Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
9rSeCZbjZE.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
initial sample
|
||
C:\Config.Msi\6788d3.rbs
|
data
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\BouncyCastle.Crypto.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\System.ValueTuple.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI8AD6.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI8AD6.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI8AD6.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI90F1.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI90F1.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI90F1.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIA257.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSIA257.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIA257.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIA873.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSIBFA8.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
modified
|
||
C:\Windows\Installer\MSIBFA8.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIBFA8.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\System32\InstallUtil.InstallLog
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\~DF03F7F4E9FB6913B4.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF329B2876A41199DB.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF605B4EFF8857F184.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF861F9EB41197E865.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF9BE70E11C712AC71.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFE286531BC9E5DA5B.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallState
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation.zip
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.ini
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AteraAgent.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\Installer\6788d2.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\6788d4.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\MSI8AD6.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSI8AD6.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI8AD6.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI90F1.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSI90F1.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI90F1.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIA257.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSIA257.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIA257.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIA883.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIA8E2.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIA9DD.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIBFA8.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSIBFA8.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIBFA8.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SourceHash{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
Certificate, Version=3
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
|
Certificate, Version=3
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageAgentInformation.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\Temp\~DF2AC55C925B773F74.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF79FF23373A05C1F3.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF9D959851B3998715.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFEC06232194559246.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFECAFB6D246C1D17D.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFFF03F3AA2EBF4357.TMP
|
data
|
dropped
|
||
\Device\ConDrv
|
JSON data
|
dropped
|
There are 68 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI8AD6.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6786046 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI90F1.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6787359 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSIA257.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6791812 11 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="Moshe@nlc.co.il" /CompanyId="1" /IntegratorLoginUI=""
/CompanyIdUI="" /FolderId="" /AccountId="001Q300000MFxEPIA1" /AgentId="95230b78-0b09-4026-a7c5-5fe4c9d15b4c"
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSIBFA8.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6799296 33 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
95230b78-0b09-4026-a7c5-5fe4c9d15b4c "172d5505-5af0-4cb3-8690-0091fd98422a" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000MFxEPIA1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
95230b78-0b09-4026-a7c5-5fe4c9d15b4c "5232f273-c62e-437a-a74a-dca82f700d20" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000MFxEPIA1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
95230b78-0b09-4026-a7c5-5fe4c9d15b4c "79c2d964-37c1-436b-8678-a4e34369f725" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000MFxEPIA1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
95230b78-0b09-4026-a7c5-5fe4c9d15b4c "63fd8206-ed43-4ef7-8433-4a2d0eb92cc2" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000MFxEPIA1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
95230b78-0b09-4026-a7c5-5fe4c9d15b4c "ac52b191-a405-4d89-8808-a9c06c02ac20" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000MFxEPIA1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
95230b78-0b09-4026-a7c5-5fe4c9d15b4c "05b46de6-24e7-4784-8ae7-29fe3f62e039" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000MFxEPIA1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
95230b78-0b09-4026-a7c5-5fe4c9d15b4c "72b97848-a05f-4dfa-a8b2-0f7698832a4d" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000MFxEPIA1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
95230b78-0b09-4026-a7c5-5fe4c9d15b4c "9b12e3ad-6f98-4af0-a9fc-ab8da217520c" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000MFxEPIA1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\9rSeCZbjZE.msi"
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding 91E370BBCC1D3B173FA78F8D350BDC0E
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding 94F3C551036B6C48A24EF7F120DCA15A E Global\MSI0000
|
||
C:\Windows\SysWOW64\net.exe
|
"NET" STOP AteraAgent
|
||
C:\Windows\SysWOW64\net1.exe
|
C:\Windows\system32\net1 STOP AteraAgent
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"TaskKill.exe" /f /im AteraAgent.exe
|
||
C:\Windows\System32\sc.exe
|
"C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
|
There are 24 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=8ad3dbb8-dc1b-4e34-9cfd-9bde8068a524&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
http://schemas.datacontract.org
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=6728aeeb-ea10-4200-b8f3-dc55e64f1910&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
http://crl.microsoft
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=12b69d45-e208-429e-a1ba-7a4685b8d33f&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=f8bbbde1-132d-4c8b-a3f7-92801d85c6f6&tr=42&tt=17278895971611335&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://agent-api.atera.com/Production/Agent/GetCommands)
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=3676162b-6928-4fd8-b93b-5b9fd57a4bc9&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://agent-api.atera.com/Production/Agent/track-event
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=52378df9-3005-41cc-99a3-005f1aea746b&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
http://dl.google.com/googletalk/googletalk-setup.exe
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=bf8cfa76-7e1e-40bc-8430-cbc98e2b9cf4&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=17243d50-1dca-4ab3-8ffd-cdd1f9da06cf
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=db56a22c-5f27-4d90-bb5f-c1c03b70a2f0&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://agent-api.atera.com/Production/Agent/GetCommands0
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=51f162c7-d222-4991-a832-8f92cc099f2b
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=0057edd1-fdd5-48b9-8810-4c380add5c94&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=78a683fe-d9e2-4a77-b254-ef31610e8e8a
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=bb15c2cd-6944-449d-a45c-725c69499a75&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://agent-api.atera.com/Production/Agent/
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=d54a26d4-9bd6-42e4-80a6-a4a4e3ba5c02&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
http://schemas.datacontract.org/2004/07/System.ServiceProcess
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=79393e20-2c61-46ac-ae9a-25b77ed36f5f
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=00b247cc-4cad-4ea9-8d05-ff45cdabe262&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.229
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=0e034632-921f-4c18-8631-e930e7781cdd&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
http://wixtoolset.org
|
unknown
|
||
https://agent-api.atera.com/Production
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=0b04195d-e261-4ae6-9124-2e9ef139c80e&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.Watchdog/1.5/Agent.Package.Watchdog.zip
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=9971de24-c245-46f4-9d3f-d02f38f0d7af&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://agent-api.atera.com/Production/Agent/GetCommandsFallback2
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=8a4128bc-8a19-4909-a1e6-b35d010bab34&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://agent-api.atera.com/Production/Agent/GetCommandsFallback0
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageRuntimeInstaller/13.0/AgentPackageRuntimeInstaller
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=41fc8591-dd69-4f5b-a48c-932e4462c851&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
http://acontrol.atera.com/
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=bca747a8-f8aa-4561-b240-83faa7e7e63d&tt=0&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=e051bd32-0461-46bc-8f46-18bc35b67f58&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://agent-api.atera.com/Production/Agent/AgentStarting)
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageAgentInformation/37.9/AgentPackageAgentInformation
|
unknown
|
||
https://ps.pndsn.com
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=68d2cd14-add9-4c6c-a93e-77e26890884e
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=c3db43af-b183-4a52-8bab-34b9b35414fc&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageNetworkDiscovery/23.9/AgentPackageNetworkDiscove
|
unknown
|
||
http://agent-api.atera.com
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=e72fe1fd-d99c-400f-8cf3-5c7c15cf01f0
|
unknown
|
||
http://schemas.datacontract.org/2004/07/
|
unknown
|
||
https://github.com/icsharpcode/SharpZipLib
|
unknown
|
||
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageAgentI
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=fa8df594-b53d-487d-a304-ba12fa5b05b3&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=ea22bbfe-080d-4cf3-a894-9d96c46b6665&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.229
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=2e5bb07e-44ac-4f12-8635-048ca789db44&tt=0&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=51f162c7-d222-4991-a832-8f92cc099f2b&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=e6d10987-75b3-41c1-a771-6d1daf1f7e97&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=aba03e32-f581-41ec-8949-2ce94c13458d&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.229
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=16f10dd5-c904-4ca2-9553-772cf48281d3&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageTaskScheduler/17.2/AgentPackageTaskScheduler.zip
|
unknown
|
||
https://ps.pndsn.co
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=c36b9e71-cfbf-49fb-af12-137d82096f5b&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=f1517159-0a09-4cba-8a1d-213d326612aa&tt=0&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://agent-api.atera.com
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/AgentStarting
|
unknown
|
||
http://www.w3.oh
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetCommands
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=526a1f2f-a5ab-4bde-a18e-298b4847f820&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=587dc040-7dcb-4e3f-a1ce-624d9532bced&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=249c43d7-88d8-467f-9b13-1cfc96512eed&tr=42&tt=17278895941555670&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=7d1d3776-a9ff-4157-bb82-b018697910e8&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=5c45c37a-efc4-492f-83b1-e18abf8aff03&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://agent-api.atera.com/
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetCommandsFallbackp
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetRecurringPackages
|
unknown
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.Availability/13.0/Agent.Package.Availability.zip
|
unknown
|
||
https://www.newtonsoft.com/jsonschema
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=ca02cb15-9afc-4f4c-87ba-02c0d5b8b22e&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
http://cacerts.digicert.F
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=e081e7e0-a9d2-4109-9370-9c9c176afebd&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=f72e8789-8756-4d61-b645-903501079ede&tt=0&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageRuntimeInstaller/1.5/AgentPackageRuntimeInstaller.
