Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
5c13e6.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
initial sample
|
||
C:\Config.Msi\4c685e.rbs
|
data
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\BouncyCastle.Crypto.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\System.ValueTuple.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI6995.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI6995.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI6BB9.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI6BB9.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI82CC.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI82CC.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI8742.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSIA1A4.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSIA1A4.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\System32\InstallUtil.InstallLog
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\~DF0301261F3F564947.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF1C46BEF5561279DD.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF6331E09D6B6BFB1B.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF6D201690A06C6388.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFBFB6DF824FA39372.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFCC791DA1EF222C85.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallState
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation.zip
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.ini
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AteraAgent.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\Installer\4c685d.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\4c685f.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\MSI6995.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSI6995.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI6995.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI6995.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI6BB9.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSI6BB9.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI6BB9.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI6BB9.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI82CC.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSI82CC.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI82CC.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI82CC.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI8753.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI87B1.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI88BC.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIA1A4.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSIA1A4.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIA1A4.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIA1A4.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SourceHash{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
Certificate, Version=3
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
|
Certificate, Version=3
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageAgentInformation.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\Temp\~DF1DD50BE3AA73671A.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF524F10E4A4FD2AE6.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFD14943823E97DCCA.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFD29D1BC9A4077569.TMP
|
data
|
modified
|
||
C:\Windows\Temp\~DFEF9047CD7385056D.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFFC9EA6A74A351B98.TMP
|
data
|
dropped
|
||
\Device\ConDrv
|
JSON data
|
dropped
|
There are 69 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI6995.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5007890 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI6BB9.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5008359 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI82CC.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5014250 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
|
||
C:\Windows\SysWOW64\net1.exe
|
C:\Windows\system32\net1 STOP AteraAgent
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="matteobianchini1965@autograf.pl" /CompanyId="1"
/IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000NxmUvIAJ" /AgentId="ff94aff6-2883-4c67-9794-e0ddc81d610f"
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSIA1A4.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5022156 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
ff94aff6-2883-4c67-9794-e0ddc81d610f "87885c4b-c98b-4114-8df6-f508dfdcbf5a" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000NxmUvIAJ
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
ff94aff6-2883-4c67-9794-e0ddc81d610f "81e73b14-e55c-40af-aa45-a29326f84cb3" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000NxmUvIAJ
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\5c13e6.msi"
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding 6035F6485629B3656802BDCB68379B97
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding 8C2A075FB1C9BFF9A65B59CB5274A31B E Global\MSI0000
|
||
C:\Windows\SysWOW64\net.exe
|
"NET" STOP AteraAgent
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"TaskKill.exe" /f /im AteraAgent.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
"C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 11 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://ps.atera.com/agentpackagesmac/AgentPackageWindowsUpdate/24.6/AgentPackageWindowsUpdate.zip
|
unknown
|
||
https://agent-api.Pjv
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ff94aff6-2883-4c67-9794-e0ddc81d610f/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=d8be8b67-b9dc-4bd8-9f60-1df842ebee06&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
|
13.232.67.198
|
||
http://schemas.datacontract.org
|
unknown
|
||
http://crl.microsoft
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/track-event
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=f8b53c58-e2e7-4a77-a6fb-ccd81bb3df54
|
unknown
|
||
http://dl.google.com/googletalk/googletalk-setup.exe
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ff94aff6-2883-4c67-9794-e0ddc81d610f/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=c7e4c087-67a4-410d-b929-654d988ae41f&tr=31&tt=17327967212159752&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
|
13.232.67.198
|
||
https://agent-api.PR
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageADRemote/6.0/AgentPackageADRemote.zip
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/AgentStartingB
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/
|
unknown
|
||
http://schemas.datacontract.org/2004/07/System.ServiceProcess
|
unknown
|
||
http://wixtoolset.org
|
unknown
|
||
https://agent-api.atera.com/Production
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=bc48e4ab-59d5-4385-9ebb-6bdf934e8e43
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/Agent.Package.Watchdog/1.7/Agent.Pac
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetCommandsFallback0
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/track-event;
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ff94aff6-2883-4c67-9794-e0ddc81d610f/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=31245592-ca57-413a-838a-25566e4ba460&tr=31&tt=17327967212159752&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
|
13.232.67.198
|
||
https://ps.atera.com/agentpackageswin/AgentPackageRuntimeInstaller/13.0/AgentPackageRuntimeInstaller
|
unknown
|
||
http://acontrol.atera.com/
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/AgentStarting)
|
unknown
|
||
https://ps.pndsn.com
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=cf670f90-2c48-42f2-8c3d-1518a12474cf&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
|
13.232.67.199
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageADRemote/6.0/AgentPackageADRemote.zip
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ff94aff6
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageNetworkDiscovery/23.9/AgentPackageNetworkDiscove
|
unknown
|
||
https://agent-api.P(
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=bb8be473-c9e0-49d3-afb3-ff89cc2038f2&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
|
13.232.67.198
|
||
http://agent-api.atera.com
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageTaskSchedul
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=d1a4fa35-d7fa-4da0-99b6-08c62f57c171
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetRecurrin
|
unknown
|
||
http://schemas.datacontract.org/2004/07/
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ff94aff6-2883-4c67-9794-e0ddc81d610f/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=363c6e5c-519b-49a4-bb28-3c290a721f04&tt=0&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
|
13.232.67.198
|
||
https://github.com/icsharpcode/SharpZipLib
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageNetworkDiscovery/15.0/AgentPackageNetworkDiscovery
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ff94aff6-2883-4c67-9794-e0ddc81d610f/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=a543e4d2-478c-4637-a32f-01e5c1d96820&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
|
13.232.67.198
|
||
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageAgentI
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
|
unknown
|
||
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageTaskScheduler/17.2/AgentPackageTaskScheduler.zip
|
unknown
|
||
https://agent-api.atera.com
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ff94aff6-2883-4c67-9794
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/AgentStarting
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/AgentStartingX7.
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetCommandsFallback2/
|
unknown
|
||
http://www.w3.oh
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetCommands
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=fe0f6a4a-994b-4250-bc9b-b5822a0b9625&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
|
13.232.67.198
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=cf670f90-2c48-42f2-8c3d-1518a12474cf
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=e1b9fd91-c306-4290-9b3f-369d7c5c009e
|
unknown
|
||
https://agent-api.atera.com/
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetRecurringPackages
|
unknown
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.Availability/13.0/Agent.Package.Availability.zip
|
unknown
|
||
https://www.newtonsoft.com/jsonschema
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=f452f05c-24ab-44c2-90a0-e6c8fdaa9194
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageRuntimeInstaller/1.5/AgentPackageRuntimeInstaller.
