Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Portal.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: PDQConnectAgent, Author: PDQ.com, Keywords: Installer, Comments: This installer database contains the logic
and data required to install PDQConnectAgent., Template: x64;1033, Revision Number: {BBBF9B45-7132-4A74-8235-C1D5ECC6E746},
Create Time/Date: Tue Sep 17 15:34:46 2024, Last Saved Time/Date: Tue Sep 17 15:34:46 2024, Number of Pages: 200, Number of
Words: 2, Name of Creating Application: WiX Toolset (5.0.0.0), Security: 2
|
initial sample
|
||
C:\Program Files\PDQ\PDQConnectAgent\pdq-connect-agent.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Config.Msi\6a12ca.rbs
|
data
|
modified
|
||
C:\Program Files\PDQ\PDQConnectAgent\LICENSE.html
|
HTML document, ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\ProgramData\PDQ\PDQConnectAgent\PDQConnectAgent.db
|
SQLite 3.x database, user version 7, last written using SQLite version 3045000, file counter 4, database pages 9, cookie 0x8,
schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\ProgramData\PDQ\PDQConnectAgent\PDQConnectAgent.db-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\ProgramData\PDQ\PDQConnectAgent\Updates\PDQConnectUpdater-0.3.0.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: PDQConnectUpdater, Author: PDQ.com, Keywords: Installer, Comments: This installer database contains the
logic and data required to install PDQConnectUpdater., Template: x64;1033, Revision Number: {680478D0-253F-4DCD-9B76-6390D88203FC},
Create Time/Date: Mon Aug 26 16:00:00 2024, Last Saved Time/Date: Mon Aug 26 16:00:00 2024, Number of Pages: 200, Number of
Words: 2, Name of Creating Application: WiX Toolset (5.0.0.0), Security: 2
|
dropped
|
||
C:\ProgramData\PDQ\PDQConnectAgent\token
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\rundll32.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\Installer\6a12c9.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: PDQConnectAgent, Author: PDQ.com, Keywords: Installer, Comments: This installer database contains the logic
and data required to install PDQConnectAgent., Template: x64;1033, Revision Number: {BBBF9B45-7132-4A74-8235-C1D5ECC6E746},
Create Time/Date: Tue Sep 17 15:34:46 2024, Last Saved Time/Date: Tue Sep 17 15:34:46 2024, Number of Pages: 200, Number of
Words: 2, Name of Creating Application: WiX Toolset (5.0.0.0), Security: 2
|
dropped
|
||
C:\Windows\Installer\6a12cb.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: PDQConnectAgent, Author: PDQ.com, Keywords: Installer, Comments: This installer database contains the logic
and data required to install PDQConnectAgent., Template: x64;1033, Revision Number: {BBBF9B45-7132-4A74-8235-C1D5ECC6E746},
Create Time/Date: Tue Sep 17 15:34:46 2024, Last Saved Time/Date: Tue Sep 17 15:34:46 2024, Number of Pages: 200, Number of
Words: 2, Name of Creating Application: WiX Toolset (5.0.0.0), Security: 2
|
dropped
|
||
C:\Windows\Installer\MSI146E.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI1F2D.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSI1F3E.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI1F6E.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI2451.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI24EE.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI2676.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI2C05.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI328E.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI3B87.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI3BA8.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCA363E23D38342B28859B2E30EB0910098\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\SFXCA363E23D38342B28859B2E30EB0910098\WixSharp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCA363E23D38342B28859B2E30EB0910098\WixToolset.Dtf.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCA363E23D38342B28859B2E30EB0910098\pdqconnectagent-setup.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCA363E23D38342B28859B2E30EB0910098\pdqconnectagent-setup.pdb
|
MSVC program database ver 7.00, 512*59 bytes
|
dropped
|
||
C:\Windows\Installer\SFXCA87E78A4C484AC7BA8DC6E0B5627E7F20\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\SFXCA87E78A4C484AC7BA8DC6E0B5627E7F20\WixSharp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCA87E78A4C484AC7BA8DC6E0B5627E7F20\WixToolset.Dtf.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCA87E78A4C484AC7BA8DC6E0B5627E7F20\pdqconnectagent-setup.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCA87E78A4C484AC7BA8DC6E0B5627E7F20\pdqconnectagent-setup.pdb