|
unknown
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.Watchdog/13.0/Agent.Package.Watchdog.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=d5643216-616f-4378-8575-222d8fa4f458&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=5d17a2da-332b-4264-ba43-80ed873a75d5&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=4f5157e7-f4c6-446f-92dd-afae16e89968&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.Availability/0.16/Agent.Package.Availability.z
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=a8e97ced-6d99-4374-ba29-94890053de07&tt=0&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=d5a52dd9-092a-47a9-965a-6b556c722544
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=14dba20c-b22d-4871-8f59-85d736c9c8d6&tt=0&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=e5a45665-f96e-48ac-9e65-cc9a23f1c43b&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=396ed718-c52f-4436-be61-3047cc7c4a72&tr=42&tt=17278895704154400&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://ps.atera.com/agentpackagesmac/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=1d9a933c-b5be-47b9-a98d-bd9c82ae0d0b&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
|
35.157.63.228
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=08b51ed0-2f58-4675-b289-2b6f9275c37c
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=8370432f-ad78-46cb-91a9-bb6b24dcdf0f
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=8e131c63-2299-4880-a366-a776a97dd0d3
|
unknown
|
||
https://www.newtonsoft.com/json
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/Age
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ps.pndsn.com
|
35.157.63.229
|
||
d25btwd9wax8gu.cloudfront.net
|
13.35.58.104
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
||
ps.atera.com
|
unknown
|
||
agent-api.atera.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
35.157.63.228
|
unknown
|
United States
|
||
35.157.63.229
|
ps.pndsn.com
|
United States
|
||
13.35.58.104
|
d25btwd9wax8gu.cloudfront.net
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\6788d3.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\6788d3.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB9EFD7FDAF9AD115987000E181661F5
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CD868C8CE5A308147ABB306D829266BC
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C32B8CE0327C1E141950B4C9C2AD4DA7
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D9B1B1F0B1FC024D9390FE4B94D97D5
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\007F59F54ACD08842B2D98A10E6D1E3A
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB25C26F7C51D3C4AA2BED5600F46956
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01010F83113E72A4C81AD77422D2F947
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01D9DC4B27DFC0340B543A11D3CEBE07
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\ATERA Networks\AteraAgent\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\ATERA Networks\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\7D0A237E2F2A7564CA141B792446E854
|
INSTALLFOLDER_files_Feature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Features
|
INSTALLFOLDER_files_Feature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
|
LastUsedSource
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
|
AutoBackupLogFiles
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AteraAgent
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
AccountId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
IntegratorLogin
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
CompanyId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
AgentId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
ServerName
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AlphaAgent
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
FileDirectory
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
FileDirectory
|
There are 137 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
232D77C5000
|
heap
|
page read and write
|
||
13A39330000
|
heap
|
page read and write
|
||
18F7E890000
|
heap
|
page read and write
|
||
29A8FCA0000
|
heap
|
page read and write
|
||
4879000
|
heap
|
page read and write
|
||
227F6C40000
|
heap
|
page read and write
|
||
1EF27180000
|
heap
|
page read and write
|
||
2CDA0C71000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
trusted library allocation
|
page read and write
|
||
18F7F8F0000
|
heap
|
page read and write
|
||
24D00001000
|
trusted library allocation
|
page read and write
|
||
2278017C000
|
trusted library allocation
|
page read and write
|
||
13A39BA3000
|
trusted library allocation
|
page read and write
|
||
232D7748000
|
heap
|
page read and write
|
||
22780089000
|
trusted library allocation
|
page read and write
|
||
1BC31A40000
|
heap
|
page read and write
|
||
24D00083000
|
trusted library allocation
|
page read and write
|
||
13A393EE000
|
heap
|
page read and write
|
||
227F9000000
|
heap
|
page read and write
|
||
2CDA0350000
|
heap
|
page read and write
|
||
290FB8AB000
|
heap
|
page read and write
|
||
18F7E8CF000
|
heap
|
page read and write
|
||
29A8F9BC000
|
heap
|
page read and write
|
||
290FB919000
|
heap
|
page read and write
|
||
2CDA039D000
|
heap
|
page read and write
|
||
18F7E899000
|
heap
|
page read and write
|
||
2278008C000
|
trusted library allocation
|
page read and write
|
||
290FB890000
|
heap
|
page read and write
|
||
7FFD341B4000
|
trusted library allocation
|
page read and write
|
||
29A903F3000
|
trusted library allocation
|
page read and write
|
||
290800BF000
|
trusted library allocation
|
page read and write
|
||
290FBB40000
|
heap
|
page read and write
|
||
29A901B1000
|
trusted library allocation
|
page read and write
|
||
1BC19151000
|
trusted library allocation
|
page read and write
|
||
1BC18928000
|
heap
|
page read and write
|
||
2CDA0CB7000
|
trusted library allocation
|
page read and write
|
||
2CDA0570000
|
heap
|
page read and write
|
||
24D00047000
|
trusted library allocation
|
page read and write
|
||
1EF276E1000
|
trusted library allocation
|
page read and write
|
||
1EF27018000
|
heap
|
page read and write
|
||
44FD000
|
heap
|
page read and write
|
||
13A39339000
|
heap
|
page read and write
|
||
24D00073000
|
trusted library allocation
|
page read and write
|
||
290FB8D3000
|
heap
|
page read and write
|
||
18F7E8CD000
|
heap
|
page read and write
|
||
22780001000
|
trusted library allocation
|
page read and write
|
||
227F6A0B000
|
heap
|
page read and write
|
||
232D7F63000
|
trusted library allocation
|
page read and write
|
||
18F00083000
|
trusted library allocation
|
page read and write
|
||
29A9021A000
|
trusted library allocation
|
page read and write
|
||
1BC189A5000
|
heap
|
page read and write
|
||
232D7780000
|
heap
|
page read and write
|
||
4224000
|
heap
|
page read and write
|
||
227800B2000
|
trusted library allocation
|
page read and write
|
||
1BC19197000
|
trusted library allocation
|
page read and write
|
||
29AA8E42000
|
heap
|
page read and write
|
||
24D748A0000
|
heap
|
page read and write
|
||
227F6792000
|
unkown
|
page readonly
|
||
13A39B31000
|
trusted library allocation
|
page read and write
|
||
29080047000
|
trusted library allocation
|
page read and write
|
||
290FB940000
|
heap
|
page read and write
|
||
1EF2779F000
|
trusted library allocation
|
page read and write
|
||
29A8F8E0000
|
heap
|
page read and write
|
||
232D7F73000
|
trusted library allocation
|
page read and write
|
||
227F8FE0000
|
heap
|
page read and write
|
||
C7BF4F5000
|
stack
|
page read and write
|
||
4784000
|
trusted library allocation
|
page read and write
|
||
232D78B2000
|
unkown
|
page readonly
|
||
24D000BF000
|
trusted library allocation
|
page read and write
|
||
2CDA0310000
|
heap
|
page read and write
|
||
22780132000
|
trusted library allocation
|
page read and write
|
||
13A39378000
|
heap
|
page read and write
|
||
227F69E6000
|
heap
|
page read and write
|
||
2CDA0CE3000
|
trusted library allocation
|
page read and write
|
||
29A90833000
|
trusted library allocation
|
page read and write
|
||
29080083000
|
trusted library allocation
|
page read and write
|
||
4AC7000
|
trusted library allocation
|
page read and write
|
||
232D775B000
|
heap
|
page read and write
|
||
1EF27763000
|
trusted library allocation
|
page read and write
|
||
227F8FD0000
|
heap
|
page read and write
|
||
13A393B6000
|
heap
|
page read and write
|
||
2CDA0242000
|
unkown
|
page readonly
|
||
18F000BF000
|
trusted library allocation
|
page read and write
|
||
18F7E91B000
|
heap
|
page read and write
|
||
232D7690000
|
heap
|
page read and write
|
||
2CDA0CF3000
|
trusted library allocation
|
page read and write
|
||
1BC18920000
|
heap
|
page read and write
|
||
29080073000
|
trusted library allocation
|
page read and write
|
||
13A395F0000
|
heap
|
page read and write
|
||
1BC188C0000
|
heap
|
page read and write
|
||
227800B4000
|
trusted library allocation
|
page read and write
|
||
227F6A6F000
|
heap
|
page read and write
|
||
18F00047000
|
trusted library allocation
|
page read and write
|
||
13A39B77000
|
trusted library allocation
|
page read and write
|
||
18F00001000
|
trusted library allocation
|
page read and write
|
||
1EF26F99000
|
heap
|
page read and write
|
||
29A9030A000
|
trusted library allocation
|
page read and write
|
||
232D7EF1000
|
trusted library allocation
|
page read and write
|
||
13A3936C000
|
heap
|
page read and write
|
||
1EF27727000
|
trusted library allocation
|
page read and write
|
||
4049000
|
heap
|
page read and write
|
||
29A90B25000
|
trusted library allocation
|
page read and write
|
||
13A39BB3000
|
trusted library allocation
|
page read and write
|
||
24D75766000
|
heap
|
page read and write
|
||
29AA8D5D000
|
heap
|
page read and write
|
||
29AA8B39000
|
heap
|
page read and write
|
||
29080001000
|
trusted library allocation
|
page read and write
|
||
1BC1920F000
|
trusted library allocation
|
page read and write
|
||
1BC1893B000
|
heap
|
page read and write
|
||
18F7EA70000
|
heap
|
page read and write
|
||
1EF26FD1000
|
heap
|
page read and write
|
||
1BC191D3000
|
trusted library allocation
|
page read and write
|
||
24D747A4000
|
heap
|
page read and write
|
||
29A8F91E000
|
heap
|
page read and write
|
||
4A21000
|
trusted library allocation
|
page read and write
|
||
227F69E0000
|
heap
|
page read and write
|
||
2CDA0D2F000
|
trusted library allocation
|
page read and write
|
||
290FB8CB000
|
heap
|
page read and write
|
||
1BC18963000
|
heap
|
page read and write
|
||
13A39BEF000
|
trusted library allocation
|
page read and write
|
||
227F6AAD000
|
heap
|
page read and write
|
||
1BC1895B000
|
heap
|
page read and write
|
||
24D7475C000
|
heap
|
page read and write
|
||
24D74728000
|
heap
|
page read and write
|
||
290FB898000
|
heap
|
page read and write
|
||
1EF26FCB000
|
heap
|
page read and write
|
||
232D777C000
|
heap
|
page read and write
|
||
1EF26F90000
|
heap
|
page read and write
|
||
1EF27050000
|
heap
|
page read and write
|
||
1BC191C3000
|
trusted library allocation
|
page read and write
|
||
1EF27753000
|
trusted library allocation
|
page read and write
|
||
227F6A21000
|
heap
|
page read and write
|
||
29A8F870000
|
heap
|
page read and write
|
||
227F901D000
|
heap
|
page read and write
|
||
18F00073000
|
trusted library allocation
|
page read and write
|
||
24D74720000
|
heap
|
page read and write
|
||
232D7740000
|
heap
|
page read and write
|
||
13A3934B000
|
heap
|
page read and write
|
||
29A8F96A000
|
heap
|
page read and write
|
||
2CDA0240000
|
unkown
|
page readonly
|
||
7FFD340CC000
|
trusted library allocation
|
page execute and read and write
|
||
13A3936E000
|
heap
|
page read and write
|
||
7FFD34240000
|
trusted library allocation
|
page read and write
|
||
2CDB9538000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
C7C0D29000
|
stack
|
page read and write
|
||
13A523D0000
|
heap
|
page read and write
|
||
26E5000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD34013000
|
trusted library allocation
|
page execute and read and write
|
||
65F0000
|
trusted library allocation
|
page read and write
|
||
4090000
|
trusted library allocation
|
page read and write
|
||
7FFD341C6000
|
trusted library allocation
|
page read and write
|
||
C7BFAFF000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6E09000
|
trusted library allocation
|
page execute and read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
5B567FE000
|
stack
|
page read and write
|
||
4870000
|
trusted library allocation
|
page read and write
|
||
13A52391000
|
heap
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
117000
|
stack
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD341E8000
|
trusted library allocation
|
page read and write
|
||
29AA9258000
|
heap
|
page read and write
|
||
7FFD34034000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
7FFD3401D000
|
trusted library allocation
|
page execute and read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
4070000
|
trusted library allocation
|
page read and write
|
||
29A90B45000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD3406C000
|
trusted library allocation
|
page execute and read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
2CDA0353000
|
heap
|
page read and write
|
||
1BC2915D000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD34209000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
18F7EA20000
|
trusted library allocation
|
page read and write
|
||
7F268000
|
trusted library allocation
|
page execute and read and write
|
||
312D000
|
heap
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
13A39240000
|
heap
|
page read and write
|
||
1EF26FB6000
|
heap
|
page read and write
|
||
3655000
|
heap
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
7FFD341EB000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
47F0000
|
heap
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
29A8FBD0000
|
trusted library allocation
|
page read and write
|
||
C7C092C000
|
stack
|
page read and write
|
||
4731000
|
trusted library allocation
|
page read and write
|
||
7FFD34254000
|
trusted library allocation
|
page read and write
|
||
6E30000
|
trusted library allocation
|
page read and write
|
||
7FFD341C0000
|
trusted library allocation
|
page read and write
|
||
41DE000
|
stack
|
page read and write
|
||
29A8F966000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
7FFD34120000
|
trusted library allocation
|
page execute and read and write
|
||
C7C1D29000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6B70000
|
trusted library allocation
|
page read and write
|
||
22780178000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
FD64CFF000
|
stack
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
29A5000
|
heap
|
page read and write
|
||
5B565FE000
|
stack
|
page read and write
|
||
1EF26DD0000
|
heap
|
page read and write
|
||
7FFD341D5000
|
trusted library allocation
|
page read and write
|
||
C7C1228000
|
stack
|
page read and write
|
||
29AA8EA1000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
18F7F98C000
|
heap
|
page read and write
|
||
46B3000
|
trusted library allocation
|
page read and write
|
||
232D74F0000
|
unkown
|
page readonly
|
||
3E5000
|
heap
|
page read and write
|
||
6E95000
|
trusted library allocation
|
page read and write
|
||
227F6840000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
18F7E8B6000