|
unknown
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.Watchdog/13.0/Agent.Package.Watchdog.zip
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ff94aff6-2883-4c67-9794-e0ddc81d610f/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=6eac0c19-ed81-4142-86ce-d4bfe2f9e3ff&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
|
13.232.67.198
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageWindowsUpdate/24.6/AgentPa
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=0180680e-e6cb-400e-83d6-3808eb668088&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
|
13.232.67.198
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=0180680e-e6cb-400e-83d6-3808eb668088
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=ba6a13f1-ebc9-4a1b-b6ac-2f0177a0d113&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
|
13.232.67.198
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.Availability/0.16/Agent.Package.Availability.z
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=377417ee-b208-4922-a278-778329313858
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetRecurringPackagesnection
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=c1235ff2-1096-4bcd-b42c-92f552aac0b4&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
|
13.232.67.198
|
||
https://ps.atera.com/agentpackagesmac/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ff94aff6-2883-4c67-9794-e0ddc81d610f/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=98770db9-b9c5-40a7-84a7-ea720f9b7aa0&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
|
13.232.67.198
|
||
https://agent-api.atera.com/Production/Agent/GetRecurringPackagesnterval
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ff94aff6-2883-4c67-9794-e0ddc81d610f/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=78d5a8c0-6e60-43a1-8c43-b430a42d1135&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ff94aff6-2883-4c67-9794-e0ddc81d610f/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=5217d3d2-da87-42e8-9726-56daff914c54&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
|
13.232.67.198
|
||
https://www.newtonsoft.com/json
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/Age
|
unknown
|
||
http://wixtoolset.org/news/
|
unknown
|
||
https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageWindowsUpdate/24.6/A
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageAgentInformation/22.7/AgentPackageAgentInformation
|
unknown
|
||
https://agent-api.aterD
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageNetworkDiscovery/13.0/AgentPackageNetworkDiscovery
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=ba6a13f1-ebc9-4a1b-b6ac-2f0177a0d113
|
unknown
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.IotPoc/13.0/Agent.Package.IotPoc.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageTaskScheduler/13.0/AgentPackageTaskScheduler.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageAgentInformation/38.0/AgentPackageAgentInformation
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ff94aff6-2883-4c67-9794-e0ddc81d610f/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=cad12679-119f-4810-9e43-100014c76ca9&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
|
13.232.67.198
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=ac4fb316-6088-4f09-94da-3e83236acc31&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ff94aff6-2883-4c67-9794-e0ddc81d610f/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=914d5960-15b7-4468-88cf-9462e85c2124&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ff94aff6-2883-4c67-9794-e0ddc81d610f/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=d4bd921a-933d-426f-b266-ff3906eda0dc&tt=0&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
|
13.232.67.198
|
||
https://agent-api.P
|
unknown
|
||
http://www.w3.o
|
unknown
|
||
https://ps.atera.com
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=79b0f33b-8550-42a3-8fa1-b61745ab84d2&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
|
13.232.67.198
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageAgentInformation/38.0/AgentPackageAgentInformati
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=329cd285-2dd4-4cef-8f0f-afb56ab5caec&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
|
13.232.67.198
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ps.pndsn.com
|
13.232.67.198
|
||
bg.microsoft.map.fastly.net
|
199.232.214.172
|
||
d25btwd9wax8gu.cloudfront.net
|
108.158.75.4
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
||
ps.atera.com
|
unknown
|
||
agent-api.atera.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
108.158.75.4
|
d25btwd9wax8gu.cloudfront.net
|
United States
|
||
13.232.67.198
|
ps.pndsn.com
|
United States
|
||
13.232.67.199
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\4c685e.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\4c685e.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB9EFD7FDAF9AD115987000E181661F5
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CD868C8CE5A308147ABB306D829266BC
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C32B8CE0327C1E141950B4C9C2AD4DA7
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D9B1B1F0B1FC024D9390FE4B94D97D5
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\007F59F54ACD08842B2D98A10E6D1E3A
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB25C26F7C51D3C4AA2BED5600F46956
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01010F83113E72A4C81AD77422D2F947
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01D9DC4B27DFC0340B543A11D3CEBE07
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\ATERA Networks\AteraAgent\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\ATERA Networks\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\7D0A237E2F2A7564CA141B792446E854
|
INSTALLFOLDER_files_Feature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Features
|
INSTALLFOLDER_files_Feature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
|
LastUsedSource
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
|
AutoBackupLogFiles
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AteraAgent
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
AccountId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
IntegratorLogin
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
CompanyId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
AgentId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
ServerName
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AlphaAgent
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
FileDirectory
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
FileDirectory
|
There are 137 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
25EA6E78000
|
heap
|
page read and write
|
||
2B021B22000
|
trusted library allocation
|
page read and write
|
||
163451AD000
|
heap
|
page read and write
|
||
47B6000
|
heap
|
page read and write
|
||
24980073000
|
trusted library allocation
|
page read and write
|
||
1634595D000
|
trusted library allocation
|
page read and write
|
||
2B021AA2000
|
trusted library allocation
|
page read and write
|
||
249FF0A2000
|
unkown
|
page readonly
|
||
163451FB000
|
heap
|
page read and write
|
||
25EA6E35000
|
heap
|
page read and write
|
||
2B01FEA2000
|
unkown
|
page readonly
|
||
5071000
|
trusted library allocation
|
page read and write
|
||
1635E6AD000
|
heap
|
page read and write
|
||
249FF2CC000
|
heap
|
page read and write
|
||
25EA7601000
|
trusted library allocation
|
page read and write
|
||
163450A0000
|
heap
|
page read and write
|
||
2B01FF70000
|
heap
|
page read and write
|
||
50E1000
|
trusted library allocation
|
page read and write
|
||
2B020026000
|
heap
|
page read and write
|
||
4E59000
|
heap
|
page read and write
|
||
5114000
|
trusted library allocation
|
page read and write
|
||
2B021A79000
|
trusted library allocation
|
page read and write
|
||
25EA6E0B000
|
heap
|
page read and write
|
||
2B03A590000
|
heap
|
page read and write
|
||
2B021B56000
|
trusted library allocation
|
page read and write
|
||
25EA7673000
|
trusted library allocation
|
page read and write
|
||
2B020020000
|
heap
|
page read and write
|
||
2B020040000
|
heap
|
page read and write
|
||
2B021B6C000
|
trusted library allocation
|
page read and write
|
||
25EA7647000
|
trusted library allocation
|
page read and write
|
||
25EA6DF8000
|
heap
|
page read and write
|
||
2B02006E000
|
heap
|
page read and write
|
||
25EA6E2D000
|
heap
|
page read and write
|
||
5187000
|
trusted library allocation
|
page read and write
|
||
1635E68B000
|
heap
|
page read and write
|
||
25EA6F90000
|
heap
|
page read and write
|
||
249FF2A0000
|
heap
|
page read and write
|
||
7FFD9B494000
|
trusted library allocation
|
page read and write
|
||
5DF3B15000
|
stack
|
page read and write
|
||
2B03A5B7000
|
heap
|
page read and write
|
||
2B03A5E3000
|
heap
|
page read and write
|
||
25EA7683000
|
trusted library allocation
|
page read and write
|
||
249FF300000
|
heap
|
page read and write
|
||
2B021AB9000
|
trusted library allocation
|
page read and write
|
||
249FF2C0000
|
heap
|
page read and write
|
||
24980001000
|
trusted library allocation
|
page read and write
|
||
2B021A7C000
|
trusted library allocation
|
page read and write
|
||
25EA6DF0000
|
heap
|
page read and write
|
||
249FF34C000
|
heap
|
page read and write
|
||
490A000
|
heap
|
page read and write
|
||
163454B0000
|
heap
|
page read and write
|
||
25EA7532000
|
unkown
|
page readonly
|
||
163451CD000
|
heap
|
page read and write
|
||
2B01FFE0000
|
heap
|
page read and write
|
||
2B021AA4000
|
trusted library allocation
|
page read and write
|
||
4F45000
|
heap
|
page read and write
|
||
25EBFD89000
|
heap
|
page read and write
|
||
2B0219F1000
|
trusted library allocation
|
page read and write
|
||
16345EBF000
|
trusted library allocation
|
page read and write
|
||
1635E670000
|
heap
|
page read and write
|
||
24980083000
|
trusted library allocation
|
page read and write
|
||
2B021AAA000
|
trusted library allocation
|
page read and write
|
||
249FF307000
|
heap
|
page read and write
|
||
163458F1000
|
trusted library allocation
|
page read and write
|
||
25EA76BF000
|
trusted library allocation
|
page read and write
|
||
16345170000
|
heap
|
page read and write
|
||
2B01FFE6000
|
heap
|
page read and write
|
||
25EBFD1A000
|
unkown
|
page readonly
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7BB000
|
stack
|
page read and write
|
||
16345EEB000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
16355903000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
5DF5DE9000
|
stack
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4C0000
|
trusted library allocation
|
page read and write
|
||
249FFB14000
|
unkown
|
page readonly
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
24990011000
|
trusted library allocation
|
page read and write
|
||
4FBC000
|
stack
|
page read and write
|
||
324A000
|
heap
|
page read and write
|
||
2B021B6A000
|
trusted library allocation
|
page read and write
|
||