|
MSVC program database ver 7.00, 512*59 bytes
|
dropped
|
||
C:\Windows\Installer\SFXCA9B20618A2F4D43A947D4DDC1A40E47B6\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\SFXCA9B20618A2F4D43A947D4DDC1A40E47B6\WixSharp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCA9B20618A2F4D43A947D4DDC1A40E47B6\WixToolset.Dtf.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCA9B20618A2F4D43A947D4DDC1A40E47B6\pdqconnectagent-setup.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCABAC30776D64ECC5AFC62613A5E146B74\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\SFXCABAC30776D64ECC5AFC62613A5E146B74\WixSharp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCABAC30776D64ECC5AFC62613A5E146B74\WixToolset.Dtf.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCABAC30776D64ECC5AFC62613A5E146B74\pdqconnectagent-setup.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCABAC30776D64ECC5AFC62613A5E146B74\pdqconnectagent-setup.pdb
|
MSVC program database ver 7.00, 512*59 bytes
|
dropped
|
||
C:\Windows\Installer\SFXCAFF0EF70119428EDA813B551E8FF8FDE9\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\SFXCAFF0EF70119428EDA813B551E8FF8FDE9\WixSharp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCAFF0EF70119428EDA813B551E8FF8FDE9\WixToolset.Dtf.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SFXCAFF0EF70119428EDA813B551E8FF8FDE9\pdqconnectagent-setup.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SourceHash{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}\app_icon.ico
|
MS Windows icon resource - 4 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_1m44divj.iz0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_cd4wqici.roe.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_czxpmajg.uv5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_ddfckiqe.mra.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_fqdsmjgg.czo.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_jr3d42m2.5eo.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_jyt4hf5r.oxg.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_ln1cpdfj.mbo.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_qzoekg4v.02b.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_s4ss1wwl.emd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_trk2nsoc.ipi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_uawecekx.5en.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_vbvyo202.wf5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_x0pboxue.trd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_yizrlkhf.pzn.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_yrx5l2vd.4kk.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\~DF10256FF6D7A7FC78.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF128E950177FB706E.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF2CA530A658F0423A.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF6A53496975B6DE4C.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF7361AF4F4FCDF5C2.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF9BE1662B759EAFF5.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFA43BB4BE1CC147CC.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFAEE45B9A02DA4483.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFAF8F7F1FCA8EE369.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFDA5904711AC03E39.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFDFA2DA48022812CB.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFF7E26199D5F30E14.TMP
|
data
|
dropped
|
There are 68 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI146E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6952171 2 WixSharp!WixSharp.ManagedProjectActions.WixSharp_InitRuntime_Action
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI1F6E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6954890 16 WixSharp!WixSharp.ManagedProjectActions.WixSharp_BeforeInstall_Action
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI2676.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6956718 38 pdqconnectagent-setup!pdqconnectagent_setup.CustomActions.CreateEventSource
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI2C05.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6958093 44 pdqconnectagent-setup!pdqconnectagent_setup.CustomActions.WriteToken