|
heap
|
page read and write
|
||
7FFD33FF8000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
29A907BF000
|
trusted library allocation
|
page read and write
|
||
47D0000
|
heap
|
page read and write
|
||
2A1D000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
2EBE000
|
stack
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
7FFD34014000
|
trusted library allocation
|
page read and write
|
||
1C145602000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
2CDA06D0000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD33FF4000
|
trusted library allocation
|
page read and write
|
||
227F8FE6000
|
heap
|
page read and write
|
||
7FFD33FFD000
|
trusted library allocation
|
page execute and read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6F10000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
4728000
|
trusted library allocation
|
page read and write
|
||
6E03000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD340B0000
|
trusted library allocation
|
page execute and read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFD3402D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD341CD000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
4B12000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD341AE000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
F4486FE000
|
stack
|
page read and write
|
||
4CE86FC000
|
stack
|
page read and write
|
||
A295AFF000
|
stack
|
page read and write
|
||
29AA8534000
|
heap
|
page read and write
|
||
29A8FBE3000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
A2957FE000
|
stack
|
page read and write
|
||
290FBA90000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
44B87FE000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
C7C2737000
|
stack
|
page read and write
|
||
708E000
|
stack
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
2660000
|
heap
|
page read and write
|
||
7FFD343C0000
|
trusted library allocation
|
page read and write
|
||
7FFD3401D000
|
trusted library allocation
|
page execute and read and write
|
||
232D76E0000
|
heap
|
page read and write
|
||
29AA01BE000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
5B232FE000
|
stack
|
page read and write
|
||
227F6920000
|
heap
|
page read and write
|
||
2E7B000
|
heap
|
page read and write
|
||
7FFD34242000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
13A523A4000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD34014000
|
trusted library allocation
|
page read and write
|
||
29AA8A40000
|
heap
|
page execute and read and write
|
||
3128000
|
heap
|
page read and write
|
||
C7BFE3E000
|
stack
|
page read and write
|
||
227F6A25000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6BD0000
|
remote allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
227F869B000
|
heap
|
page read and write
|
||
3391BFE000
|
stack
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
A2960FD000
|
stack
|
page read and write
|
||
13A392F0000
|
trusted library allocation
|
page read and write
|
||
6A63000
|
trusted library allocation
|
page read and write
|
||
29A90BC5000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
C7C2E29000
|
stack
|
page read and write
|
||
4267000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34003000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
2912F190000
|
heap
|
page read and write
|
||
679E000
|
stack
|
page read and write
|
||
227F6960000
|
heap
|
page read and write
|
||
7FFD33FF0000
|
trusted library allocation
|
page read and write
|
||
4220000
|
trusted library allocation
|
page read and write
|
||
7FFD34014000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
29A90357000
|
trusted library allocation
|
page read and write
|
||
4834000
|
trusted library allocation
|
page read and write
|
||
1EF2768C000
|
heap
|
page read and write
|
||
2A1D000
|
heap
|
page read and write
|
||
C7C043D000
|
stack
|
page read and write
|
||
6E9C000
|
trusted library allocation
|
page read and write
|
||
6A5E000
|
stack
|
page read and write
|
||
7FFD34030000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
1EF27671000
|
heap
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
4660000
|
trusted library allocation
|
page read and write
|
||
29A90275000
|
trusted library allocation
|
page read and write
|
||
A2959FD000
|
stack
|
page read and write
|
||
560000
|
trusted library section
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6D0E000
|
stack
|
page read and write
|
||
2DFF000
|
unkown
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
5395000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6F10000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
7FFD34010000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
7FFD34010000
|
trusted library allocation
|
page read and write
|
||
7FFD341F5000
|
trusted library allocation
|
page read and write
|
||
13A393E5000
|
heap
|
page read and write
|
||
492E000
|
stack
|
page read and write
|
||
2A07000
|
heap
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
7FFD343E0000
|
trusted library allocation
|
page read and write
|
||
7FFD341D9000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
2CDA035B000
|
heap
|
page read and write
|
||
1EF26FEB000
|
heap
|
page read and write
|
||
C6B79FE000
|
stack
|
page read and write
|
||
A5A6CFD000
|
stack
|
page read and write
|
||
7FFD34270000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34110000
|
trusted library allocation
|
page execute and read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
227F6A2D000
|
heap
|
page read and write
|
||
44B8BFE000
|
stack
|
page read and write
|
||
1BC192A1000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
24D0003B000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
5B22EFD000
|
stack
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
C7C172C000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD340F6000
|
trusted library allocation
|
page execute and read and write
|
||
6A0E000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
3350000
|
heap
|
page read and write
|
||
7FFD34024000
|
trusted library allocation
|
page read and write
|
||
3265000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD34227000
|
trusted library allocation
|
page read and write
|
||
48C000
|
heap
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD34230000
|
trusted library allocation
|
page read and write
|
||
F4480FE000
|
stack
|
page read and write
|
||
C7C2D3B000
|
stack
|
page read and write
|
||
232D78A0000
|
unkown
|
page readonly
|
||
5B563FE000
|
stack
|
page read and write
|
||
7FFD341D0000
|
trusted library allocation
|
page read and write
|
||
7FFD341E0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
C7BF7FE000
|
stack
|
page read and write
|
||
18F7F93A000
|
heap
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7FFD341B0000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
2CDA026C000
|
unkown
|
page readonly
|
||
227F86A4000
|
heap
|
page read and write
|
||
FD64DFE000
|
stack
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
7FFD34242000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD34014000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD3413B000
|
trusted library allocation
|
page execute and read and write
|
||
4840000
|
trusted library allocation
|
page read and write
|
||
FD644F1000
|
stack
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
29A907B9000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6AF5000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
29A90391000
|
trusted library allocation
|
page read and write
|
||
4CE7FFE000
|
stack
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
4A68000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD341CC000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
29A9027D000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
29AA92C8000
|
heap
|
page read and write
|
||
7FFD3420E000
|
trusted library allocation
|
page read and write
|
||
29A90385000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
24D758E0000
|
heap
|
page execute and read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
18F0003B000
|
trusted library allocation
|
page read and write
|
||
7FFD341B6000
|
trusted library allocation
|
page read and write
|
||
44B8DFE000
|
stack
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
13A39C85000
|
trusted library allocation
|
page read and write
|
||
29AA9294000
|
heap
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
28F5000
|
heap
|
page read and write
|
||
29A907BD000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
29090001000
|
trusted library allocation
|
page read and write
|
||
29A90802000
|
trusted library allocation
|
page read and write
|
||
227F85A0000
|
heap
|
page read and write
|
||
A295BFE000
|
stack
|
page read and write
|
||
FD64FFD000
|
stack
|
page read and write
|
||
6670000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFD341F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34240000
|
trusted library allocation
|
page read and write
|
||
56E1000
|
trusted library allocation
|
page read and write
|
||
7FFD34020000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
4F8000
|
heap
|
page read and write
|
||
7FFD341B3000
|
trusted library allocation
|
page read and write
|
||
5B22FFF000
|
stack
|
page read and write
|
||
29AA0232000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD341B6000
|
trusted library allocation
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
7FFD34410000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
4077000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34003000
|
trusted library allocation
|
page read and write
|
||
7FFD3406C000
|
trusted library allocation
|
page execute and read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
C7C0E3E000
|
stack
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
4030000
|
heap
|
page read and write
|
||
29AA924A000
|
heap
|
page read and write
|
||
2CDA04E0000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
C7C192C000
|
stack
|
page read and write
|
||
29A903DD000
|
trusted library allocation
|
page read and write
|
||
1EF27831000
|
trusted library allocation
|
page read and write
|
||
7FFD341E1000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFD341D5000
|
trusted library allocation
|
page read and write
|
||
29AA8DD3000
|
heap
|
page read and write
|
||
2CDB9513000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
F448AFD000
|
stack
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
7FFD340BC000
|
trusted library allocation
|
page execute and read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
7EEB8000
|
trusted library allocation
|
page execute and read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD34222000
|
trusted library allocation
|
page read and write
|
||
29AA8AA5000
|
heap
|
page read and write
|
||
1EF276D0000
|
heap
|
page read and write
|
||
290FC0D0000
|
heap
|
page read and write
|
||
7FFD341E1000
|
trusted library allocation
|
page read and write
|
||
2CDA033D000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
29A90285000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
29A90A7D000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
7FFD34024000
|
trusted library allocation
|
page read and write
|
||
2690000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
26CB000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
4E5000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6870000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
18F7E8D9000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
232F0858000
|
heap
|
page read and write
|
||
18F7F060000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
trusted library allocation
|
page read and write
|
||
70DC000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
1EF26F50000
|
trusted library allocation
|
page read and write
|
||
24D7477C000
|
heap
|
page read and write
|
||
C6B80FE000
|
stack
|
page read and write
|
||
29AA8F48000
|
heap
|
page read and write
|
||
7FFD34208000
|
trusted library allocation
|
page read and write
|
||
7FFD340AC000
|
trusted library allocation
|
page execute and read and write
|
||
3650000
|
heap
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6BD0000
|
heap
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
4255000
|
heap
|
page read and write
|
||
2937000
|
stack
|
page read and write
|
||
5B230FE000
|
stack
|
page read and write
|
||
290FC040000
|
heap
|
page execute and read and write
|
||
232D7786000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
29AA9150000
|
unkown
|
page readonly
|
||
2CDA0500000
|
heap
|
page read and write
|
||
1EF27835000
|
trusted library allocation
|
page read and write
|
||
18F7EF90000
|
heap
|
page execute and read and write
|
||
1C145540000
|
heap
|
page read and write
|
||
390000
|
heap
|
page read and write
|
||
6B31000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
29A90BEE000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD3402B000
|
trusted library allocation
|
page execute and read and write
|
||
4ABB000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
4249000
|
heap
|
page read and write
|
||
7FFD34003000
|
trusted library allocation
|
page execute and read and write
|
||
4875000
|
trusted library allocation
|
page execute and read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
C7C1129000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
7FFD341CF000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
29AA8E80000
|
heap
|
page read and write
|
||
6EDE000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
29A8FC10000
|
heap
|
page read and write
|
||
7FFD3405C000
|
trusted library allocation
|
page execute and read and write
|
||
29AA9299000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
4221000
|
trusted library allocation
|
page read and write
|
||
7FFD340E6000
|
trusted library allocation
|
page execute and read and write
|
||
13A39B6D000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6D8E000
|
stack
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
7FFD34290000
|
trusted library allocation
|
page read and write
|
||
30FB000
|
heap
|
page read and write
|
||
1C1455A0000
|
trusted library allocation
|
page read and write
|
||
29AA8D94000
|
heap
|
page read and write
|
||
29AA9740000
|
heap
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
290FCA10000
|
heap
|
page read and write
|
||
232D7EE0000
|
heap
|
page read and write
|
||
7FFD341D3000
|
trusted library allocation
|
page read and write
|
||
7FFD341E4000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD34222000
|
trusted library allocation
|
page read and write
|
||
261E000
|
stack
|
page read and write
|
||
7FFD34320000
|
trusted library allocation
|
page read and write
|
||
26A0000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
29AA8DE2000
|
heap
|
page read and write
|
||
30FF000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
4360000
|
trusted library allocation
|
page execute and read and write
|
||
29A8F93E000
|
heap
|
page read and write
|
||
6D9E000
|
stack
|
page read and write
|
||
46D0000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
C6B82FE000
|
stack
|
page read and write
|
||
29A90A61000
|
trusted library allocation
|
page read and write
|
||
C7C143C000
|
stack
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
227F6C45000
|
heap
|
page read and write
|
||
C6B7BFE000
|
stack
|
