library allocation
|
page execute and read and write
|
||
283352BC000
|
heap
|
page read and write
|
||
23202010000
|
heap
|
page read and write
|
||
22AB5F70000
|
heap
|
page read and write
|
||
2728D8A9000
|
heap
|
page read and write
|
||
1EF20803000
|
trusted library allocation
|
page read and write
|
||
7FFAAB630000
|
trusted library allocation
|
page read and write
|
||
225689B6000
|
heap
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
1FB0E880000
|
trusted library allocation
|
page read and write
|
||
7FFAAB340000
|
trusted library allocation
|
page read and write
|
||
1C71D077000
|
heap
|
page read and write
|
||
1DFF96E0000
|
heap
|
page execute and read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
1EF20845000
|
heap
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
2256A300000
|
trusted library allocation
|
page read and write
|
||
1FD0871D000
|
heap
|
page read and write
|
||
7FF649BD4000
|
unkown
|
page readonly
|
||
2D816350000
|
trusted library allocation
|
page read and write
|
||
7FFAAB335000
|
trusted library allocation
|
page read and write
|
||
2831C5C2000
|
heap
|
page read and write
|
||
7FFAAB690000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4C0000
|
trusted library allocation
|
page read and write
|
||
1FB0E610000
|
heap
|
page read and write
|
||
7FFAAB333000
|
trusted library allocation
|
page execute and read and write
|
||
2831D9BB000
|
trusted library allocation
|
page read and write
|
||
1DFF76A3000
|
heap
|
page read and write
|
||
27544330000
|
trusted library allocation
|
page read and write
|
||
1C71CD24000
|
heap
|
page read and write
|
||
2728DCE5000
|
heap
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
22AC6DD9000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
22AB6690000
|
heap
|
page readonly
|
||
1DFF9160000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
1DFF9170000
|
trusted library allocation
|
page read and write
|
||
1EF20820000
|
trusted library allocation
|
page read and write
|
||
7FFAAB570000
|
trusted library allocation
|
page read and write
|
||
7FFAAB620000
|
trusted library allocation
|
page read and write
|
||
27542764000
|
heap
|
page read and write
|
||
7FFAAB4C0000
|
trusted library allocation
|
page read and write
|
||
2728D8AA000
|
heap
|
page read and write
|
||
B86163A000
|
stack
|
page read and write
|
||
1EF206C8000
|
heap
|
page read and write
|
||
1C715009000
|
trusted library allocation
|
page read and write
|
||
1EF206B8000
|
heap
|
page read and write
|
||
1FB105EE000
|
trusted library allocation
|
page read and write
|
||
22D0EF02000
|
heap
|
page read and write
|
||
2D816320000
|
trusted library allocation
|
page read and write
|
||
B8614F6000
|
stack
|
page read and write
|
||
23203DA0000
|
trusted library allocation
|
page read and write
|
||
1EF20820000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4D1000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
1DFF7662000
|
heap
|
page read and write
|
||
2831C62C000
|
heap
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
1DFF9170000
|
trusted library allocation
|
page read and write
|
||
22D0EE13000
|
heap
|
page read and write
|
||
1C704660000
|
trusted library allocation
|
page read and write
|
||
22AB607F000
|
heap
|
page read and write
|
||
CEECCFF000
|
stack
|
page read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
1DFF9170000
|
trusted library allocation
|
page read and write
|
||
1DFF9150000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
7FFAAB5A0000
|
trusted library allocation
|
page read and write
|
||
22AB6C6D000
|
heap
|
page read and write
|
||
7FFAAB3F6000
|
trusted library allocation
|
page read and write
|
||
28BC1280000
|
trusted library allocation
|
page read and write
|
||
B860F5E000
|
stack
|
page read and write
|
||
7FFAAB325000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
22ACF150000
|
trusted library allocation
|
page read and write
|
||
B5E77FB000
|
stack
|
page read and write
|
||
28BA8DA0000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
2728D8C6000
|
heap
|
page read and write
|
||
7FFAAB5B0000
|
trusted library allocation
|
page read and write
|
||
96F89F8000
|
stack
|
page read and write
|
||
B9CB9FE000
|
stack
|
page read and write
|
||
22AC6D71000
|
trusted library allocation
|
page read and write
|
||
22ACEF44000
|
heap
|
page read and write
|
||
7DF448CD0000
|
trusted library allocation
|
page execute and read and write
|
||
28BA73D5000
|
heap
|
page read and write
|
||
1DFF9170000
|
trusted library allocation
|
page read and write
|
||
27544313000
|
trusted library allocation
|
page read and write
|
||
27544320000
|