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI328E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6959781 50 pdqconnectagent-setup!pdqconnectagent_setup.CustomActions.StartService
|
||
C:\Program Files\PDQ\PDQConnectAgent\pdq-connect-agent.exe
|
"C:\Program Files\PDQ\PDQConnectAgent\pdq-connect-agent.exe" --service
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass -Command -
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass -Command -
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass -Command -
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass -Command -
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Portal.msi"
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\System32\MsiExec.exe -Embedding 6CC2AEC21F9691D9400C52C3CC91B334
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\System32\MsiExec.exe -Embedding F809AF2B04EF2DCECEB62F05202EAA97 E Global\MSI0000
|
||
C:\Windows\System32\sc.exe
|
"C:\Windows\system32\sc.exe" start "PDQConnectAgent"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 10 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://app.pdq.com/v1/devices/release-channels/stable/manifest.jsonD
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/netfx-WixToolset.Http.wixext
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/difxappZhttp://wixtoolset.org/schemas/v4/wxs/firewallRhttp://wi
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/powershellNhttp://wixtoolset.org/schemas/v4/wxs/vsRhttp://wixto
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-support
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/vs-WixToolset.Msmq.wixext
|
unknown
|
||
https://app.pdq.com/Hardcoded
|
unknown
|
||
https://app.pdq.com/v1/devices/registeristration
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/difxapp5WixToolset.Firewall.wixext
|
unknown
|
||
https://pdqinstallers.e9d69694c3d8f7465fd531512c22bd0f.r2.cloudflarestorage.com/connect-agent/PDQCon
|
unknown
|
||
https://github.com/clap-rs/clap/issues
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/dependency3WixToolset.DirectX.wixext
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/ui9WixToolset.PowerShell.wixext
|
unknown
|
||
https://app.pdq.com/v1/devices/release-channels/stable/manifest.json
|
unknown
|
||
https://github.com/clap-rs/clap/issues0#
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://app.pdq.com/D
|
unknown
|
||
https://oneget.orgX
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/iis
|
unknown
|
||
https://app.pdq.com/
|
unknown
|
||
https://github.com/clap-rs/clap/issues/rustc/eeb90cda1969383f56a2637cbd3037bdf598841c
|
unknown
|
||
https://app.pdq.com/v1/devices/auth-challenge
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/firewall-WixToolset.Util.wixext
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://app.pdq.com/v1/devices/auth-challenge0
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
https://github.com/clap-rs/clap/issuesC:
|
unknown
|
||
https://app.pdq.com/v1/devices/auth-challenge$
|
unknown
|
||
https://app.pdq.com/v1/devices/auth-challengel~
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/directx
|
unknown
|
||
https://github.com/clap-rs/clap/issues0#n
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/bal
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://app.pdq.com/ul
|
unknown
|
||
https://o192192.ingest.sentry.io/api/6095569/envelope/
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/msmq3WixToolset.ComPlus.wixext
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/dependencyXhttp://wixtoolset.org/schemas/v4/wxs/directx
|
unknown
|
||
https://github.com/clap-rs/clap/issuesx
|
unknown
|
||
https://app.pdq.com/v1/devices/register
|
unknown
|
||
https://github.com/oleg-shilo/wixsharp/issues/1396#issuecomment-1849731522
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/powershell=WixToolset.VisualStudio.wixext
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/complus9WixToolset.Dependency.wixext
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs
|
unknown
|
||
https://wixtoolset.org/
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/sql/WixToolset.Netfx.wixext
|
unknown
|
||
http://go.microsoft.c
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/http
|
unknown
|
||
http://go.microsoft.ctain
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://www.test.com/xml/2015
|
unknown
|
||
https://o192192.ingest.sentry.io/api/6095569/envelope/3