page read and write
|
||
7FFD34018000
|
trusted library allocation
|
page read and write
|
||
7FFD34222000
|
trusted library allocation
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
6E20000
|
trusted library allocation
|
page execute and read and write
|
||
4280000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
C7C0A29000
|
stack
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
7FFD34200000
|
trusted library allocation
|
page read and write
|
||
1EF26ED0000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD34227000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
AD54C7E000
|
stack
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
29A9035B000
|
trusted library allocation
|
page read and write
|
||
7FFD3401D000
|
trusted library allocation
|
page execute and read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
227F8500000
|
heap
|
page execute and read and write
|
||
47B4000
|
trusted library allocation
|
page read and write
|
||
18F0012C000
|
trusted library allocation
|
page read and write
|
||
7FFD34210000
|
trusted library allocation
|
page execute and read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
2912F410000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
24D74E70000
|
heap
|
page execute and read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
C7C263C000
|
stack
|
page read and write
|
||
232D8041000
|
trusted library allocation
|
page read and write
|
||
1EF27185000
|
heap
|
page read and write
|
||
1BC31A60000
|
heap
|
page read and write
|
||
18F7F9A8000
|
heap
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
18F7EA75000
|
heap
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
DB000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
44B8AFE000
|
stack
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
232D7860000
|
heap
|
page execute and read and write
|
||
356E000
|
stack
|
page read and write
|
||
18F7E916000
|
heap
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
50D000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
3117000
|
heap
|
page read and write
|
||
309E000
|
stack
|
page read and write
|
||
459F000
|
stack
|
page read and write
|
||
2908012F000
|
trusted library allocation
|
page read and write
|
||
7FFD341B6000
|
trusted library allocation
|
page read and write
|
||
227F6DE5000
|
heap
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
46B0000
|
trusted library allocation
|
page read and write
|
||
1BC1895F000
|
heap
|
page read and write
|
||
7FFD34220000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
7FFD34210000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7F3C0000
|
trusted library allocation
|
page execute and read and write
|
||
29A9026A000
|
trusted library allocation
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
4CE7CFF000
|
stack
|
page read and write
|
||
7FFD34420000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
2908012C000
|
trusted library allocation
|
page read and write
|
||
63CC000
|
stack
|
page read and write
|
||
29A9031F000
|
trusted library allocation
|
page read and write
|
||
7FFD33FF8000
|
trusted library allocation
|
page read and write
|
||
6B34000
|
trusted library allocation
|
page read and write
|
||
2E03000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
2DCA000
|
heap
|
page read and write
|
||
29A9034F000
|
trusted library allocation
|
page read and write
|
||
44A4000
|
trusted library allocation
|
page read and write
|
||
7FFD341E0000
|
trusted library allocation
|
page read and write
|
||
18F7E990000
|
heap
|
page read and write
|
||
4260000
|
trusted library allocation
|
page read and write
|
||
29AA01D1000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6809000
|
trusted library allocation
|
page execute and read and write
|
||
13A39B6B000
|
trusted library allocation
|
page read and write
|
||
407B000
|
trusted library allocation
|
page execute and read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
7FFD34310000
|
trusted library allocation
|
page read and write
|
||
410E000
|
stack
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
26D8000
|
heap
|
page read and write
|
||
6E99000
|
trusted library allocation
|
page read and write
|
||
4DA000
|
heap
|
page read and write
|
||
29A90389000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD3403D000
|
trusted library allocation
|
page execute and read and write
|
||
1BC18FD0000
|
heap
|
page execute and read and write
|
||
29A900E0000
|
heap
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
24D74766000
|
heap
|
page read and write
|
||
7FFD34260000
|
trusted library allocation
|
page read and write
|
||
7FFD341F5000
|
trusted library allocation
|
page read and write
|
||
4948000
|
trusted library allocation
|
page read and write
|
||
7FFD34002000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
44B84FE000
|
stack
|
page read and write
|
||
24D74EF0000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
29AA8A10000
|
heap
|
page execute and read and write
|
||
744E000
|
stack
|
page read and write
|
||
68CE000
|
stack
|
page read and write
|
||
C7C1E2C000
|
stack
|
page read and write
|
||
7F3D8000
|
trusted library allocation
|
page execute and read and write
|
||
2CDB93D0000
|
heap
|
page execute and read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
7FFD34023000
|
trusted library allocation
|
page read and write
|
||
6AFC000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
290FB916000
|
heap
|
page read and write
|
||
5B22AF0000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
1BC31AC0000
|
heap
|
page read and write
|
||
29080143000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
4240000
|
trusted library allocation
|
page read and write
|
||
7FFD34270000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD340C6000
|
trusted library allocation
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
6870000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
24D00143000
|
trusted library allocation
|
page read and write
|
||
29A90BBB000
|
trusted library allocation
|
page read and write
|
||
499C000
|
stack
|
page read and write
|
||
7FFD34240000
|
trusted library allocation
|
page execute and read and write
|
||
29A90809000
|
trusted library allocation
|
page read and write
|
||
7FFD34200000
|
trusted library allocation
|
page read and write
|
||
290FBAB0000
|
heap
|
page read and write
|
||
29A903D9000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
7FFD34204000
|
trusted library allocation
|
page read and write
|
||
4CE83FB000
|
stack
|
page read and write
|
||
13A524B0000
|
heap
|
page execute and read and write
|
||
7FFD34204000
|
trusted library allocation
|
page read and write
|
||
C7BFF29000
|
stack
|
page read and write
|
||
24D74880000
|
trusted library allocation
|
page read and write
|
||
7FFD34230000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD341B3000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
2CDA0CAD000
|
trusted library allocation
|
page read and write
|
||
7FFD34034000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6DF0000
|
heap
|
page execute and read and write
|
||
18F7E918000
|
heap
|
page read and write
|
||
FD649FE000
|
stack
|
page read and write
|
||
24D746E0000
|
heap
|
page read and write
|
||
4844000
|
trusted library allocation
|
page read and write
|
||
290FB8D1000
|
heap
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
29A90A67000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
1BC188F0000
|
heap
|
page read and write
|
||
C6B7FFE000
|
stack
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
227F85B0000
|
heap
|
page read and write
|
||
2997000
|
heap
|
page read and write
|
||
29A90BE3000
|
trusted library allocation
|
page read and write
|
||
2CDA0660000
|
trusted library allocation
|
page read and write
|
||
C6B7DFF000
|
stack
|
page read and write
|
||
13A52354000
|
heap
|
page read and write
|
||
24D75720000
|
heap
|
page read and write
|
||
7FFD341E4000
|
trusted library allocation
|
page read and write
|
||
2A9D000
|
stack
|
page read and write
|
||
640E000
|
stack
|
page read and write
|
||
29A907C1000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
30FC000
|
heap
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
13A392D0000
|
trusted library allocation
|
page read and write
|
||
2CDA0CAB000
|
trusted library allocation
|
page read and write
|
||
7FFD341CA000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
C7BFDE9000
|
stack
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
7FFD3404D000
|
trusted library allocation
|
page execute and read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
7FFD341F0000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
A5A7473000
|
stack
|
page read and write
|
||
7FFD34260000
|
trusted library allocation
|
page execute and read and write
|
||
232D7900000
|
heap
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
29A9032B000
|
trusted library allocation
|
page read and write
|
||
C7C2329000
|
stack
|
page read and write
|
||
227F869F000
|
heap
|
page read and write
|
||
7FFD341CD000
|
trusted library allocation
|
page read and write
|
||
4CE85FC000
|
stack
|
page read and write
|
||
7FFD3420B000
|
trusted library allocation
|
page read and write
|
||
29A5000
|
heap
|
page read and write
|
||
2CDA0DC1000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
4A71000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
47C2000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
7FFD34250000
|
trusted library allocation
|
page read and write
|
||
1EF275D0000
|
heap
|
page read and write
|
||
6AF5000
|
trusted library allocation
|
page read and write
|
||
47C6000
|
trusted library allocation
|
page read and write
|
||
2278017A000
|
trusted library allocation
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
1EF27013000
|
heap
|
page read and write
|
||
7FFD34206000
|
trusted library allocation
|
page read and write
|
||
7FFD341E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD341F7000
|
trusted library allocation
|
page read and write
|
||
1C145570000
|
heap
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
44CB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD341B0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFD341F9000
|
trusted library allocation
|
page read and write
|
||
7FFD341EB000
|
trusted library allocation
|
page read and write
|
||
6F10000
|
trusted library allocation
|
page read and write
|
||
7FFD34130000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34240000
|
trusted library allocation
|
page execute and read and write
|
||
FD650FE000
|
stack
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
29A90436000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
29A90BC1000
|
trusted library allocation
|
page read and write
|
||
29AA8E2C000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
7FFD340A6000
|
trusted library allocation
|
page read and write
|
||
487B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3404C000
|
trusted library allocation
|
page execute and read and write
|
||
710E000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E94000
|
trusted library allocation
|
page read and write
|
||
13A39C5F000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6BD0000
|
remote allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
2CDA0CAF000
|
trusted library allocation
|
page read and write
|
||
1EF27823000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
2CDA0520000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
7FFD3403B000
|
trusted library allocation
|
page execute and read and write
|
||
290FBC55000
|
heap
|
page read and write
|
||
5B55FFE000
|
stack
|
page read and write
|
||
29AA8DBA000
|
heap
|
page read and write
|
||
13A39160000
|
heap
|
page read and write
|
||
2CDC000
|
stack
|
page read and write
|
||
4040000
|
trusted library allocation
|
page read and write
|
||
C7C292C000
|
stack
|
page read and write
|
||
6870000
|
trusted library allocation
|
page read and write
|
||
2997000
|
heap
|
page read and write
|
||
C7C132B000
|
stack
|
page read and write
|
||
2F28000
|
heap
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
29AA8BFE000
|
unkown
|
page readonly
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
29A90327000
|
trusted library allocation
|
page read and write
|
||
FD648FD000
|
stack
|
page read and write
|
||
7FFD341E8000
|
trusted library allocation
|
page read and write
|
||
25DD000
|
stack
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD340A6000
|
trusted library allocation
|
page read and write
|
||
33917FE000
|
stack
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
A2956FE000
|
stack
|
page read and write
|
||
327D000
|
stack
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
C7C0C28000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
4CE79FE000
|
stack
|
page read and write
|
||
7FFD341C0000
|
trusted library allocation
|
page read and write
|
||
FD647FE000
|
stack
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
4B06000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD34130000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD341F0000
|
trusted library allocation
|
page read and write
|
||
1BC29151000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD341F7000
|
trusted library allocation
|
page read and write
|
||
7FFD33FFD000
|
trusted library allocation
|
page execute and read and write
|
||
29A90289000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD34239000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
2CDB0C7D000
|
trusted library allocation
|
page read and write
|
||
227F84A0000
|
heap
|
page read and write
|
||
7FFD343F0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
232D7905000
|
heap
|
page read and write
|
||
290FCABE000
|
heap
|
page read and write
|
||
18F0003F000
|
trusted library allocation
|
page read and write
|
||
6630000
|
trusted library allocation
|
page read and write
|
||
4A03000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
1BC31A58000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
29A90281000
|
trusted library allocation
|
page read and write
|
||
7FFD34200000
|
trusted library allocation
|
page read and write
|
||
7FFD34004000
|
trusted library allocation
|
page read and write
|
||
29A8F880000
|
heap
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
13A49B41000
|
trusted library allocation
|
page read and write
|
||
6AF5000
|
trusted library allocation
|
page read and write
|
||
290FB990000
|
heap
|
page read and write
|
||
29AA01B1000
|
trusted library allocation
|
page read and write
|
||
6F10000
|
trusted library allocation
|
page read and write
|
||
4CE75D4000
|
stack
|
page read and write
|
||
29AA8B11000
|
heap
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
5B234FE000
|
stack
|
page read and write
|
||
7FFD341B2000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
4391000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
7FFD341F0000
|
trusted library allocation
|
page read and write
|
||
24D74600000
|
heap
|
page read and write
|
||
7FFD34033000
|
trusted library allocation
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
1EF275C0000
|
heap
|
page execute and read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
C7C1529000
|
stack
|
page read and write
|
||
1EF26F20000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
2912F270000
|
heap
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD341D9000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