74D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B520000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B680000
|
trusted library allocation
|
page read and write
|
||
3350000
|
heap
|
page read and write
|
||
163450B0000
|
heap
|
page read and write
|
||
2B03A27B000
|
heap
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7406000
|
trusted library allocation
|
page execute and read and write
|
||
74D0000
|
trusted library allocation
|
page read and write
|
||
16345952000
|
trusted library allocation
|
page read and write
|
||
16345B08000
|
trusted library allocation
|
page read and write
|
||
25EA763F000
|
trusted library allocation
|
page read and write
|
||
775D000
|
stack
|
page read and write
|
||
485D000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
2FA9000
|
heap
|
page read and write
|
||
779D000
|
stack
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
25EA6E33000
|
heap
|
page read and write
|
||
16345B0A000
|
trusted library allocation
|
page read and write
|
||
16345B3A000
|
trusted library allocation
|
page read and write
|
||
34E5000
|
heap
|
page read and write
|
||
47DE000
|
stack
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
32F2000
|
heap
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7FF4D8FF0000
|
trusted library allocation
|
page execute and read and write
|
||
51CA000
|
trusted library allocation
|
page read and write
|
||
249FF3D0000
|
trusted library allocation
|
page read and write
|
||
5DF5FEC000
|
stack
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
493B000
|
heap
|
page read and write
|
||
24998421000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
1635E2E5000
|
heap
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
4D43000
|
trusted library allocation
|
page execute and read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
25EBFDC1000
|
heap
|
page read and write
|
||
7FFD9B510000
|
trusted library allocation
|
page read and write
|
||
24990001000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
163451B9000
|
heap
|
page read and write
|
||
91E000
|
stack
|
page read and write
|
||
B3E93FE000
|
stack
|
page read and write
|
||
C12000
|
heap
|
page read and write
|
||
2B03A5CA000
|
heap
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B300000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4D0000
|
trusted library allocation
|
page execute and read and write
|
||
287BED50000
|
heap
|
page read and write
|
||
74E1000
|
trusted library allocation
|
page read and write
|
||
249FFAFD000
|
unkown
|
page readonly
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
1635E9B2000
|
unkown
|
page readonly
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
2F8A000
|
heap
|
page read and write
|
||
3574000
|
heap
|
page read and write
|
||
4894000
|
trusted library allocation
|
page read and write
|
||
16345D39000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B490000
|
trusted library allocation
|
page read and write
|
||
16345D31000
|
trusted library allocation
|
page read and write
|
||
16345995000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
1635EADC000
|
heap
|
page read and write
|
||
2F7D000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4D0000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
16345D93000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
5DF5AE9000
|
stack
|
page read and write
|
||
DC164FC000
|
stack
|
page read and write
|
||
7FFD9B4C0000
|
trusted library allocation
|
page execute and read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
512F000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
EE2A3EF000
|
stack
|
page read and write
|
||
7FFD9B4E0000
|
trusted library allocation
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
25EA763D000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
16345A78000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
163459B7000
|
trusted library allocation
|
page read and write
|
||
2B01FF50000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
16345A99000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B550000
|
trusted library allocation
|
page read and write
|
||
2B03A5A4000
|
heap
|
page read and write
|
||
2F89000
|
heap
|
page read and write
|
||
16345C1A000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFD9B390000
|
trusted library allocation
|
page execute and read and write
|
||
5DF6BEC000
|
stack
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
5DF76F8000
|
stack
|
page read and write
|
||
50B3000
|
trusted library allocation
|
page read and write
|
||
704E000
|
stack
|
page read and write
|
||
321E000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
4CDF000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
25EBFE02000
|
heap
|
page read and write
|
||
1635E846000
|
heap
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
7450000
|
trusted library allocation
|
page read and write
|
||
4BF0000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
249FF2A5000
|
heap
|
page read and write
|
||
16346246000
|
trusted library allocation
|
page read and write
|
||
16345E5D000
|
trusted library allocation
|
page read and write
|
||
5050000
|
trusted library allocation
|
page read and write
|
||
5DF53E9000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
16345E23000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
5DF56E9000
|
stack
|
page read and write
|
||
249FF250000
|
heap
|
page read and write
|
||
5DF79FD000
|
stack
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
249FF460000
|
heap
|
page read and write
|
||
5DF77ED000
|
stack
|
page read and write
|
||
765E000
|
stack
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
1635E6EF000
|
heap
|
page read and write
|
||
74E1000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
2FAB000
|
heap
|
page read and write
|
||
4BD0000
|
trusted library allocation
|
page execute and read and write
|
||
25EA6E3B000
|
heap
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
16345AA1000
|
trusted library allocation
|
page read and write
|
||
4940000
|
trusted library allocation
|
page read and write
|
||
7FFD9B520000
|
trusted library allocation
|
page execute and read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
2B03A5BC000
|
heap
|
page read and write
|
||
249FFAE8000
|
unkown
|
page readonly
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
25EBFD45000
|
unkown
|
page readonly
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
16345E75000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
779F000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7A6B000
|
heap
|
page read and write
|
||
7504000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
BB3000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
34E5000
|
heap
|
page read and write
|
||
7463000
|
trusted library allocation
|
page read and write
|
||
5C25000
|
trusted library allocation
|
page read and write
|
||
2F99000
|
heap
|
page read and write
|
||
163458E0000
|
heap
|
page read and write
|
||
7FFD9B5F0000
|
trusted library allocation
|
page read and write
|
||
5184000
|
trusted library allocation
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
16345A90000
|
trusted library allocation
|
page read and write
|
||
16345B35000
|
trusted library allocation
|
page read and write
|
||
7FFD9B556000
|
trusted library allocation
|
page read and write
|
||
4BC0000
|
trusted library allocation
|
page read and write
|
||
795D000
|
stack
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
25EA6E18000
|
heap
|
page read and write
|
||
70CF000
|
stack
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7FC68000
|
trusted library allocation
|
page execute and read and write
|
||
74B0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
2E5E000
|
heap
|
page read and write
|
||
4950000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
331E000
|
stack
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
163462E0000
|
trusted library allocation
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
trusted library allocation
|
page read and write
|
||
163459AC000
|
trusted library allocation
|
page read and write
|
||
2B01FFD5000
|
heap
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
1635EAAC000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFD9B496000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
4DA4000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
5152000
|
trusted library allocation
|
page read and write
|
||
5DF4BEA000
|
stack
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B380000
|
trusted library allocation
|
page read and write
|
||
7FFD9B530000
|
trusted library allocation
|
page execute and read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
5DF57F7000
|
stack
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2E2000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFD9B480000
|
trusted library allocation
|
page read and write
|
||
49B0000
|
heap
|
page execute and read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
4D50000
|
heap
|
page read and write
|
||
16345A9D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B30B000
|
trusted library allocation
|
page execute and read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B480000
|
trusted library allocation
|
page read and write
|
||
249FF303000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
163459CB000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
25EA772F000
|
trusted library allocation
|
page read and write
|
||
5DF75EC000
|
stack
|
page read and write
|
||
7FFD9B590000
|
trusted library allocation
|
page read and write
|
||
16346242000
|
trusted library allocation
|
page read and write
|
||
4980000
|
trusted library allocation
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
163558FE000
|
trusted library allocation
|
page read and write
|
||
163451AB000
|
heap
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
16345D3B000
|
trusted library allocation
|
page read and write
|
||
16345EF7000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
25EA7548000
|
unkown
|
page readonly
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
25EB7611000
|
trusted library allocation
|
page read and write
|
||
16345E71000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4C0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
4F76000
|
heap
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B386000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
25EA6F10000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
2B03A3F2000
|
unkown
|
page readonly
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
DC15BFE000
|
stack
|
page read and write
|
||
EE2A6FF000
|
stack
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
2B021B68000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B30D000
|
trusted library allocation
|
page execute and read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
700E000
|
stack
|
page read and write
|
||
DC16EFB000
|
stack
|
page read and write
|
||
7FFD9B500000
|
trusted library allocation
|
page execute and read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