|
unknown
|
||
http://wixtoolset.org/schemas/v4/wxs/util
|
unknown
|
||
https://websocket.app.pdq.com:443/v1/devices/socket/websocket?device_id=dvc_cf03d73e6c6b34abc8bc8409f8ee13c1
|
34.128.163.126
|
||
https://oneget.org
|
unknown
|
There are 51 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
pdqinstallers.e9d69694c3d8f7465fd531512c22bd0f.r2.cloudflarestorage.com
|
162.159.140.238
|
||
app.pdq.com
|
104.16.77.47
|
||
websocket.app.pdq.com
|
34.128.163.126
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
162.159.140.238
|
pdqinstallers.e9d69694c3d8f7465fd531512c22bd0f.r2.cloudflarestorage.com
|
United States
|
||
34.128.163.126
|
websocket.app.pdq.com
|
United States
|
||
104.16.77.47
|
app.pdq.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\6a12ca.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\6a12ca.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2B61430F79C84CC45887F5A6386C99F8
|
2B61430F79C84CC45887F5A6853FBE48
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2B61430F79C84CC45887F5A6C3D6A20F
|
2B61430F79C84CC45887F5A6853FBE48
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2B61430F79C84CC45887F5A61DD4B302
|
2B61430F79C84CC45887F5A6853FBE48
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2B61430F79C84CC45887F5A65E431729
|
2B61430F79C84CC45887F5A6853FBE48
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2B61430F79C84CC45887F5A6ACEAC9E8
|
2B61430F79C84CC45887F5A6853FBE48
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\ProgramData\PDQ\PDQConnectAgent\Downloads\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files\PDQ\PDQConnectAgent\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files\PDQ\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\2B61430F79C84CC45887F5A6803ABC48
|
2B61430F79C84CC45887F5A6853FBE48
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\2B61430F79C84CC45887F5A6853FBE48
|
Complete
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\Features
|
Complete
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Windows\Installer\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48
|
ProductIcon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\2B61430F79C84CC45887F5A6803ABC48
|
2B61430F79C84CC45887F5A6853FBE48
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48\SourceList
|
LastUsedSource
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\PDQ.com
|
MaxSize
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\PDQ.com
|
AutoBackupLogFiles
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\PDQ.com\PDQ.com
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\PDQ.com\PDQConnectAgent
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\PDQ.com
|
MaxSize
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
There are 86 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1F970B91000
|
trusted library allocation
|
page read and write
|
||
236BBC7A000
|
trusted library allocation
|
page read and write
|
||
B0D14FE000
|
stack
|
page read and write
|
||
1E34146C000
|
heap
|
page read and write
|
||
1E341954000
|
heap
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1F0B030F000
|
heap
|
page read and write
|
||
7FF78C9F0000
|
unkown
|
page readonly
|
||
36044F0000
|
stack
|
page read and write
|
||
645007C000
|
stack
|
page read and write
|
||
24569AFB000
|
heap
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1E3414D6000
|
heap
|
page read and write
|
||
7FF8489FE000
|
trusted library allocation
|
page read and write
|
||
219102E9000
|
trusted library allocation
|
page read and write
|
||
7FF848A90000
|
trusted library allocation
|
page read and write
|
||
1B489437000
|
heap
|
page read and write
|
||
7FF848A40000
|
trusted library allocation
|
page read and write
|
||
236BAD10000
|
trusted library allocation
|
page read and write
|
||
1B48B0A0000
|
trusted library allocation
|
page read and write
|
||
24569B0A000
|
heap
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
7FF848BB0000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
236D2AC7000
|
heap
|
page execute and read and write
|
||
1B2FCE60000
|
trusted library allocation
|
page read and write
|
||
7FF848C80000
|
trusted library allocation
|
page execute and read and write
|
||
27C62900000
|
heap
|
page read and write
|
||
1F0B0301000
|
heap
|
page read and write
|
||
7FF848AD0000
|
trusted library allocation
|
page read and write
|
||
7FF848A29000
|
trusted library allocation
|
page read and write
|
||