227F69B0000
|
trusted library allocation
|
page read and write
|
||
2A1B000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
7FFD3402D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD342C0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
2DED000
|
heap
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
7EEA0000
|
trusted library allocation
|
page execute and read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
4210000
|
heap
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFD34209000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
1C14562B000
|
heap
|
page read and write
|
||
C7BF53F000
|
stack
|
page read and write
|
||
4510000
|
heap
|
page execute and read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
24D757A5000
|
heap
|
page read and write
|
||
C6B83FE000
|
stack
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
7FFD341D2000
|
trusted library allocation
|
page read and write
|
||
7FFD342F0000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
232F0800000
|
heap
|
page execute and read and write
|
||
4A00000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
7FFD340D6000
|
trusted library allocation
|
page execute and read and write
|
||
317000
|
stack
|
page read and write
|
||
54B000
|
stack
|
page read and write
|
||
2A22000
|
heap
|
page read and write
|
||
7FFD34340000
|
trusted library allocation
|
page execute and read and write
|
||
24D0003D000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
461C000
|
stack
|
page read and write
|
||
4890000
|
trusted library allocation
|
page read and write
|
||
1EF2768E000
|
heap
|
page read and write
|
||
5B562FE000
|
stack
|
page read and write
|
||
6B31000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
290FB914000
|
heap
|
page read and write
|
||
290FCAA8000
|
heap
|
page read and write
|
||
7FFD34220000
|
trusted library allocation
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
2DF8000
|
heap
|
page read and write
|
||
A2958FF000
|
stack
|
page read and write
|
||
7FFD34220000
|
trusted library allocation
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
5B55EFE000
|
stack
|
page read and write
|
||
708E000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
C7BFBE9000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFD341B5000
|
trusted library allocation
|
page read and write
|
||
7FFD33FF5000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B00000
|
trusted library allocation
|
page read and write
|
||
6A70000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
41E0000
|
trusted library allocation
|
page execute and read and write
|
||
4044000
|
trusted library allocation
|
page read and write
|
||
4290000
|
heap
|
page readonly
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
13A39260000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
7FFD34003000
|
trusted library allocation
|
page read and write
|
||
7FFD34230000
|
trusted library allocation
|
page execute and read and write
|
||
426B000
|
trusted library allocation
|
page execute and read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
1EF376E1000
|
trusted library allocation
|
page read and write
|
||
1BC18BB0000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD341DE000
|
trusted library allocation
|
page read and write
|
||
5221000
|
trusted library allocation
|
page read and write
|
||
6A90000
|
trusted library allocation
|
page read and write
|
||
7FFD342B0000
|
trusted library allocation
|
page execute and read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD34254000
|
trusted library allocation
|
page read and write
|
||
455E000
|
stack
|
page read and write
|
||
7FFD340A6000
|
trusted library allocation
|
page read and write
|
||
A295301000
|
stack
|
page read and write
|
||
7FFD34003000
|
trusted library allocation
|
page read and write
|
||
29AA8F45000
|
heap
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
2A09000
|
heap
|
page read and write
|
||
7FFD34195000
|
trusted library allocation
|
page read and write
|
||
232F0894000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
C7C1629000
|
stack
|
page read and write
|
||
6C00000
|
heap
|
page execute and read and write
|
||
7FFD34300000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
227F8FF4000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
29A9084D000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
29AA8FA0000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
2E82000
|
heap
|
page read and write
|
||
7FFD34040000
|
trusted library allocation
|
page read and write
|
||
C7BF8FD000
|
stack
|
page read and write
|
||
7FFD34280000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD341C6000
|
trusted library allocation
|
page read and write
|
||
3391EFF000
|
stack
|
page read and write
|
||
18F10011000
|
trusted library allocation
|
page read and write
|
||
1EF2780C000
|
trusted library allocation
|
page read and write
|
||
29A9080B000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
2CDA0D9F000
|
trusted library allocation
|
page read and write
|
||
659E000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
30E8000
|
heap
|
page read and write
|
||
5B231FE000
|
stack
|
page read and write
|
||
5B22DFE000
|
stack
|
page read and write
|
||
2DB000
|
stack
|
page read and write
|
||
7FFD341C6000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
7FFD342A0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
311A000
|
heap
|
page read and write
|
||
7FFD341D2000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
C7C2A2C000
|
stack
|
page read and write
|
||
29A90A6B000
|
trusted library allocation
|
page read and write
|
||
232D75A0000
|
heap
|
page read and write
|
||
7FFD340E0000
|
trusted library allocation
|
page execute and read and write
|
||
29B0000
|
heap
|
page read and write
|
||
2CDA0D9C000
|
trusted library allocation
|
page read and write
|
||
18F7F992000
|
heap
|
page read and write
|
||
4ABE000
|
trusted library allocation
|
page read and write
|
||
4DC000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
heap
|
page read and write
|
||
1BC1927C000
|
trusted library allocation
|
page read and write
|
||
2912F415000
|
heap
|
page read and write
|
||
477B000
|
trusted library allocation
|
page read and write
|
||
18F00151000
|
trusted library allocation
|
page read and write
|
||
2F4D000
|
stack
|
page read and write
|
||
290FBB20000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1BC188D0000
|
heap
|
page read and write
|
||
24D75758000
|
heap
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
13A39374000
|
heap
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD33FF5000
|
trusted library allocation
|
page read and write
|
||
42E000
|
stack
|
page read and write
|
||
7FFD34229000
|
trusted library allocation
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
7FFD34018000
|
trusted library allocation
|
page read and write
|
||
A295EFE000
|
stack
|
page read and write
|
||
4A6F000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
29CD000
|
stack
|
page read and write
|
||
7FFD341F0000
|
trusted library allocation
|
page read and write
|
||
18F7E9B0000
|
heap
|
page read and write
|
||
2CDA06D5000
|
heap
|
page read and write
|
||
4043000
|
trusted library allocation
|
page execute and read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
29A90BBD000
|
trusted library allocation
|
page read and write
|
||
7FFD34250000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34219000
|
trusted library allocation
|
page read and write
|
||
29AA8B50000
|
unkown
|
page readonly
|
||
7FFD34227000
|
trusted library allocation
|
page read and write
|
||
325F000
|
stack
|
page read and write
|
||
1C14566E000
|
heap
|
page read and write
|
||
232F0660000
|
unkown
|
page readonly
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
29AA925C000
|
heap
|
page read and write
|
||
18F7E9E5000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
227F8420000
|
heap
|
page read and write
|
||
29A8F91C000
|
heap
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
4210000
|
heap
|
page execute and read and write
|
||
7FFD34220000
|
trusted library allocation
|
page read and write
|
||
7FFD34230000
|
trusted library allocation
|
page read and write
|
||
1BC18BB5000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
C7C1029000
|
stack
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
29A90A81000
|
trusted library allocation
|
page read and write
|
||
C7C2F29000
|
stack
|
page read and write
|
||
4050000
|
trusted library allocation
|
page read and write
|
||
29A9080D000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
47A5000
|
trusted library allocation
|
page read and write
|
||
13A49B3D000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
227F6940000
|
heap
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
1BC29161000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
29AA8DB0000
|
heap
|
page read and write
|
||
29A8FBB0000
|
trusted library allocation
|
page read and write
|
||
6AD0000
|
trusted library allocation
|
page read and write
|
||
6F10000
|
trusted library allocation
|
page read and write
|
||
7FFD34010000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
2ADF000
|
stack
|
page read and write
|
||
2908003B000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD341D5000
|
trusted library allocation
|
page read and write
|
||
24D7475A000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD341D0000
|
trusted library allocation
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
4CE80FE000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
5A21000
|
trusted library allocation
|
page read and write
|
||
C6B7AFE000
|
stack
|
page read and write
|
||
29A90279000
|
trusted library allocation
|
page read and write
|
||
33918FE000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD340DC000
|
trusted library allocation
|
page execute and read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
4CE87FA000
|
stack
|
page read and write
|
||
6E06000
|
trusted library allocation
|
page execute and read and write
|
||
4FFE000
|
stack
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFD34220000
|
trusted library allocation
|
page execute and read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
232D778A000
|
heap
|
page read and write
|
||
25E0000
|
heap
|
page read and write
|
||
7FFD341C7000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
C7C252C000
|
stack
|
page read and write
|
||
26FA000
|
heap
|
page read and write
|
||
1EF27048000
|
heap
|
page read and write
|
||
7FFD3400D000
|
trusted library allocation
|
page execute and read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
227F67B4000
|
unkown
|
page readonly
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
7FFD34190000
|
trusted library allocation
|
page read and write
|
||
6BD0000
|
remote allocation
|
page read and write
|
||
C6B78F1000
|
stack
|
page read and write
|
||
C7C1B29000
|
stack
|
page read and write
|
||
7FFD34010000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
1BC1918F000
|
trusted library allocation
|
page read and write
|
||
25DE000
|
stack
|
page read and write
|
||
2984000
|
heap
|
page read and write
|
||
2CDA0DB3000
|
trusted library allocation
|
page read and write
|
||
7FFD341C0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD3411B000
|
trusted library allocation
|
page execute and read and write
|
||
24D74762000
|
heap
|
page read and write
|
||
7FFD343D0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
A5A757E000
|
unkown
|
page readonly
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
29A90A7F000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
1BC19140000
|
heap
|
page read and write
|
||
404D000
|
trusted library allocation
|
page execute and read and write
|
||
29A90367000
|
trusted library allocation
|
page read and write
|
||
7FFD33FFD000
|
trusted library allocation
|
page execute and read and write
|
||
6DCD000
|
stack
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
3391DFD000
|
stack
|
page read and write
|
||
A5A7DFE000
|
stack
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page execute and read and write
|
||
7105000
|
heap
|
page read and write
|
||
740E000
|
stack
|
page read and write
|
||
A2961FE000
|
stack
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
7FFD341F2000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD34193000
|
trusted library allocation
|
page read and write
|
||
49DE000
|
stack
|
page read and write
|
||
24D10001000
|
trusted library allocation
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
29A9037D000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD34220000
|
trusted library allocation
|
page read and write
|
||
7FFD33FF3000
|
trusted library allocation
|
page execute and read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
2908003D000
|
trusted library allocation
|
page read and write
|
||
18F7F98E000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
44B7FE1000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD34217000
|
trusted library allocation
|
page read and write
|
||
6FCE000
|
stack
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
30FB000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
13A3937A000
|
heap
|
page read and write
|
||
2B5D000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
29A90257000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD34219000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
29A907B7000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
227F8490000
|
heap
|
page execute and read and write
|
||
419E000
|
stack
|
page read and write
|
||
7FFD341D9000
|
trusted library allocation
|
page read and write
|
||
1EF26FD8000
|
heap
|
page read and write
|
||
7FFD340F6000
|
trusted library allocation
|
page execute and read and write
|
||
2A08000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B33000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
7FFD34250000
|
trusted library allocation
|
page execute and read and write
|
||
5B569FE000
|
stack
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
18F7EA40000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
1EF2771F000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD34200000
|
trusted library allocation
|
page read and write
|
||
232D8033000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
29A90BC3000
|
trusted library allocation
|
page read and write
|
||
29A9030F000
|
trusted library allocation
|
page read and write
|
||
29A90A85000
|
trusted library allocation
|
page read and write
|
||
28FB000
|
stack
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
29AA8DCA000
|
heap
|
page read and write
|
||
29AA8E91000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD341C0000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
40E0000
|
heap
|
page readonly
|
||
7FFD34193000
|
trusted library allocation
|
page read and write
|
||
6A69000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34270000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD341E0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD34229000
|
trusted library allocation
|
page read and write
|
||
29A9029A000
|
trusted library allocation
|
page read and write
|
||
4200000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
1BC1918D000
|
trusted library allocation
|
page read and write
|
||
C7C2C2C000
|
stack
|