1635E747000
|
heap
|
page read and write
|
||
163459D7000
|
trusted library allocation
|
page read and write
|
||
74D0000
|
trusted library allocation
|
page read and write
|
||
7A9E000
|
stack
|
page read and write
|
||
4C21000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
1635E74F000
|
heap
|
page read and write
|
||
7ADF000
|
heap
|
page read and write
|
||
B3E8DFF000
|
stack
|
page read and write
|
||
4AAC000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
795E000
|
stack
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
2DF2000
|
heap
|
page read and write
|
||
7F608000
|
trusted library allocation
|
page execute and read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
249FFB1A000
|
unkown
|
page readonly
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4D5000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74FC000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4B0000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
5DF46E9000
|
stack
|
page read and write
|
||
2499840A000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
249FFBE0000
|
heap
|
page execute and read and write
|
||
BB449FD000
|
stack
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
25EA75C0000
|
heap
|
page execute and read and write
|
||
4DA3000
|
trusted library allocation
|
page execute and read and write
|
||
4DF0000
|
trusted library allocation
|
page read and write
|
||
B3E95FF000
|
stack
|
page read and write
|
||
2B020032000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
96E000
|
stack
|
page read and write
|
||
5DF5EEC000
|
stack
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
7490000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
25EA6F30000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
4E8A000
|
heap
|
page read and write
|
||
C0D000
|
unkown
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
59C5000
|
trusted library allocation
|
page read and write
|
||
249FFB18000
|
unkown
|
page readonly
|
||
74A9000
|
trusted library allocation
|
page read and write
|
||
25EBFD70000
|
heap
|
page read and write
|
||
16345EE1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B49D000
|
trusted library allocation
|
page read and write
|
||
4980000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5C0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
1635E7D1000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
4D44000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
249FFB22000
|
unkown
|
page readonly
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
DC16CFD000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
4EF0000
|
heap
|
page execute and read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
50CD000
|
trusted library allocation
|
page read and write
|
||
2B0201B0000
|
heap
|
page read and write
|
||
517B000
|
trusted library allocation
|
page read and write
|
||
249FFAA0000
|
unkown
|
page readonly
|
||
7403000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
1635E738000
|
heap
|
page read and write
|
||
5DF40FE000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
4A30000
|
heap
|
page read and write
|
||
7FFD9B495000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
1635EAD1000
|
heap
|
page read and write
|
||
7FFD9B4F0000
|
trusted library allocation
|
page read and write
|
||
5128000
|
trusted library allocation
|
page read and write
|
||
3358000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
16345CDD000
|
trusted library allocation
|
page read and write
|
||
25EBFD37000
|
unkown
|
page readonly
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
31DF000
|
stack
|
page read and write
|
||
1634629E000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
1635E3A0000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
34C2000
|
heap
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
16345F59000
|
trusted library allocation
|
page read and write
|
||
74EC000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
BB44DFF000
|
stack
|
page read and write
|
||
1635E855000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74F5000
|
trusted library allocation
|
page read and write
|
||
1634624A000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
1635E836000
|
heap
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7FFD9B520000
|
trusted library allocation
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
771E000
|
stack
|
page read and write
|
||
BB44CFE000
|
stack
|
page read and write
|
||
4F80000
|
heap
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
2F47000
|
stack
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
1635E6FB000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
1634623D000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
4C9E000
|
stack
|
page read and write
|
||
2DE4000
|
heap
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
24980143000
|
trusted library allocation
|
page read and write
|
||
6075000
|
trusted library allocation
|
page read and write
|
||
163459CF000
|
trusted library allocation
|
page read and write
|
||
16345410000
|
trusted library allocation
|
page read and write
|
||
2B01FFA0000
|
heap
|
page read and write
|
||
7FFD9B3F0000
|
trusted library allocation
|
page execute and read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
24980151000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
B3E96FD000
|
stack
|
page read and write
|
||
7FFD9B39C000
|
trusted library allocation
|
page execute and read and write
|
||
2498012F000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
5DF72E8000
|
stack
|
page read and write
|
||
25EBFD3B000
|
unkown
|
page readonly
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
1635E250000
|
heap
|
page execute and read and write
|
||
7466000
|
trusted library allocation
|
page execute and read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
249983EB000
|
heap
|
page read and write
|
||
7FFD9B380000
|
trusted library allocation
|
page read and write
|
||
7570000
|
trusted library allocation
|
page execute and read and write
|
||
25EBFD75000
|
heap
|
page read and write
|
||
4930000
|
heap
|
page read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page read and write
|
||
DC15FFE000
|
stack
|
page read and write
|
||
287BEAE0000
|
heap
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7EE20000
|
trusted library allocation
|
page execute and read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
25EBFD18000
|
unkown
|
page readonly
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
2B01FEA0000
|
unkown
|
page readonly
|
||
249FFAFB000
|
unkown
|
page readonly
|
||
1635EAA0000
|
heap
|
page read and write
|
||
2E64000
|
heap
|
page read and write
|
||
3286000
|
heap
|
page read and write
|
||
4AEE000
|
stack
|
page read and write
|
||
361F000
|
stack
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
24998360000
|
heap
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
1635E803000
|
heap
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
2FA6000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
7FFD9B3A0000
|
trusted library allocation
|
page execute and read and write
|
||
3279000
|
heap
|
page read and write
|
||
2B021980000
|
trusted library allocation
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
7EE38000
|
trusted library allocation
|
page execute and read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
4CF0000
|
heap
|
page read and write
|
||
47F0000
|
heap
|
page readonly
|
||
16345A74000
|
trusted library allocation
|
page read and write
|
||
7410000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2FD000
|
trusted library allocation
|
page execute and read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
4E72000
|
trusted library allocation
|
page read and write
|
||
5DF7FF7000
|
stack
|
page read and write
|
||
7FFD9B6A0000
|
trusted library allocation
|
page read and write
|
||
16345EF3000
|
trusted library allocation
|
page read and write
|
||
2B03A2E0000
|
heap
|
page execute and read and write
|
||
249FFAD3000
|
unkown
|
page readonly
|
||
1635D8F0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
2B03A2B1000
|
heap
|
page read and write
|
||
5DF58E8000
|
stack
|
page read and write
|
||
5DF6EEC000
|
stack
|
page read and write
|
||
5DF3B5F000
|
stack
|
page read and write
|
||
16345A60000
|
trusted library allocation
|
page read and write
|
||
7060000
|
heap
|
page read and write
|
||
7FFD9B530000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B4A6000
|
trusted library allocation
|
page read and write
|
||
2B0219E0000
|
heap
|
page execute and read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
4954000
|
trusted library allocation
|
page read and write
|
||
B3E92FE000
|
stack
|
page read and write
|
||
16345155000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
163450F0000
|
heap
|
page read and write
|
||
5DF71EB000
|
stack
|
page read and write
|
||
5DF66EC000
|
stack
|
page read and write
|
||
25EA6DC0000
|
heap
|
page read and write
|
||
16345423000
|
trusted library allocation
|
page read and write
|
||
16345D37000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
4880000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
2B0319FF000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
heap
|
page readonly
|
||
6071000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page execute and read and write
|
||
25EB7601000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
2B02001E000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
5DF68EC000
|
stack
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
16345A6C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3C6000
|
trusted library allocation
|
page execute and read and write
|
||
74A4000
|
trusted library allocation
|
page read and write
|
||
3579000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
2B01FFD0000
|
heap
|
page read and write
|
||
7FFD9B2FB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B4A0000
|
trusted library allocation
|
page read and write
|
||
2F9D000
|
stack
|
page read and write
|
||
3645000
|
heap
|
page read and write
|
||
7FFD9B560000
|
trusted library allocation
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
D4E000
|
stack
|
page read and write
|
||
7FFD9B304000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
76DE000
|
stack
|
page read and write
|
||
2E05000
|
heap
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
74F4000
|
trusted library allocation
|
page read and write
|
||
2B0219A0000
|
trusted library allocation
|
page read and write
|
||
DC16BFC000
|
stack
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
16345B3E000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
5DF49FD000
|
stack
|
page read and write
|
||
25EA75A0000
|
heap
|
page execute and read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7541000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
5040000
|
trusted library allocation
|
page execute and read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
249983E1000
|
heap
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