CD2887F000
|
stack
|
page read and write
|
||
1E3414D6000
|
heap
|
page read and write
|
||
7DF4A7D00000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8489D0000
|
trusted library allocation
|
page read and write
|
||
2418007A000
|
trusted library allocation
|
page read and write
|
||
7FF848C40000
|
trusted library allocation
|
page read and write
|
||
7FF848BC0000
|
trusted library allocation
|
page read and write
|
||
E931AD3000
|
stack
|
page read and write
|
||
1E34146C000
|
heap
|
page read and write
|
||
241F1B40000
|
heap
|
page readonly
|
||
236D2CEE000
|
heap
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1E3414B8000
|
heap
|
page read and write
|
||
27C49D0C000
|
heap
|
page read and write
|
||
1F0B0210000
|
heap
|
page read and write
|
||
7FF848C90000
|
trusted library allocation
|
page read and write
|
||
7FF848A32000
|
trusted library allocation
|
page read and write
|
||
7FF8488E0000
|
trusted library allocation
|
page read and write
|
||
7FF84890C000
|
trusted library allocation
|
page execute and read and write
|
||
1E341904000
|
heap
|
page read and write
|
||
2197B314000
|
heap
|
page read and write
|
||
236BB088000
|
trusted library allocation
|
page read and write
|
||
644F7FE000
|
stack
|
page read and write
|
||
1B48B090000
|
trusted library allocation
|
page read and write
|
||
7FF848854000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
7FF78D21D000
|
unkown
|
page write copy
|
||
7FF848C3C000
|
trusted library allocation
|
page read and write
|
||
27C62C42000
|
heap
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1B48B0A0000
|
trusted library allocation
|
page read and write
|
||
27C5A97D000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1E3414D6000
|
heap
|
page read and write
|
||
27C49C60000
|
heap
|
page read and write
|
||
7FF848A50000
|
trusted library allocation
|
page read and write
|
||
7FF848C33000
|
trusted library allocation
|
page read and write
|
||
1E341929000
|
heap
|
page read and write
|
||
7FF848950000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848B80000
|
trusted library allocation
|
page read and write
|
||
7FF848AAB000
|
trusted library allocation
|
page read and write
|
||
1B2FCF72000
|
heap
|
page read and write
|
||
27C4A792000
|
heap
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
7FF848C70000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
7FF848853000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848834000
|
trusted library allocation
|
page read and write
|
||
1E341972000
|
heap
|
page read and write
|
||
1E3414F0000
|
heap
|
page read and write
|
||
7FF848AA0000
|
trusted library allocation
|
page read and write
|
||
236B9DC0000
|
heap
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
1F0B1EC0000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
644FA7E000
|
stack
|
page read and write
|
||
2197A9E0000
|
heap
|
page execute and read and write
|
||
1F970BC0000
|
trusted library allocation
|
page read and write
|
||
1E340F5B000
|
heap
|
page read and write
|
||
1F0B0298000
|
heap
|
page read and write
|
||
1E341436000
|
heap
|
page read and write
|
||
27C4A3D0000
|
trusted library allocation
|
page read and write
|
||
644FEF8000
|
stack
|
page read and write
|
||
1B48B0B0000
|
trusted library allocation
|
page read and write
|
||
1F970BA0000
|
trusted library allocation
|
page read and write
|
||
1E3414B9000
|
heap
|
page read and write
|
||
27C4AD29000
|
trusted library allocation
|
page read and write
|
||
7FF848BB0000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
7FF84885B000
|
trusted library allocation
|
page read and write
|
||
1F0B1E70000
|
trusted library allocation
|
page read and write
|
||
1E341560000
|
heap
|
page read and write
|
||
2456B5F0000
|
trusted library allocation
|
page read and write
|
||
B0D15FD000
|
stack
|
page read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
1B2FB5C0000
|
heap
|
page read and write
|
||
27C4C145000
|
trusted library allocation
|
page read and write
|
||
2456B620000
|
trusted library allocation
|
page read and write
|
||
7FF848A20000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8488E6000
|
trusted library allocation
|
page read and write
|
||
2456B6F0000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
3FF17BE000
|
stack
|
page read and write
|
||
1B48B090000
|
trusted library allocation
|
page read and write
|
||
2197A359000
|
heap
|
page read and write
|
||
2456B5E0000
|
trusted library allocation