page read and write
|
||
312B000
|
heap
|
page read and write
|
||
7FFD341C0000
|
trusted library allocation
|
page read and write
|
||
4494000
|
trusted library allocation
|
page read and write
|
||
2CDA06B2000
|
unkown
|
page readonly
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
29AA8E3A000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD340A0000
|
trusted library allocation
|
page read and write
|
||
4493000
|
trusted library allocation
|
page execute and read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
7FFD341D5000
|
trusted library allocation
|
page read and write
|
||
1BC1918B000
|
trusted library allocation
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
7FFD34034000
|
trusted library allocation
|
page read and write
|
||
180000
|
heap
|
page read and write
|
||
29AA8F4D000
|
heap
|
page read and write
|
||
18F7E8ED000
|
heap
|
page read and write
|
||
7FFD341B2000
|
trusted library allocation
|
page read and write
|
||
24D74760000
|
heap
|
page read and write
|
||
7FFD3400D000
|
trusted library allocation
|
page execute and read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7456000
|
heap
|
page read and write
|
||
7FFD340C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD340D6000
|
trusted library allocation
|
page execute and read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
29080151000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
24D74700000
|
heap
|
page read and write
|
||
6B3E000
|
trusted library allocation
|
page read and write
|
||
7FFD341E8000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
44B85FD000
|
stack
|
page read and write
|
||
232D7720000
|
trusted library allocation
|
page read and write
|
||
7FFD34022000
|
trusted library allocation
|
page read and write
|
||
44B89FE000
|
stack
|
page read and write
|
||
1BC31AD2000
|
heap
|
page read and write
|
||
7FFD341CA000
|
trusted library allocation
|
page read and write
|
||
29A9038D000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
A295CFE000
|
stack
|
page read and write
|
||
1EF376ED000
|
trusted library allocation
|
page read and write
|
||
24D1000D000
|
trusted library allocation
|
page read and write
|
||
13A39550000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
290FBA70000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
232F0810000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
2CDA0357000
|
heap
|
page read and write
|
||
C7BF63E000
|
stack
|
page read and write
|
||
45A8000
|
trusted library allocation
|
page read and write
|
||
24D0012C000
|
trusted library allocation
|
page read and write
|
||
7FFD34247000
|
trusted library allocation
|
page read and write
|
||
FD64EFE000
|
stack
|
page read and write
|
||
4B02000
|
trusted library allocation
|
page read and write
|
||
232D77C3000
|
heap
|
page read and write
|
||
C6B81FE000
|
stack
|
page read and write
|
||
18F7E8D5000
|
heap
|
page read and write
|
||
F447D91000
|
stack
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
7FFD34250000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
7FFD34210000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFD34140000
|
trusted library allocation
|
page execute and read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
290FBB45000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
13A39280000
|
heap
|
page read and write
|
||
18F7F9AA000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1BC188C5000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
1EF26F25000
|
heap
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
29A9034B000
|
trusted library allocation
|
page read and write
|
||
6E00000
|
trusted library allocation
|
page read and write
|
||
290FCC00000
|
heap
|
page execute and read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD340D0000
|
trusted library allocation
|
page execute and read and write
|
||
C6B84FE000
|
stack
|
page read and write
|
||
FD64BFE000
|
stack
|
page read and write
|
||
46AE000
|
stack
|
page read and write
|
||
33912F1000
|
stack
|
page read and write
|
||
29A9035F000
|
trusted library allocation
|
page read and write
|
||
7FFD341F2000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
A295DFF000
|
stack
|
page read and write
|
||
227F87A0000
|
heap
|
page execute and read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFD3420E000
|
trusted library allocation
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
46FD000
|
heap
|
page read and write
|
||
C6B7EFF000
|
stack
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
24D74820000
|
heap
|
page read and write
|
||
4424000
|
heap
|
page read and write
|
||
13A523CC000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
29A8F8A0000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
70F2000
|
heap
|
page read and write
|
||
1BC1896B000
|
heap
|
page read and write
|
||
7FFD34012000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
13A39C81000
|
trusted library allocation
|
page read and write
|
||
6B70000
|
trusted library allocation
|
page read and write
|
||
29AA8D50000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD34110000
|
trusted library allocation
|
page execute and read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
29A8F907000
|
heap
|
page read and write
|
||
44B86FE000
|
stack
|
page read and write
|
||
67DE000
|
stack
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
7FFD341BD000
|
trusted library allocation
|
page read and write
|
||
2CDA0C60000
|
heap
|
page execute and read and write
|
||
7FFD340C6000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
45D0000
|
heap
|
page read and write
|
||
2CDA0398000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
7FFD34210000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD33FF3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3402D000
|
trusted library allocation
|
page execute and read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
F4483FD000
|
stack
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
29A9029E000
|
trusted library allocation
|
page read and write
|
||
7FFD341B0000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
1C145628000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
734E000
|
stack
|
page read and write
|
||
7FFD3401D000
|
trusted library allocation
|
page execute and read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
F4485FE000
|
stack
|
page read and write
|
||
5391000
|
trusted library allocation
|
page read and write
|
||
7FFD34260000
|
trusted library allocation
|
page execute and read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B70000
|
trusted library allocation
|
page read and write
|
||
7FFD341E0000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
435F000
|
stack
|
page read and write
|
||
7FFD34210000
|
trusted library allocation
|
page execute and read and write
|
||
70D0000
|
heap
|
page read and write
|
||
29AA8A50000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
33914FE000
|
stack
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
45C0000
|
trusted library allocation
|
page execute and read and write
|
||
503F000
|
stack
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
44B8CFD000
|
stack
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD34217000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
13A523B4000
|
heap
|
page read and write
|
||
67E3000
|
trusted library allocation
|
page read and write
|
||
7FFD340D0000
|
trusted library allocation
|
page read and write
|
||
1C145622000
|
heap
|
page read and write
|
||
18F7E9F0000
|
heap
|
page read and write
|
||
1BC18967000
|
heap
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
7FFD340D0000
|
trusted library allocation
|
page execute and read and write
|
||
13A39B6F000
|
trusted library allocation
|
page read and write
|
||
1EF27045000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
232F070C000
|
unkown
|
page readonly
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
1EF26F70000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
40F0000
|
heap
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
1EF26EF0000
|
heap
|
page read and write
|
||
227F868C000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
5A25000
|
trusted library allocation
|
page read and write
|
||
4CE82FC000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
1BC18A20000
|
heap
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
7470000
|
heap
|
page read and write
|
||
7FFD340D6000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
7FFD34400000
|
trusted library allocation
|
page read and write
|
||
7FFD340B6000
|
trusted library allocation
|
page read and write
|
||
2CDB0C71000
|
trusted library allocation
|
page read and write
|
||
6A60000
|
trusted library allocation
|
page read and write
|
||
7FFD34013000
|
trusted library allocation
|
page execute and read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
44E0000
|
heap
|
page read and write
|
||
2CDA02F0000
|
heap
|
page read and write
|
||
7FFD34209000
|
trusted library allocation
|
page read and write
|
||
7100000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
13A39B20000
|
heap
|
page read and write
|
||
48AA000
|
heap
|
page read and write
|
||
13A39C5C000
|
trusted library allocation
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD3402D000
|
trusted library allocation
|
page execute and read and write
|
||
29AA8B52000
|
unkown
|
page readonly
|
||
7FFD341B2000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
69CE000
|
stack
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
24D74747000
|
heap
|
page read and write
|
||
67E0000
|
trusted library allocation
|
page read and write
|
||
7FFD340F6000
|
trusted library allocation
|
page execute and read and write
|
||
290FB8D5000
|
heap
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
483D000
|
trusted library allocation
|
page execute and read and write
|
||
29A0000
|
heap
|
page read and write
|
||
29A903EE000
|
trusted library allocation
|
page read and write
|
||
4CE81FB000
|
stack
|
page read and write
|
||
6D4E000
|
stack
|
page read and write
|
||
4204000
|
trusted library allocation
|
page read and write
|
||
7FFD3422E000
|
trusted library allocation
|
page read and write
|
||
5B236FE000
|
stack
|
page read and write
|
||
227F8744000
|
unkown
|
page readonly
|
||
7FFD341D6000
|
trusted library allocation
|
page read and write
|
||
7FFD34013000
|
trusted library allocation
|
page execute and read and write
|
||
4CE88FE000
|
stack
|
page read and write
|
||
C7C2229000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
1C145600000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
232D779C000
|
heap
|
page read and write
|
||
24D748A5000
|
heap
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
C7C2B29000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
7FFD340F6000
|
trusted library allocation
|
page execute and read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
2CDA0355000
|
heap
|
page read and write
|
||
29A8F8C0000
|
heap
|
page read and write
|
||
7FFD34230000
|
trusted library allocation
|
page read and write
|
||
6EDC000
|
trusted library allocation
|
page read and write
|
||
232E7EF1000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
24D757C6000
|
heap
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
24D74768000
|
heap
|
page read and write
|
||
7FFD341F5000
|
trusted library allocation
|
page read and write
|
||
2CDB94E4000
|
heap
|
page read and write
|
||
C7C1F29000
|
stack
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
trusted library allocation
|
page read and write
|
||
46BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3403B000
|
trusted library allocation
|
page execute and read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
C7C2438000
|
stack
|
page read and write
|
||
2CDB0C81000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFD34020000
|
trusted library allocation
|
page read and write
|
||
4370000
|
heap
|
page execute and read and write
|
||
7FFD33FF5000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B80000
|
trusted library allocation
|
page read and write
|
||
29AA9240000
|
heap
|
page read and write
|
||
7FFD341A0000
|
trusted library allocation
|
page read and write
|
||
2CA5000
|
heap
|
page read and write
|
||
1C14564B000
|
heap
|
page read and write
|
||
4CE84FE000
|
stack
|
page read and write
|
||
29A90333000
|
trusted library allocation
|
page read and write
|
||
5B561FD000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1BC19293000
|
trusted library allocation
|
page read and write
|
||
227F86B2000
|
unkown
|
page readonly
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
1EF2771D000
|
trusted library allocation
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
2D8E000
|
unkown
|
page read and write
|
||
29A90A7B000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD341A0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
7FFD34200000
|
trusted library allocation
|
page read and write
|
||
29A90451000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD340B0000
|
trusted library allocation
|
page read and write
|
||
4A81000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
A295FFE000
|
stack
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
2C7D000
|
stack
|
page read and write
|
||
7FFD341D0000
|
trusted library allocation
|
page read and write
|
||
6ED4000
|
trusted library allocation
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD34200000
|
trusted library allocation
|
page read and write
|
||
4310000
|
heap
|
page execute and read and write
|
||
7FFD34240000
|
trusted library allocation
|
page execute and read and write
|
||
29A8F92E000
|
heap
|
page read and write
|
||
290FBC50000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
227F86A6000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
29A9044D000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
5B55BD1000
|
stack
|
page read and write
|
||
290FCA27000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
5B566FE000
|
stack
|
page read and write
|
||
47D2000
|
trusted library allocation
|
page read and write
|
||
29A8F8FC000
|
heap
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6F10000
|
trusted library allocation
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
C7C0129000
|
stack
|
page read and write
|
||
F448BFE000
|
stack
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
1EF27590000
|
heap
|
page execute and read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
2E05000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
C7C053C000
|
stack
|
page read and write
|
||
2A07000
|
heap
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
4A0D000
|
trusted library allocation
|
page execute and read and write
|
||
24D74840000
|
heap
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
2CDB9526000
|
heap
|
page read and write
|
||
26CC000
|
heap
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
7FFD34280000
|
trusted library allocation
|
page read and write
|
||
C7C0628000
|
stack
|
page read and write
|
||
321E000
|
stack
|
page read and write
|
||
6ED4000
|
trusted library allocation
|
page read and write
|
||
2E67000
|
heap
|
page read and write
|
||
C7C1C2C000
|
stack
|
page read and write
|
||
18F10001000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
29A9044A000
|
trusted library allocation
|
page read and write
|
||
A5A68AB000
|
stack
|
page read and write
|
||
290FB976000
|