3574000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
B3E8EFE000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
48EE000
|
stack
|
page read and write
|
||
60E5000
|
trusted library allocation
|
page read and write
|
||
B3E8FFD000
|
stack
|
page read and write
|
||
1635E472000
|
unkown
|
page readonly
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
remote allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
163459D3000
|
trusted library allocation
|
page read and write
|
||
7430000
|
heap
|
page execute and read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
1635E6EB000
|
heap
|
page read and write
|
||
1634518B000
|
heap
|
page read and write
|
||
5DF6AEC000
|
stack
|
page read and write
|
||
2FAC000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B386000
|
trusted library allocation
|
page read and write
|
||
25EBFD1C000
|
unkown
|
page readonly
|
||
DC16DFD000
|
stack
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
5DF5BEC000
|
stack
|
page read and write
|
||
16345E55000
|
trusted library allocation
|
page read and write
|
||
B3E94FE000
|
stack
|
page read and write
|
||
5DF61EC000
|
stack
|
page read and write
|
||
16345EE3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B600000
|
trusted library allocation
|
page execute and read and write
|
||
2B021B62000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7FFD9B400000
|
trusted library allocation
|
page execute and read and write
|
||
163462CE000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
32DE000
|
stack
|
page read and write
|
||
7FFD9B510000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7F8000
|
stack
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
7A90000
|
heap
|
page read and write
|
||
249FF3F0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
24980155000
|
trusted library allocation
|
page read and write
|
||
163451AF000
|
heap
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
1635E9B0000
|
unkown
|
page readonly
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
2DEC000
|
heap
|
page read and write
|
||
16345F55000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page execute and read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
249FF0CC000
|
unkown
|
page readonly
|
||
DC15AF5000
|
stack
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
16355911000
|
trusted library allocation
|
page read and write
|
||
5DF63E9000
|
stack
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
2F05000
|
heap
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
B3E89D1000
|
stack
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
5141000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2FD000
|
trusted library allocation
|
page execute and read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
16346248000
|
trusted library allocation
|
page read and write
|
||
2B03A5A0000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7AA0000
|
heap
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
B3E97FE000
|
stack
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
16345150000
|
heap
|
page read and write
|
||
5053000
|
trusted library allocation
|
page read and write
|
||
25EBFD47000
|
unkown
|
page readonly
|
||
7FFD9B49E000
|
trusted library allocation
|
page read and write
|
||
4EDE000
|
stack
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
5DF73EC000
|
stack
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
B3E91FE000
|
stack
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page execute and read and write
|
||
2B03A2AC000
|
heap
|
page read and write
|
||
51C6000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
4DD2000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
4FFC000
|
stack
|
page read and write
|
||
2B03A285000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
C7E000
|
unkown
|
page read and write
|
||
7FFD9B304000
|
trusted library allocation
|
page read and write
|
||
1635E710000
|
heap
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B48D000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
2B03A5AF000
|
heap
|
page read and write
|
||
4DD5000
|
trusted library allocation
|
page execute and read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
5DF64EC000
|
stack
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
5DF5CE9000
|
stack
|
page read and write
|
||
249FFAE6000
|
unkown
|
page readonly
|
||
74F9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B470000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
2B03A5A6000
|
heap
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
5DF47E9000
|
stack
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
BD7000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
509E000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7530000
|
trusted library allocation
|
page read and write
|
||
4D30000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2D0000
|
trusted library allocation
|
page read and write
|
||
1635E470000
|
unkown
|
page readonly
|
||
2F99000
|
heap
|
page read and write
|
||
25EBFD1E000
|
unkown
|
page readonly
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
7510000
|
heap
|
page execute and read and write
|
||
4B0A000
|
heap
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
2B03A271000
|
heap
|
page read and write
|
||
4890000
|
trusted library allocation
|
page read and write
|
||
7FFD9B33C000
|
trusted library allocation
|
page execute and read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
3264000
|
heap
|
page read and write
|
||
2C20000
|
heap
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
5060000
|
heap
|
page read and write
|
||
5DF3B9F000
|
stack
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
5131000
|
trusted library allocation
|
page read and write
|
||
1635E731000
|
heap
|
page read and write
|
||
16345A88000
|
trusted library allocation
|
page read and write
|
||
BC9000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74E4000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
DC165FC000
|
stack
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
25EA6E4F000
|
heap
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
heap
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
249FFAE4000
|
unkown
|
page readonly
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
163459C3000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
492E000
|
stack
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7450000
|
trusted library allocation
|
page read and write
|
||
2B01FEC4000
|
unkown
|
page readonly
|
||
16345CE5000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
25EBFD33000
|
unkown
|
page readonly
|
||
7FFD9B4F0000
|
trusted library allocation
|
page execute and read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
4737000
|
trusted library allocation
|
page execute and read and write
|
||
C10000
|
heap
|
page read and write
|
||
7FFD9B390000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
1635E6FF000
|
heap
|
page read and write
|
||
163454B5000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
5DF83FE000
|
stack
|
page read and write
|
||
1635E7F4000
|
heap
|
page read and write
|
||
74F1000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
249FFAC2000
|
unkown
|
page readonly
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4A0000
|
trusted library allocation
|
page read and write
|
||
2F7C000
|
heap
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
DC15EFB000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B580000
|
trusted library allocation
|
page read and write
|
||
B3E90FE000
|
stack
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2D2000
|
trusted library allocation
|
page read and write
|
||
51C2000
|
trusted library allocation
|
page read and write
|
||
7F3D0000
|
trusted library allocation
|
page execute and read and write
|
||
7540000
|
heap
|
page read and write
|
||
7FFD9B39C000
|
trusted library allocation
|
page execute and read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
25EA6CA0000
|
heap
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
A9C000
|
stack
|
page read and write
|
||
50C1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4E0000
|
trusted library allocation
|
page read and write
|
||
BB44341000
|
stack
|
page read and write
|
||
85E000
|
stack
|
page read and write
|
||
16345A8C000
|
trusted library allocation
|
page read and write
|
||
96B000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
791D000
|
stack
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
2B03A3F0000
|
unkown
|
page readonly
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
163462C5000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
5DF82EC000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74A5000
|
trusted library allocation
|
page read and write
|
||
74E4000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
249FF2EA000
|
heap
|
page read and write
|
||
5DF7BF7000
|
stack
|
page read and write
|
||
5DF60EC000
|
stack
|
page read and write
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
16345A80000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2E3000
|
trusted library allocation
|
page execute and read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
2E64000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
1635EEA0000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B390000
|
trusted library allocation
|
page read and write
|
||
7DD000
|
stack
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
249FFB4A000
|
unkown
|
page readonly
|
||
327D000
|
stack
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
34C1000
|
heap
|
page read and write
|
||
25EA7530000
|
unkown
|
page readonly
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4D0000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
163462C8000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
5144000
|
trusted library allocation
|
page read and write
|
||
7540000
|
remote allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
A95000
|
heap
|
page read and write
|
||
249FF9E0000
|
heap
|
page read and write
|
||
5DF4FE9000
|
stack
|
page read and write
|
||
DC16AFC000
|
stack
|
page read and write
|
||
16345A94000
|
trusted library allocation
|
page read and write
|
||
2E70000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
5DF3FEC000
|
stack
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
16345F5B000
|
trusted library allocation
|
page read and write
|
||
5DF54FB000
|
stack
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
16345976000
|
trusted library allocation
|
page read and write
|
||
3553000
|
heap
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
5DF6FEC000
|
stack
|
page read and write
|
||
74F5000
|
trusted library allocation
|
page read and write
|
||
DC166FB000
|
stack
|
page read and write
|
||
74AC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B490000
|
trusted library allocation
|
page read and write
|
||
249FFB10000
|
unkown
|
page readonly
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
25EBFD6C000
|
unkown
|