|
page read and write
|
||
236D2CDC000
|
heap
|
page read and write
|
||
21900709000
|
trusted library allocation
|
page read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
7FF848B20000
|
trusted library allocation
|
page read and write
|
||
1F0B0240000
|
heap
|
page read and write
|
||
7FF848854000
|
trusted library allocation
|
page read and write
|
||
7FF848C70000
|
trusted library allocation
|
page read and write
|
||
7FF8489E8000
|
trusted library allocation
|
page execute and read and write
|
||
27C49D14000
|
heap
|
page read and write
|
||
1B28001E000
|
trusted library allocation
|
page read and write
|
||
7FF848824000
|
trusted library allocation
|
page read and write
|
||
21900EC0000
|
trusted library allocation
|
page read and write
|
||
1E341515000
|
heap
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
1E341463000
|
heap
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
241F214B000
|
heap
|
page read and write
|
||
7FF848A40000
|
trusted library allocation
|
page read and write
|
||
1F96EFB0000
|
heap
|
page read and write
|
||
FDD8E73000
|
stack
|
page read and write
|
||
241F1FB4000
|
heap
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1F0C2111000
|
trusted library allocation
|
page read and write
|
||
1E34151D000
|
heap
|
page read and write
|
||
2197B2BE000
|
heap
|
page read and write
|
||
7FF848870000
|
trusted library allocation
|
page read and write
|
||
2456B620000
|
trusted library allocation
|
page read and write
|
||
7FF848CB0000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
236D2CF9000
|
heap
|
page read and write
|
||
1B2FCE70000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
24569A00000
|
heap
|
page read and write
|
||
2197A3B0000
|
heap
|
page read and write
|
||
241F2203000
|
heap
|
page read and write
|
||
7FF78D21F000
|
unkown
|
page write copy
|
||
241902F1000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
7FF8488F0000
|
trusted library allocation
|
page execute and read and write
|
||
7E8A5CC000
|
stack
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
1B48AED0000
|
heap
|
page read and write
|
||
B0D1123000
|
stack
|
page read and write
|
||
2418093E000
|
trusted library allocation
|
page read and write
|
||
7FF78D218000
|
unkown
|
page write copy
|
||
1F96EFD7000
|
heap
|
page read and write
|
||
1E3418E8000
|
heap
|
page read and write
|
||
1B489421000
|
heap
|
page read and write
|
||
24569DE0000
|
trusted library allocation
|
page read and write
|
||
7A90FFC000
|
stack
|
page read and write
|
||
7FF848B98000
|
trusted library allocation
|
page read and write
|
||
1E340E80000
|
remote allocation
|
page read and write
|
||
7FF848CB0000
|
trusted library allocation
|
page read and write
|
||
1B2FD480000
|
heap
|
page execute and read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
7FF848845000
|
trusted library allocation
|
page read and write
|
||
7FF848B10000
|
trusted library allocation
|
page read and write
|
||
7FF848910000
|
trusted library allocation
|
page execute and read and write
|
||
24569AC0000
|
heap
|
page read and write
|
||
2197A320000
|
heap
|
page read and write
|
||
1B2FB5B0000
|
heap
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
24569AEA000
|
heap
|
page read and write
|
||
36069FF000
|
stack
|
page read and write
|
||
1E3414D6000
|
heap
|
page read and write
|
||
1E341507000
|
heap
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
236B9F13000
|
heap
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
21900228000
|
trusted library allocation
|
page read and write
|
||
36066FE000
|
stack
|
page read and write
|
||
7FF848AF0000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1F96F255000
|
heap
|
page read and write
|
||
1E341968000
|
heap
|
page read and write
|
||
236B9EF8000
|
heap
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
3FF15FE000
|
stack
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
1F0B02D4000
|
heap
|
page read and write
|
||
1F0B02AE000
|
heap
|
page read and write
|
||
7FF848BB2000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
236BA535000
|
heap
|
page read and write
|
||
2197A570000
|
trusted library allocation
|
page read and write
|
||
1E341463000
|
heap
|
page read and write
|
||
27C4C516000
|
trusted library allocation
|
page read and write
|
||
CD288FF000
|
stack
|
page read and write
|
||
1E341904000
|
heap
|
page read and write
|
||
7FF848900000
|
trusted library allocation
|