trusted library allocation
|
page read and write
|
||
22ACEFDA000
|
heap
|
page read and write
|
||
7FFAAB581000
|
trusted library allocation
|
page read and write
|
||
2831EEB4000
|
trusted library allocation
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
28BA8BC0000
|
trusted library allocation
|
page read and write
|
||
1FB0E510000
|
heap
|
page read and write
|
||
7FFAAB3F0000
|
trusted library allocation
|
page execute and read and write
|
||
22D0EE4B000
|
heap
|
page read and write
|
||
7DF448CB0000
|
trusted library allocation
|
page execute and read and write
|
||
B86173E000
|
stack
|
page read and write
|
||
1DFF7638000
|
heap
|
page read and write
|
||
2831E683000
|
trusted library allocation
|
page read and write
|
||
1FB27378000
|
heap
|
page read and write
|
||
A6E437E000
|
stack
|
page read and write
|
||
2728DCD6000
|
heap
|
page read and write
|
||
2728DC70000
|
heap
|
page read and write
|
||
1DFF7795000
|
heap
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
1FB1F56A000
|
trusted library allocation
|
page read and write
|
||
1DFF91E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB780000
|
trusted library allocation
|
page read and write
|
||
1C704CA0000
|
heap
|
page execute and read and write
|
||
1FB1020C000
|
trusted library allocation
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
2D816330000
|
trusted library allocation
|
page read and write
|
||
1FB0F712000
|
trusted library allocation
|
page read and write
|
||
96F98CA000
|
stack
|
page read and write
|
||
2728DCB1000
|
heap
|
page read and write
|
||
22AB700F000
|
trusted library allocation
|
page read and write
|
||
28BA8BE0000
|
trusted library allocation
|
page read and write
|
||
1DFF92CF000
|
heap
|
page read and write
|
||
7FFAAB4F0000
|
trusted library allocation
|
page read and write
|
||
1FB0E8B0000
|
heap
|
page read and write
|
||
7FFAAB333000
|
trusted library allocation
|
page execute and read and write
|
||
1FB1F2ED000
|
trusted library allocation
|
page read and write
|
||
1FB0FBB5000
|
trusted library allocation
|
page read and write
|
||
1DFF9160000
|
trusted library allocation
|
page read and write
|
||
2D814A10000
|
heap
|
page read and write
|
||
2D816340000
|
heap
|
page execute and read and write
|
||
7FFAAB570000
|
trusted library allocation
|
page read and write
|
||
E409EFD000
|
stack
|
page read and write
|
||
7DF4930E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB4C8000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB3D0000
|
trusted library allocation
|
page read and write
|
||
1FB1F56C000
|
trusted library allocation
|
page read and write
|
||
7FFAAB5D0000
|
trusted library allocation
|
page read and write
|
||
22AB6C30000
|
heap
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
B5E93FF000
|
stack
|
page read and write
|
||
F5CBAA3000
|
stack
|
page read and write
|
||
7FFAAB4B4000
|
trusted library allocation
|
page read and write
|
||
27544313000
|
trusted library allocation
|
page read and write
|
||
2D8149A0000
|
trusted library allocation
|
page read and write
|
||
23203D52000
|
heap
|
page read and write
|
||
1EF20890000
|
trusted library allocation
|
page read and write
|
||
1DFF766B000
|
heap
|
page read and write
|
||
28BC13D0000
|
heap
|
page execute and read and write
|
||
7FFAAB330000
|
trusted library allocation
|
page read and write
|
||
23203D90000
|
trusted library allocation
|
page read and write
|
||
1EF20840000
|
heap
|
page read and write
|
||
1FD0878E000
|
heap
|
page read and write
|
||
28BA8D70000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3E0000
|
trusted library allocation
|
page read and write
|
||
2D826401000
|
trusted library allocation
|
page read and write
|
||
7FFAAB590000
|
trusted library allocation
|
page read and write
|
||
2728DD00000
|
heap
|
page read and write
|
||
22AB5FFC000
|
heap
|
page read and write
|
||
23202000000
|
heap
|
page read and write
|
||
1FB273D0000
|
heap
|
page execute and read and write
|
||
2833532F000
|
heap
|
page read and write
|
||
28BB8DD9000
|
trusted library allocation
|
page read and write
|
||
2728D8AC000
|
heap
|
page read and write
|
||
27544250000
|
heap
|
page readonly
|
||
1FD0878B000
|
heap
|
page read and write
|
||
27544310000
|
trusted library allocation
|
page read and write
|
||
1EF20810000
|
trusted library allocation
|
page read and write
|
||
275426C3000
|
heap
|
page read and write
|
||
7FFAAB4D0000
|
trusted library allocation
|
page read and write
|
||
1C704030000
|
heap
|
page read and write
|
||
7FFAAB4E1000
|
trusted library allocation
|
page read and write
|
There are 2091 hidden memdumps, click here to show them.