page readonly
|
||
7540000
|
trusted library allocation
|
page execute and read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
2F7C000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2FB000
|
trusted library allocation
|
page execute and read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4A0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
2DCA000
|
heap
|
page read and write
|
||
BB451FE000
|
stack
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
498B000
|
trusted library allocation
|
page execute and read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
746C000
|
trusted library allocation
|
page execute and read and write
|
||
2FAB000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
49B6000
|
heap
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7469000
|
trusted library allocation
|
page execute and read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
2B03A5C2000
|
heap
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
163459BB000
|
trusted library allocation
|
page read and write
|
||
16345EE5000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7530000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B476000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
16345EF9000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
77DE000
|
stack
|
page read and write
|
||
7FFD9B493000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
D6E000
|
stack
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
163450D0000
|
heap
|
page read and write
|
||
25EBFD41000
|
unkown
|
page readonly
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
2DF8000
|
heap
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
5DF62EC000
|
stack
|
page read and write
|
||
16355974000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74F5000
|
trusted library allocation
|
page read and write
|
||
7450000
|
trusted library allocation
|
page read and write
|
||
4BBC000
|
trusted library allocation
|
page execute and read and write
|
||
16345B06000
|
trusted library allocation
|
page read and write
|
||
C16000
|
heap
|
page read and write
|
||
495D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B4B5000
|
trusted library allocation
|
page read and write
|
||
5DF42FE000
|
stack
|
page read and write
|
||
2B03A2BB000
|
heap
|
page read and write
|
||
7544000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
7FFD9B500000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
4860000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B2F4000
|
trusted library allocation
|
page read and write
|
||
5145000
|
heap
|
page read and write
|
||
5DF3EE9000
|
stack
|
page read and write
|
||
7A1E000
|
stack
|
page read and write
|
||
5DF50F8000
|
stack
|
page read and write
|
||
7FFD9B5D0000
|
trusted library allocation
|
page read and write
|
||
6D10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6B0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
4E75000
|
trusted library allocation
|
page execute and read and write
|
||
16345EDD000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
163451F6000
|
heap
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
24998408000
|
heap
|
page read and write
|
||
2F0B000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
24998490000
|
heap
|
page execute and read and write
|
||
1635E6F3000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
4730000
|
trusted library allocation
|
page read and write
|
||
25EBFE2D000
|
heap
|
page read and write
|
||
5DF65E8000
|
stack
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
25EBFCF4000
|
unkown
|
page readonly
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
4953000
|
trusted library allocation
|
page execute and read and write
|
||
4BB9000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B48C000
|
trusted library allocation
|
page read and write
|
||
5DF7DF7000
|
stack
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
25EBFD93000
|
heap
|
page read and write
|
||
5DF7AEC000
|
stack
|
page read and write
|
||
DC169FE000
|
stack
|
page read and write
|
||
16345D35000
|
trusted library allocation
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
1635E865000
|
heap
|
page read and write
|
||
34C6000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7A5E000
|
stack
|
page read and write
|
||
7FFD9B490000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
2B03A7A0000
|
heap
|
page execute and read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2E3000
|
trusted library allocation
|
page read and write
|
||
4DAD000
|
trusted library allocation
|
page execute and read and write
|
||
25EA75F0000
|
heap
|
page read and write
|
||
4BF0000
|
trusted library allocation
|
page read and write
|
||
4C6F000
|
stack
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
50C0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
2B02002E000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
5DF6CE9000
|
stack
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2D3000
|
trusted library allocation
|
page execute and read and write
|
||
25EBFD20000
|
unkown
|
page readonly
|
||
1635E2B0000
|
heap
|
page read and write
|
||
25EA6BF0000
|
unkown
|
page readonly
|
||
7FFD9B473000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
5DF85FC000
|
stack
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7FFD9B530000
|
trusted library allocation
|
page execute and read and write
|
||
50A0000
|
heap
|
page execute and read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
4800000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFD9B500000
|
trusted library allocation
|
page execute and read and write
|
||
2C28000
|
heap
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
249FFB16000
|
unkown
|
page readonly
|
||
249FF465000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
5DF43EC000
|
stack
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
3586000
|
heap
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
163462CA000
|
trusted library allocation
|
page read and write
|
||
1635E870000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
16345CD3000
|
trusted library allocation
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B470000
|
trusted library allocation
|
page read and write
|
||
496E000
|
stack
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
249FF0A0000
|
unkown
|
page readonly
|
||
16345A70000
|
trusted library allocation
|
page read and write
|
||
1635E85D000
|
heap
|
page read and write
|
||
7FFD9B4B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4E9000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
1635E2A0000
|
heap
|
page execute and read and write
|
||
5176000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
5103000
|
trusted library allocation
|
page read and write
|
||
16345E59000
|
trusted library allocation
|
page read and write
|
||
DC15DFE000
|
stack
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
BB448FE000
|
stack
|
page read and write
|
||
163462CC000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
1635E240000
|
trusted library allocation
|
page read and write
|
||
2B03A343000
|
heap
|
page read and write
|
||
B3E8CFE000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
5DF4AFF000
|
stack
|
page read and write
|
||
7FFD9B400000
|
trusted library allocation
|
page execute and read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
16345E6B000
|
trusted library allocation
|
page read and write
|
||
C35000
|
heap
|
page read and write
|
||
2F8F000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2E3000
|
trusted library allocation
|
page execute and read and write
|
||
287BED55000
|
heap
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
1635E33B000
|
heap
|
page read and write
|
||
3548000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
249FFB20000
|
unkown
|
page readonly
|
||
7FFD9B2ED000
|
trusted library allocation
|
page execute and read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2D4000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
49EE000
|
stack
|
page read and write
|
||
16345AAD000
|
trusted library allocation
|
page read and write
|
||
51A5000
|
trusted library allocation
|
page read and write
|
||
5DF74F7000
|
stack
|
page read and write
|
||
7530000
|
trusted library allocation
|
page read and write
|
||
4E50000
|
trusted library allocation
|
page read and write
|
||
25EBFDEE000
|
heap
|
page read and write
|
||
4B4E000
|
stack
|
page read and write
|
||
25EA763B000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2F4000
|
trusted library allocation
|
page read and write
|
||
16345EFB000
|
trusted library allocation
|
page read and write
|
||
4BB0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
25EBFD39000
|
unkown
|
page readonly
|
||
920000
|
heap
|
page read and write
|
||
25EA7743000
|
trusted library allocation
|
page read and write
|
||
5135000
|
trusted library allocation
|
page read and write
|
||
2B0219B0000
|
heap
|
page read and write
|
||
1635E863000
|
heap
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B480000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2E4000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
249FFAF9000
|
unkown
|
page readonly
|
||
16345947000
|
trusted library allocation
|
page read and write
|
||
2F6B000
|
stack
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2E0000
|
trusted library allocation
|
page read and write
|
||
1635EAE9000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
326D000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3B6000
|
trusted library allocation
|
page execute and read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
515A000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
5DF70EB000
|
stack
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
4DD7000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B30B000
|
trusted library allocation
|
page execute and read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
25EA6E76000
|
heap
|
page read and write
|
||
7FFD9B2ED000
|
trusted library allocation
|
page execute and read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
25EBFD35000
|
unkown
|
page readonly
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7460000
|
trusted library allocation
|
page read and write
|
||
4FA8000
|
trusted library allocation
|
page read and write
|
||
355A000
|
heap
|
page read and write
|
||
3306000
|
heap
|
page read and write
|
||
5DF78F8000
|
stack
|
page read and write
|
||
7FFD9B2ED000
|
trusted library allocation
|
page execute and read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B32C000
|
trusted library allocation
|
page execute and read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
4BF0000
|
trusted library allocation
|
page read and write
|
||
2DDF000
|
stack
|
page read and write
|
||
769E000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFD9B483000
|
trusted library allocation
|
page read and write
|
||
D05000
|
heap
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
25EB760D000
|
trusted library allocation