page execute and read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
7FF848860000
|
trusted library allocation
|
page read and write
|
||
236D2B83000
|
heap
|
page read and write
|
||
27C62CA6000
|
heap
|
page read and write
|
||
1B2FB39C000
|
heap
|
page read and write
|
||
236D2D1A000
|
heap
|
page read and write
|
||
24180F8F000
|
trusted library allocation
|
page read and write
|
||
27C4BD8A000
|
trusted library allocation
|
page read and write
|
||
7FF848AA1000
|
trusted library allocation
|
page read and write
|
||
22C06B71000
|
heap
|
page read and write
|
||
7FF8488F6000
|
trusted library allocation
|
page read and write
|
||
7E8A64E000
|
stack
|
page read and write
|
||
7FF8489E2000
|
trusted library allocation
|
page read and write
|
||
7FF848CA0000
|
trusted library allocation
|
page read and write
|
||
7FF848840000
|
trusted library allocation
|
page read and write
|
||
27C4B88A000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
7FF84882D000
|
trusted library allocation
|
page execute and read and write
|
||
27C62BF8000
|
heap
|
page read and write
|
||
7FF848A50000
|
trusted library allocation
|
page read and write
|
||
236D2D77000
|
heap
|
page read and write
|
||
236BC3CF000
|
trusted library allocation
|
page read and write
|
||
FB7E9FF000
|
stack
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
7FF848AD0000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
7FF78CF92000
|
unkown
|
page readonly
|
||
7FF848AA0000
|
trusted library allocation
|
page read and write
|
||
7FF848A00000
|
trusted library allocation
|
page read and write
|
||
7E8967F000
|
stack
|
page read and write
|
||
1E3418C8000
|
heap
|
page read and write
|
||
27C4BCED000
|
trusted library allocation
|
page read and write
|
||
24190071000
|
trusted library allocation
|
page read and write
|
||
7FF848AC0000
|
trusted library allocation
|
page read and write
|
||
1E341460000
|
heap
|
page read and write
|
||
236BA530000
|
heap
|
page read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
7FF848B00000
|
trusted library allocation
|
page read and write
|
||
2456B700000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1E341904000
|
heap
|
page read and write
|
||
2197A950000
|
trusted library allocation
|
page read and write
|
||
1E341518000
|
heap
|
page read and write
|
||
7FF848BA4000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1B48943A000
|
heap
|
page read and write
|
||
1E341966000
|
heap
|
page read and write
|
||
1E3414B6000
|
heap
|
page read and write
|
||
2197A220000
|
heap
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1B48B0A0000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1E340FC9000
|
heap
|
page read and write
|
||
1F0B1E81000
|
trusted library allocation
|
page read and write
|
||
1B48AEB0000
|
trusted library allocation
|
page read and write
|
||
22C069B0000
|
heap
|
page read and write
|
||
1F0B1E90000
|
trusted library allocation
|
page read and write
|
||
7FF848AD8000
|
trusted library allocation
|
page read and write
|
||
7FF8488F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848852000
|
trusted library allocation
|
page read and write
|
||
236B9DD0000
|
heap
|
page read and write
|
||
7FF848A20000
|
trusted library allocation
|
page execute and read and write
|
||
7DF4A7960000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848B10000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
7FF84885D000
|
trusted library allocation
|
page execute and read and write
|
||
27C4A901000
|
trusted library allocation
|
page read and write
|
||
27C4ADAF000
|
trusted library allocation
|
page read and write
|
||
1F970A30000
|
trusted library allocation
|
page read and write
|
||
7FF848CC0000
|
trusted library allocation
|
page read and write
|
||
21910011000
|
trusted library allocation
|
page read and write
|
||
241F2442000
|
heap
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
7FF848916000
|
trusted library allocation
|
page execute and read and write
|
||
2197A39A000
|
heap
|
page read and write
|
||
1E341904000
|
heap
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
7FF848A90000
|
trusted library allocation
|
page read and write
|
||
7FF848936000
|
trusted library allocation
|
page execute and read and write
|
||
2197AB15000
|
heap
|
page read and write
|
||
7FF848BC0000
|
trusted library allocation
|
page read and write
|
||
1B2FCE20000
|
trusted library allocation
|
page read and write
|
||
7FF848BA0000
|
trusted library allocation
|