heap
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
29A90343000
|
trusted library allocation
|
page read and write
|
||
498000
|
heap
|
page read and write
|
||
1BC31AEC000
|
heap
|
page read and write
|
||
1B5000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
4230000
|
trusted library allocation
|
page read and write
|
||
7FFD34195000
|
trusted library allocation
|
page read and write
|
||
227F86B0000
|
unkown
|
page readonly
|
||
297F000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
44A0000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
7FFD34023000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
33913FE000
|
stack
|
page read and write
|
||
6750000
|
trusted library allocation
|
page read and write
|
||
6EE1000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
2CDA0560000
|
trusted library allocation
|
page read and write
|
||
4AC4000
|
trusted library allocation
|
page read and write
|
||
6B3C000
|
trusted library allocation
|
page read and write
|
||
70FA000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E0E000
|
stack
|
page read and write
|
||
29A90379000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
232D7840000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD3406C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34193000
|
trusted library allocation
|
page read and write
|
||
227F862D000
|
heap
|
page read and write
|
||
29A9028D000
|
trusted library allocation
|
page read and write
|
||
6AF4000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
29A90353000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
29A8F920000
|
heap
|
page read and write
|
||
4FBF000
|
stack
|
page read and write
|
||
1BC31AD4000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6A6C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34023000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
4380000
|
heap
|
page read and write
|
||
6AF9000
|
trusted library allocation
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
7FFD341B6000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD340D6000
|
trusted library allocation
|
page execute and read and write
|
||
227F9017000
|
heap
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
493000
|
heap
|
page read and write
|
||
5B564FE000
|
stack
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
227F868E000
|
heap
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
2CDB9490000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFD34014000
|
trusted library allocation
|
page read and write
|
||
3126000
|
heap
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
7FFD341B3000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
24D10011000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
24D757C4000
|
heap
|
page read and write
|
||
29AA8D76000
|
heap
|
page read and write
|
||
1BC31AEE000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
18F7EFD0000
|
heap
|
page execute and read and write
|
||
49E0000
|
trusted library allocation
|
page execute and read and write
|
||
C7C003E000
|
stack
|
page read and write
|
||
41F0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFD3404C000
|
trusted library allocation
|
page execute and read and write
|
||
29A900EA000
|
heap
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
232D782B000
|
heap
|
page read and write
|
||
7FFD340C6000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
29A8FBE0000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD341C0000
|
trusted library allocation
|
page read and write
|
||
2912F370000
|
heap
|
page read and write
|
||
407A000
|
heap
|
page read and write
|
||
2CDA0AE0000
|
heap
|
page read and write
|
||
730E000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
24D00155000
|
trusted library allocation
|
page read and write
|
||
7FFD34201000
|
trusted library allocation
|
page read and write
|
||
227F866C000
|
heap
|
page read and write
|
||
7FFD341AE000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
18F00155000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
33919FE000
|
stack
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFD34023000
|
trusted library allocation
|
page execute and read and write
|
||
F4489FE000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
13A395F5000
|
heap
|
page read and write
|
||
265E000
|
stack
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
29A90216000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
2912F278000
|
heap
|
page read and write
|
||
7FFD3404C000
|
trusted library allocation
|
page execute and read and write
|
||
3391AFE000
|
stack
|
page read and write
|
||
29A90BBF000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
29AA8D6D000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
29A90805000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
290FB8ED000
|
heap
|
page read and write
|
||
6870000
|
trusted library allocation
|
page read and write
|
||
5B22CFE000
|
stack
|
page read and write
|
||
5B560FE000
|
stack
|
page read and write
|
||
6AD0000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
698E000
|
stack
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6BCE000
|
stack
|
page read and write
|
||
7F250000
|
trusted library allocation
|
page execute and read and write
|
||
46A000
|
heap
|
page read and write
|
||
24D0012F000
|
trusted library allocation
|
page read and write
|
||
FD646FF000
|
stack
|
page read and write
|
||
29AA81E0000
|
trusted library allocation
|
page read and write
|
||
F4482FF000
|
stack
|
page read and write
|
||
13A49B31000
|
trusted library allocation
|
page read and write
|
||
7FFD341C0000
|
trusted library allocation
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
1EF27015000
|
heap
|
page read and write
|
||
13A5234A000
|
heap
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
1BC1897D000
|
heap
|
page read and write
|
||
290FBB00000
|
trusted library allocation
|
page read and write
|
||
298D000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFD341B0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
A5A727E000
|
stack
|
page readonly
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
7FFD3404B000
|
trusted library allocation
|
page execute and read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD34234000
|
trusted library allocation
|
page read and write
|
||
7FFD34015000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD342D0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
29A2000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD34110000
|
trusted library allocation
|
page execute and read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
7FFD341CA000
|
trusted library allocation
|
page read and write
|
||
29A901A0000
|
heap
|
page execute and read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
4AF4000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD341F9000
|
trusted library allocation
|
page read and write
|
||
26AA000
|
heap
|
page read and write
|
||
29AA8E62000
|
heap
|
page read and write
|
||
C7C2029000
|
stack
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
4776000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
29A90807000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
7FFD3404C000
|
trusted library allocation
|
page execute and read and write
|
||
232E7F01000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD341D9000
|
trusted library allocation
|
page read and write
|
||
13A39555000
|
heap
|
page read and write
|
||
3109000
|
heap
|
page read and write
|
||
290FCA95000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
7FFD341C3000
|
trusted library allocation
|
page read and write
|
||
C7C212C000
|
stack
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
7FFD3401B000
|
trusted library allocation
|
page execute and read and write
|
||
4877000
|
trusted library allocation
|
page execute and read and write
|
||
6B30000
|
trusted library allocation
|
page execute and read and write
|
||
690E000
|
stack
|
page read and write
|
||
4A79000
|
heap
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
13A39C73000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD34034000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
18F7F942000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD34234000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD341D2000
|
trusted library allocation
|
page read and write
|
||
2CDB9529000
|
heap
|
page read and write
|
||
6B70000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
29AA9268000
|
heap
|
page read and write
|
||
18F7E7A0000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6E0C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34130000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD341F9000
|
trusted library allocation
|
page read and write
|
||
29AA8D82000
|
heap
|
page read and write
|
||
7FFD33FF8000
|
trusted library allocation
|
page read and write
|
||
4A5000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
7FFD341EA000
|
trusted library allocation
|
page read and write
|
||
29A90363000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
13A52300000
|
heap
|
page read and write
|
||
3117000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
4CE7AFE000
|
stack
|
page read and write
|
||
C7BF9FE000
|
stack
|
page read and write
|
||
70CE000
|
stack
|
page read and write
|
||
3108000
|
heap
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
29A90208000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6F20000
|
trusted library allocation
|
page read and write
|
||
56E5000
|
trusted library allocation
|
page read and write
|
||
714E000
|
stack
|
page read and write
|
||
29A90A65000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
4833000
|
trusted library allocation
|
page execute and read and write
|
||
2909000D000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
452E000
|
heap
|
page read and write
|
||
3391CFE000
|
stack
|
page read and write
|
||
232D8045000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
4CE7DFE000
|
stack
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
46AE000
|
stack
|
page read and write
|
||
C7BFCFE000
|
stack
|
page read and write
|
||
7FFD3420E000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
4741000
|
trusted library allocation
|
page read and write
|
||
FD645FF000
|
stack
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD3403D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD341D2000
|
trusted library allocation
|
page read and write
|
||
7FFD341AE000
|
trusted library allocation
|
page read and write
|
||
7FFD34013000
|
trusted library allocation
|
page execute and read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
4820000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
22790001000
|
trusted library allocation
|
page read and write
|
||
6610000
|
trusted library allocation
|
page read and write
|
||
2E0E000
|
stack
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
4773000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
29AA8B20000
|
heap
|
page read and write
|
||
232D7766000
|
heap
|
page read and write
|
||
1EF376F1000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
7FFD34193000
|
trusted library allocation
|
page read and write
|
||
2279000F000
|
trusted library allocation
|
page read and write
|
||
1C14565A000
|
heap
|
page read and write
|
||
7FFD341E1000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
29A8F924000
|
heap
|
page read and write
|
||
29A2000
|
heap
|
page read and write
|
||
7FFD33FF3000
|
trusted library allocation
|
page execute and read and write
|
||
F4488FE000
|
stack
|
page read and write
|
||
18F0003D000
|
trusted library allocation
|
page read and write
|
||
44B83FE000
|
stack
|
page read and write
|
||
4233000
|
trusted library allocation
|
page execute and read and write
|
||
29A90B3D000
|
trusted library allocation
|
page read and write
|
||
7FFD3411B000
|
trusted library allocation
|
page execute and read and write
|
||
AD5497D000
|
stack
|
page read and write
|
||
29A90A83000
|
trusted library allocation
|
page read and write
|
||
7FFD34200000
|
trusted library allocation
|
page read and write
|
||
6ED3000
|
trusted library allocation
|
page read and write
|
||
227F69D0000
|
trusted library allocation
|
page read and write
|
||
24D0003F000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD341E6000
|
trusted library allocation
|
page read and write
|
||
48E0000
|
heap
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
C6B7CFD000
|
stack
|
page read and write
|
||
5050000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFD3407C000
|
trusted library allocation
|
page execute and read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
C7C0828000
|
stack
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
718E000
|
stack
|
page read and write
|
||
A5A717E000
|
unkown
|
page readonly
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
7FFD34130000
|
trusted library allocation
|
page execute and read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
25D7000
|
stack
|
page read and write
|
||
29AA8A30000
|
trusted library allocation
|
page read and write
|
||
312D000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD341F7000
|
trusted library allocation
|
page read and write
|
||
7FFD341EA000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
29A903E2000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
7FFD340A6000
|
trusted library allocation
|
page read and write
|
||
4872000
|
trusted library allocation
|
page read and write
|
||
7FFD342E0000
|
trusted library allocation
|
page read and write
|
||
7FFD341F9000
|
trusted library allocation
|
page read and write
|
||
7FFD3411B000
|
trusted library allocation
|
page execute and read and write
|
||
29A9039A000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
44C7000
|
trusted library allocation
|
page execute and read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
4930000
|
heap
|
page readonly
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6AD0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
13A39356000
|
heap
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
29A90381000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
29AA8EDC000
|
heap
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
290FCA31000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
423D000
|
trusted library allocation
|
page execute and read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
3117000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1EF2771B000
|
trusted library allocation
|
page read and write
|
||
13A5230F000
|
heap
|
page read and write
|
||
5B22BFE000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
A5A6E7D000
|
stack
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
2DB5000
|
heap
|
page read and write
|
||
13A39A40000
|
heap
|
page execute and read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
7FFD341CE000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD34270000
|
trusted library allocation
|
page execute and read and write
|
||
1BC18965000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
1C145640000
|
heap
|
page read and write
|
||
F4481FF000
|
stack
|
page read and write
|
||
13A52359000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
2739000
|
heap
|
page read and write
|
||
1C145702000
|
heap
|
page read and write
|
||
7FFD341B6000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
29A8FCA5000
|
heap