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
163458EA000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
25EBFE18000
|
heap
|
page read and write
|
||
330E000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFD9B396000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
25EBFCE1000
|
unkown
|
page readonly
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
473B000
|
trusted library allocation
|
page execute and read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
249FFB26000
|
unkown
|
page readonly
|
||
BB447FF000
|
stack
|
page read and write
|
||
799E000
|
stack
|
page read and write
|
||
249FF150000
|
heap
|
page read and write
|
||
5DF4CFC000
|
stack
|
page read and write
|
||
4BA0000
|
trusted library allocation
|
page read and write
|
||
48A0000
|
heap
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
50BF000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
BB44FFE000
|
stack
|
page read and write
|
||
7530000
|
trusted library allocation
|
page read and write
|
||
287BEAC0000
|
heap
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7A60000
|
heap
|
page read and write
|
||
73EE000
|
stack
|
page read and write
|
||
74D0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
745E000
|
stack
|
page read and write
|
||
2B03A320000
|
heap
|
page read and write
|
||
287BEB20000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
710E000
|
stack
|
page read and write
|
||
24998436000
|
heap
|
page read and write
|
||
3558000
|
heap
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
16345460000
|
heap
|
page execute and read and write
|
||
4F68000
|
trusted library allocation
|
page read and write
|
||
50D1000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2F0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3F0000
|
trusted library allocation
|
page execute and read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
16345196000
|
heap
|
page read and write
|
||
25EBFE4B000
|
heap
|
page read and write
|
||
D7D000
|
stack
|
page read and write
|
||
329E000
|
stack
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
B9A000
|
heap
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
4970000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
16345E1D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B540000
|
trusted library allocation
|
page execute and read and write
|
||
2B03A340000
|
heap
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
DC167FE000
|
stack
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
5DF45FE000
|
stack
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
249FF348000
|
heap
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
47E7000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
7FFD9B4F9000
|
trusted library allocation
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
16345D33000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
775E000
|
stack
|
page read and write
|
||
50D0000
|
heap
|
page read and write
|
||
4DA0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2E0000
|
trusted library allocation
|
page read and write
|
||
5DF81EC000
|
stack
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page execute and read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B570000
|
trusted library allocation
|
page execute and read and write
|
||
EE2A2ED000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
16345F5D000
|
trusted library allocation
|
page read and write
|
||
4B90000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
25EBFE13000
|
heap
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
3553000
|
heap
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
7540000
|
remote allocation
|
page read and write
|
||
7FFD9B2FD000
|
trusted library allocation
|
page execute and read and write
|
||
BF5000
|
heap
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
7564000
|
trusted library allocation
|
page read and write
|
||
249FFB48000
|
unkown
|
page readonly
|
||
16345420000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
9A8000
|
stack
|
page read and write
|
||
3577000
|
heap
|
page read and write
|
||
24998365000
|
heap
|
page read and write
|
||
74A5000
|
trusted library allocation
|
page read and write
|
||
4C10000
|
heap
|
page execute and read and write
|
||
34E7000
|
heap
|
page read and write
|
||
A5C000
|
stack
|
page read and write
|
||
4A2F000
|
stack
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2F3000
|
trusted library allocation
|
page read and write
|
||
2B020069000
|
heap
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
4DB4000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
4D40000
|
trusted library allocation
|
page read and write
|
||
47EF000
|
stack
|
page read and write
|
||
7FFD9B4C0000
|
trusted library allocation
|
page read and write
|
||
4990000
|
trusted library allocation
|
page read and write
|
||
7530000
|
trusted library allocation
|
page read and write
|
||
5DF4EFE000
|
stack
|
page read and write
|
||
2E50000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
BB44BFE000
|
stack
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
2F68000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
4C2E000
|
stack
|
page read and write
|
||
714E000
|
stack
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
1635E767000
|
heap
|
page read and write
|
||
754C000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
163558F1000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7FC50000
|
trusted library allocation
|
page execute and read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
2F99000
|
heap
|
page read and write
|
||
7FFD9B4F0000
|
trusted library allocation
|
page execute and read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2E2000
|
trusted library allocation
|
page read and write
|
||
249FFAFF000
|
unkown
|
page readonly
|
||
6E30000
|
heap
|
page execute and read and write
|
||
16345B0F000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7470000
|
trusted library allocation
|
page read and write
|
||
74E3000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
2B01FF75000
|
heap
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
BB44AFE000
|
stack
|
page read and write
|
||
16345959000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
249FFB1C000
|
unkown
|
page readonly
|
||
7FFD9B4AD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3C6000
|
trusted library allocation
|
page execute and read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
2F8F000
|
heap
|
page read and write
|
||
5DF6DEC000
|
stack
|
page read and write
|
||
DC163FF000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
25EBFD31000
|
unkown
|
page readonly
|
||
4E77000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B2D0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
249FF30B000
|
heap
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B510000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
1635E76D000
|
heap
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B490000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
249FFB1E000
|
unkown
|
page readonly
|
||
359F000
|
stack
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
6FCE000
|
stack
|
page read and write
|
||
4E54000
|
trusted library allocation
|
page read and write
|
||
2B03A226000
|
heap
|
page read and write
|
||
4F7F000
|
stack
|
page read and write
|
||
16345E51000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
4B8D000
|
stack
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7AD5000
|
heap
|
page read and write
|
||
25EA6F70000
|
heap
|
page read and write
|
||
249FFAA2000
|
unkown
|
page readonly
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
DC160FE000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7541000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
BB446FE000
|
stack
|
page read and write
|
||
25EBFD67000
|
unkown
|
page readonly
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
503E000
|
stack
|
page read and write
|
||
25EA6E16000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B48A000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
16346244000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
25EA6F95000
|
heap
|
page read and write
|
||
5DF7EF8000
|
stack
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
CCE000
|
stack
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
7080000
|
heap
|
page execute and read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2F0000
|
trusted library allocation
|
page read and write
|
||
754E000
|
trusted library allocation
|
page read and write
|
||
2B03A5DF000
|
heap
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
2E63000
|
trusted library allocation
|
page execute and read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
25EBFD69000
|
unkown
|
page readonly
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
50BD000
|
trusted library allocation
|
page execute and read and write
|
||
4900000
|
heap
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
249FF270000
|
heap
|
page read and write
|
||
7FFD9B3A0000
|
trusted library allocation
|
page execute and read and write
|
||
73F0000
|
trusted library allocation
|
page read and write
|
||
249FFB37000
|
unkown
|
page readonly
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
5DF69EC000
|
stack
|
page read and write
|
||
7FFD9B30D000
|
trusted library allocation
|
page execute and read and write
|
||
2498012C000
|
trusted library allocation
|
page read and write
|
||
1634598B000
|
trusted library allocation
|
page read and write
|
||
4F5E000
|
stack
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2E4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2E0000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
16345A30000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6C0000
|
trusted library allocation
|
page read and write
|
||
5050000
|
trusted library allocation
|
page read and write
|
||
7FFD9B300000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
heap
|
page readonly
|
||
3640000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
5DF84FE000
|
stack
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
DC162FE000
|
stack
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
163459BF000
|
trusted library allocation
|
page read and write
|
||
25EA6DA0000
|
heap
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2ED000
|
trusted library allocation
|
page execute and read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
2B0319F1000
|
trusted library allocation
|
page read and write
|
||
7409000
|
trusted library allocation
|
page execute and read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
16345AA9000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
771E000
|
stack
|
page read and write
|
||
4987000
|
trusted library allocation
|
page execute and read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
249FF2ED000
|
heap
|
page read and write
|
||
49A0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
BBC000
|
heap
|
page read and write
|
||
25EA6D80000
|
heap
|
page read and write
|
||
7FFD9B510000
|