|
page read and write
|
||
65DE000
|
stack
|
page read and write
|
||
7FFD33FF3000
|
trusted library allocation
|
page execute and read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
29A8FC15000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
4490000
|
trusted library allocation
|
page read and write
|
||
18F1000D000
|
trusted library allocation
|
page read and write
|
||
232D7695000
|
heap
|
page read and write
|
||
227F6A41000
|
heap
|
page read and write
|
||
232D76A0000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFD341E4000
|
trusted library allocation
|
page read and write
|
||
7FFD341D6000
|
trusted library allocation
|
page read and write
|
||
44B82FE000
|
stack
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
29AA81B0000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
7FFD341E6000
|
trusted library allocation
|
page read and write
|
||
70CF000
|
stack
|
page read and write
|
||
C7C282C000
|
stack
|
page read and write
|
||
7FFD34220000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
29AA01C3000
|
trusted library allocation
|
page read and write
|
||
7FF4C76C0000
|
trusted library allocation
|
page execute and read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
1BC31A5A000
|
heap
|
page read and write
|
||
6A66000
|
trusted library allocation
|
page execute and read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
AD54D7F000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
5B233FE000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
13A393B4000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
2912F390000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
18F0012F000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B70000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
4CE7EFE000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD34260000
|
trusted library allocation
|
page execute and read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
1BC18B30000
|
trusted library allocation
|
page read and write
|
||
7FFD34247000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD3401D000
|
trusted library allocation
|
page execute and read and write
|
||
29A90A69000
|
trusted library allocation
|
page read and write
|
||
29AA8EED000
|
heap
|
page read and write
|
||
7FFD34240000
|
trusted library allocation
|
page execute and read and write
|
||
A5A6F7E000
|
unkown
|
page readonly
|
||
7FFD34250000
|
trusted library allocation
|
page execute and read and write
|
||
F4484FE000
|
stack
|
page read and write
|
||
1BC192A5000
|
trusted library allocation
|
page read and write
|
||
FD64AFE000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD34270000
|
trusted library allocation
|
page execute and read and write
|
||
29A90A63000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
C7C0B3B000
|
stack
|
page read and write
|
||
290FCAC0000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
29A90292000
|
trusted library allocation
|
page read and write
|
||
C7C0729000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6870000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
heap
|
page execute and read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
2B1D000
|
stack
|
page read and write
|
||
42A0000
|
heap
|
page read and write
|
||
7FFD341D2000
|
trusted library allocation
|
page read and write
|
||
C7C183C000
|
stack
|
page read and write
|
||
6B70000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
C7C0267000
|
stack
|
page read and write
|
||
29A907BB000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
7FFD340C6000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD340CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3420B000
|
trusted library allocation
|
page read and write
|
||
6620000
|
trusted library allocation
|
page execute and read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
33915FE000
|
stack
|
page read and write
|
||
6EF4000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
2CDA06C8000
|
unkown
|
page readonly
|
||
29A90323000
|
trusted library allocation
|
page read and write
|
||
7FFD3400D000
|
trusted library allocation
|
page execute and read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
7450000
|
heap
|
page read and write
|
||
1C145560000
|
heap
|
page read and write
|
||
4480000
|
trusted library allocation
|
page read and write
|
||
6E10000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
40DE000
|
stack
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
C7C02BE000
|
stack
|
page read and write
|
||
2DE4000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD341F9000
|
trusted library allocation
|
page read and write
|
||
4A7D000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
704E000
|
stack
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
remote allocation
|
page read and write
|
||
24D74705000
|
heap
|
page read and write
|
||
227F86A2000
|
heap
|
page read and write
|
||
232D801C000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
29A9032F000
|
trusted library allocation
|
page read and write
|
||
7FFD34195000
|
trusted library allocation
|
page read and write
|
||
7FFD3400D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD341D5000
|
trusted library allocation
|
page read and write
|
||
509000
|
heap
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
227F84A3000
|
heap
|
page read and write
|
||
2CDA0371000
|
heap
|
page read and write
|
||
40CE000
|
stack
|
page read and write
|
||
4234000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
24D00151000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
5B235FD000
|
stack
|
page read and write
|
||
4AE5000
|
trusted library allocation
|
page read and write
|
||
7FA48000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD341D0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
232D76C0000
|
heap
|
page read and write
|
||
7FFD3413B000
|
trusted library allocation
|
page execute and read and write
|
||
227F6A69000
|
heap
|
page read and write
|
||
4CE78FE000
|
stack
|
page read and write
|
||
5B568FD000
|
stack
|
page read and write
|
||
311C000
|
heap
|
page read and write
|
||
48DE000
|
stack
|
page read and write
|
||
29AA9152000
|
unkown
|
page readonly
|
||
4AB3000
|
trusted library allocation
|
page read and write
|
||
7FFD341E0000
|
trusted library allocation
|
page read and write
|
||
1C145679000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
29AA8EB7000
|
heap
|
page read and write
|
||
26C3000
|
heap
|
page read and write
|
||
7FFD340C0000
|
trusted library allocation
|
page read and write
|
||
232F0662000
|
unkown
|
page readonly
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD340D6000
|
trusted library allocation
|
page execute and read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
2908003F000
|
trusted library allocation
|
page read and write
|
||
6E95000
|
trusted library allocation
|
page read and write
|
||
35EF000
|
stack
|
page read and write
|
||
1BC18946000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
29A9033B000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1EF2780F000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
46C0000
|
trusted library allocation
|
page read and write
|
||
C7C303C000
|
stack
|
page read and write
|
||
7FFD33FFD000
|
trusted library allocation
|
page execute and read and write
|
||
1EF2765F000
|
heap
|
page read and write
|
||
5225000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
2CDA0DC5000
|
trusted library allocation
|
page read and write
|
||
6DE0000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD3402D000
|
trusted library allocation
|
page execute and read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page execute and read and write
|
||
29A9033F000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
18F7E9E0000
|
heap
|
page read and write
|
||
7FFD341EB000
|
trusted library allocation
|
page read and write
|
||
7454000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFD3401D000
|
trusted library allocation
|
page execute and read and write
|
||
227F6790000
|
unkown
|
page readonly
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6670000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
2C9C000
|
stack
|
page read and write
|
||
29A90212000
|
trusted library allocation
|
page read and write
|
||
7FA30000
|
trusted library allocation
|
page execute and read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
7FFD33FF2000
|
trusted library allocation
|
page read and write
|
||
7FFD34296000
|
trusted library allocation
|
page read and write
|
||
7FFD34020000
|
trusted library allocation
|
page read and write
|
||
44C2000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
7FFD34030000
|
trusted library allocation
|
page read and write
|
||
227F8FFC000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
13A3938C000
|
heap
|
page read and write
|
||
2717000
|
heap
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
29090011000
|
trusted library allocation
|
page read and write
|
||
7FFD341CE000
|
trusted library allocation
|
page read and write
|
||
7FFD341FD000
|
trusted library allocation
|
page read and write
|
||
7FFD341D6000
|
trusted library allocation
|
page read and write
|
||
44F0000
|
trusted library allocation
|
page read and write
|
||
694E000
|
stack
|
page read and write
|
||
4860000
|
heap
|
page read and write
|
||
7FFD34015000
|
trusted library allocation
|
page read and write
|
||
1BC187E0000
|
heap
|
page read and write
|
||
29A9031B000
|
trusted library allocation
|
page read and write
|
||
6F8D000
|
stack
|
page read and write
|
||
7FFD34044000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
7FFD34201000
|
trusted library allocation
|
page read and write
|
||
2725000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
1C145613000
|
heap
|
page read and write
|
||
C7C0F3F000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
232F08BE000
|
heap
|
page read and write
|
||
18F7E972000
|
heap
|
page read and write
|
||
29A90B47000
|
trusted library allocation
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
7FFD34330000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
4500000
|
heap
|
page readonly
|
||
33916FD000
|
stack
|
page read and write
|
||
484000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
C7C1A29000
|
stack
|
page read and write
|
||
413E000
|
stack
|
page read and write
|
||
6A20000
|
heap
|
page read and write
|
||
7FFD341E6000
|
trusted library allocation
|
page read and write
|
||
7FFD340C0000
|
trusted library allocation
|
page read and write
|
||
1EF2766C000
|
heap
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
7FFD34260000
|
trusted library allocation
|
page execute and read and write
|
||
227F8FEB000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E95000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
232D801F000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
29080155000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFD34106000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34250000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
A5A7E7E000
|
unkown
|
page readonly
|
||
227F6DE0000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
18F00143000
|
trusted library allocation
|
page read and write
|
||
7FFD3406C000
|
trusted library allocation
|
page execute and read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
29A9024E000
|
trusted library allocation
|
page read and write
|
||
680C000
|
trusted library allocation
|
page execute and read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
29A90296000
|
trusted library allocation
|
page read and write
|
||
1BC18B50000
|
trusted library allocation
|
page read and write
|
||
7FFD34250000
|
trusted library allocation
|
page execute and read and write
|
||
3124000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
232E7EFD000
|
trusted library allocation
|
page read and write
|
||
6B54000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
7FFD34234000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
7FFD3422E000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
remote allocation
|
page read and write
|
||
7FFD3400D000
|
trusted library allocation
|
page execute and read and write
|
||
465E000
|
stack
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
473D000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
7FFD341AE000
|
trusted library allocation
|
page read and write
|
||
7FFD3402D000
|
trusted library allocation
|
page execute and read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1C145E02000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
7FFD34200000
|
trusted library allocation
|
page read and write
|
||
6B60000
|
trusted library allocation
|
page execute and read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
24D74D10000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6B41000
|
trusted library allocation
|
page read and write
|
||
22780172000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
6B34000
|
trusted library allocation
|
page read and write
|
||
F4487FE000
|
stack
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
65E0000
|
heap
|
page execute and read and write
|
||
29A90313000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
42EE000
|
stack
|
page read and write
|
||
7FFD34110000
|
trusted library allocation
|
page execute and read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
44C0000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD341CA000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
44C5000
|
trusted library allocation
|
page execute and read and write
|
||
29A90395000
|
trusted library allocation
|
page read and write
|
||
7FFD341B5000
|
trusted library allocation
|
page read and write
|
||
7FFD34209000
|
trusted library allocation
|
page read and write
|
||
29A90317000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
296A000
|
heap
|
page read and write
|
||
227F8641000
|
heap
|
page read and write
|
||
A5A707E000
|
stack
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
29AA9640000
|
heap
|
page read and write
|
||
1BC1927F000
|
trusted library allocation
|
page read and write
|
||
32B8000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
449D000
|
trusted library allocation
|
page execute and read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD34229000
|
trusted library allocation
|
page read and write
|
||
44B88FE000
|
stack
|
page read and write
|
||
1BC31A30000
|
heap
|
page execute and read and write
|
||
472F000
|
trusted library allocation
|
page read and write
|
||
6DDE000
|
stack
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
4CE7BFC000
|
stack
|
page read and write
|
||
29AA8DD9000
|
heap
|
page read and write
|
||
4AB6000
|
trusted library allocation
|
page read and write
|
||
7FFD34014000
|
trusted library allocation
|
page read and write
|
||
7FFD34000000
|
trusted library allocation
|
page read and write
|
||
2CDA0575000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
7FFD34240000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34208000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
1EF26EB0000
|
heap
|
page read and write
|
||
7FFD341E0000
|
trusted library allocation
|
page read and write
|
||
227F6790000
|
unkown
|
page readonly
|
||
290FB8B6000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
remote allocation
|
page read and write
|
There are 2614 hidden memdumps, click here to show them.