trusted library allocation
|
page read and write
|
||
7F5F0000
|
trusted library allocation
|
page execute and read and write
|
||
34E7000
|
heap
|
page read and write
|
||
25EBFD3F000
|
unkown
|
page readonly
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B33C000
|
trusted library allocation
|
page execute and read and write
|
||
1635D920000
|
trusted library allocation
|
page read and write
|
||
3760000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
5DF3BDF000
|
stack
|
page read and write
|
||
25EBFD3D000
|
unkown
|
page readonly
|
||
2B01FEA0000
|
unkown
|
page readonly
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
3730000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
32E5000
|
heap
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
2E6D000
|
trusted library allocation
|
page execute and read and write
|
||
1635E2A3000
|
heap
|
page execute and read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
25EA772C000
|
trusted library allocation
|
page read and write
|
||
74D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4C6000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
7FFD9B5B0000
|
trusted library allocation
|
page read and write
|
||
33E5000
|
heap
|
page read and write
|
||
7A20000
|
remote allocation
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
5DF80ED000
|
stack
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
DC15CFE000
|
stack
|
page read and write
|
||
2B02000A000
|
heap
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
2B03A5C5000
|
heap
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
16345140000
|
trusted library allocation
|
page read and write
|
||
7551000
|
trusted library allocation
|
page read and write
|
||
4E7B000
|
trusted library allocation
|
page execute and read and write
|
||
16345D2F000
|
trusted library allocation
|
page read and write
|
||
7A5E000
|
stack
|
page read and write
|
||
16345A7C000
|
trusted library allocation
|
page read and write
|
||
34CF000
|
heap
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7FFD9B32C000
|
trusted library allocation
|
page execute and read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2DD000
|
trusted library allocation
|
page execute and read and write
|
||
49A0000
|
trusted library allocation
|
page execute and read and write
|
||
32E0000
|
heap
|
page read and write
|
||
5DF41FD000
|
stack
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
5156000
|
trusted library allocation
|
page read and write
|
||
34A0000
|
heap
|
page read and write
|
||
25EBFCF2000
|
unkown
|
page readonly
|
||
7FFD9B4F0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
16345E65000
|
trusted library allocation
|
page read and write
|
||
4E3E000
|
stack
|
page read and write
|
||
4DDB000
|
trusted library allocation
|
page execute and read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
2B01FF80000
|
heap
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
76DE000
|
stack
|
page read and write
|
||
4BEF000
|
stack
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
51B4000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
4EE0000
|
heap
|
page readonly
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
50B8000
|
trusted library allocation
|
page read and write
|
||
16345C5A000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
4870000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
249FF321000
|
heap
|
page read and write
|
||
1635DC7C000
|
heap
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
BB450FD000
|
stack
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
5DF4DF7000
|
stack
|
page read and write
|
||
5DF52E9000
|
stack
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
16345F5F000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
74D0000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
16345ADB000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
287BEAB0000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
2B03A5CF000
|
heap
|
page read and write
|
||
7FFD9B4E0000
|
trusted library allocation
|
page read and write
|
||
7544000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
4BF0000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFD9B396000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
5DF67EC000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
3548000
|
heap
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
2B03A296000
|
heap
|
page read and write
|
||
5C21000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4B0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B390000
|
trusted library allocation
|
page execute and read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
D0E000
|
stack
|
page read and write
|
||
7510000
|
trusted library allocation
|
page execute and read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B480000
|
trusted library allocation
|
page read and write
|
||
3587000
|
heap
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3B6000
|
trusted library allocation
|
page execute and read and write
|
||
517E000
|
trusted library allocation
|
page read and write
|
||
5DF59FD000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2DD000
|
trusted library allocation
|
page execute and read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
2B03A484000
|
unkown
|
page readonly
|
||
7FFD9B4E0000
|
trusted library allocation
|
page read and write
|
||
4960000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
DC168FC000
|
stack
|
page read and write
|
||
7543000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5A0000
|
trusted library allocation
|
page read and write
|
||
2B03A29A000
|
heap
|
page read and write
|
||
7FFD9B5E0000
|
trusted library allocation
|
page read and write
|
||
34AA000
|
heap
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4BD000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
75DE000
|
stack
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B500000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2F0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
7480000
|
trusted library allocation
|
page execute and read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
4B93000
|
trusted library allocation
|
page read and write
|
||
25EA6F75000
|
heap
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
16345B43000
|
trusted library allocation
|
page read and write
|
||
7A20000
|
remote allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
4FFE000
|
stack
|
page read and write
|
||
16345AB1000
|
trusted library allocation
|
page read and write
|
||
1635E51E000
|
unkown
|
page readonly
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
5DF7CEC000
|
stack
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B540000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
32BC000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74A5000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
1635EFA0000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
5DF48FF000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7A20000
|
remote allocation
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
CBE000
|
stack
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
5DF51E9000
|
stack
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
25EA7751000
|
trusted library allocation
|
page read and write
|
||
510B000
|
trusted library allocation
|
page read and write
|
||
DC16FFB000
|
stack
|
page read and write
|
||
2B03A1C0000
|
heap
|
page read and write
|
||
504E000
|
stack
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7BA0000
|
heap
|
page read and write
|
||
16345AFD000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
59C1000
|
trusted library allocation
|
page read and write
|
||
16345B11000
|
trusted library allocation
|
page read and write
|
||
2499000D000
|
trusted library allocation
|
page read and write
|
||
249FFB24000
|
unkown
|
page readonly
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
BB44EFE000
|
stack
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
6D00000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
1635E980000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
16345AA5000
|
trusted library allocation
|
page read and write
|
||
60E1000
|
trusted library allocation
|
page read and write
|
||
16345F57000
|
trusted library allocation
|
page read and write
|
||
505D000
|
trusted library allocation
|
page execute and read and write
|
||
4BF0000
|
trusted library allocation
|
page read and write
|
||
74EE000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
513D000
|
trusted library allocation
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B38C000
|
trusted library allocation
|
page execute and read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
2FA7000
|
stack
|
page read and write
|
||
163459C7000
|
trusted library allocation
|
page read and write
|
||
5059000
|
heap
|
page read and write
|
||
2F8F000
|
heap
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
25EBFD43000
|
unkown
|
page readonly
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
7FFD9B38C000
|
trusted library allocation
|
page execute and read and write
|
||
5106000
|
trusted library allocation
|
page read and write
|
||
25EBFD05000
|
unkown
|
page readonly
|
||
7FFD9B2D4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B690000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
163451B5000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
2B03A240000
|
heap
|
page read and write
|
||
DC161FE000
|
stack
|
page read and write
|
||
2E60000
|
trusted library allocation
|
page read and write
|
||
249FFB12000
|
unkown
|
page readonly
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
740C000
|
trusted library allocation
|
page execute and read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
2B03A222000
|
heap
|
page read and write
|
||
25EA7755000
|
trusted library allocation
|
page read and write
|
||
3284000
|
heap
|
page read and write
|
||
6D10000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
25EBFD07000
|
unkown
|
page readonly
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
7F3E8000
|
trusted library allocation
|
page execute and read and write
|
||
16345B32000
|
trusted library allocation
|
page read and write
|
||
249FF230000
|
heap
|
page read and write
|
||
5173000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2D3000
|
trusted library allocation
|
page execute and read and write
|
||
2F60000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
49C1000
|
trusted library allocation
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
4D4D000
|
trusted library allocation
|
page execute and read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
2B020022000
|
heap
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
287BEB28000
|
heap
|
page read and write
|
||
16345A84000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFD9B487000
|
trusted library allocation
|
page read and write
|
||
249FF311000
|
heap
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
There are 2072 hidden memdumps, click here to show them.