page read and write
|
||
1E3418DF000
|
heap
|
page read and write
|
||
1E3414FC000
|
heap
|
page read and write
|
||
7FF78D218000
|
unkown
|
page read and write
|
||
7FF848C80000
|
trusted library allocation
|
page read and write
|
||
1B48B0C0000
|
trusted library allocation
|
page read and write
|
||
27C62BED000
|
heap
|
page read and write
|
||
7FF78D224000
|
unkown
|
page readonly
|
||
7FF848A00000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
24569D80000
|
heap
|
page read and write
|
||
7FF848B20000
|
trusted library allocation
|
page read and write
|
||
236B9F6D000
|
heap
|
page read and write
|
||
1B4895D0000
|
trusted library allocation
|
page read and write
|
||
241F1584000
|
heap
|
page read and write
|
||
1E34144E000
|
heap
|
page read and write
|
||
1B489418000
|
heap
|
page read and write
|
||
7E894FE000
|
stack
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
7FF848A10000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848840000
|
trusted library allocation
|
page read and write
|
||
7FF848832000
|
trusted library allocation
|
page read and write
|
||
6450C4C000
|
stack
|
page read and write
|
||
7FF8488F0000
|
trusted library allocation
|
page read and write
|
||
2418136E000
|
trusted library allocation
|
page read and write
|
||
236D2887000
|
heap
|
page read and write
|
||
7E89AFE000
|
stack
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
241F23F2000
|
heap
|
page read and write
|
||
FDD9079000
|
stack
|
page read and write
|
||
1E34198B000
|
heap
|
page read and write
|
||
236BA3D0000
|
heap
|
page readonly
|
||
1E3414B6000
|
heap
|
page read and write
|
||
236CA8A1000
|
trusted library allocation
|
page read and write
|
||
24510001000
|
trusted library allocation
|
page read and write
|
||
E931EFD000
|
stack
|
page read and write
|
||
236CAB6F000
|
trusted library allocation
|
page read and write
|
||
1E340F56000
|
heap
|
page read and write
|
||
1B2FB399000
|
heap
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
7FF848ADB000
|
trusted library allocation
|
page read and write
|
||
2456B780000
|
heap
|
page execute and read and write
|
||
7FF848832000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
24569DA0000
|
heap
|
page read and write
|
||
236BC110000
|
trusted library allocation
|
page read and write
|
||
644FF7F000
|
stack
|
page read and write
|
||
241902EF000
|
trusted library allocation
|
page read and write
|
||
1B48B090000
|
trusted library allocation
|
page read and write
|
||
1E3414E7000
|
heap
|
page read and write
|
||
27C4A986000
|
trusted library allocation
|
page read and write
|
||
1F9712A0000
|
heap
|
page execute and read and write
|
||
1F0B1DC0000
|
heap
|
page readonly
|
||
241804B4000
|
trusted library allocation
|
page read and write
|
||
241F1C00000
|
heap
|
page execute and read and write
|
||
1F900001000
|
trusted library allocation
|
page read and write
|
||
7FF848875000
|
trusted library allocation
|
page read and write
|
||
7FF848844000
|
trusted library allocation
|
page read and write
|
||
7FF848A30000
|
trusted library allocation
|
page execute and read and write
|
||
1F0B1EA0000
|
trusted library allocation
|
page read and write
|
||
1B48B090000
|
trusted library allocation
|
page read and write
|
||
FDD92F6000
|
stack
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
236D2B14000
|
heap
|
page read and write
|
||
7FF8489FD000
|
trusted library allocation
|
page execute and read and write
|
||
1B2FCFB0000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1F96EF90000
|
heap
|
page read and write
|
||
1E3418C8000
|
heap
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
7FF848CA0000
|
trusted library allocation
|
page read and write
|
||
7FF8488E0000
|
trusted library allocation
|
page read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
1E34146C000
|
heap
|
page read and write
|
||
7FF848B00000
|
trusted library allocation
|
page read and write
|
||
2197B287000
|
heap
|
page read and write
|
||
1E341463000
|
heap
|
page read and write
|
||
644FD79000
|
stack
|
page read and write
|
||
1E34196B000
|
heap
|
page read and write
|
||
236BA908000
|
trusted library allocation
|
page read and write
|
||
1B2FB2E0000
|
heap
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
236D2BB1000
|
heap
|
page read and write
|
||
1E3418FD000
|
heap
|
page read and write
|
||
1F970BA0000
|
trusted library allocation
|
page read and write
|
||
1F970BB0000
|
trusted library allocation
|
page read and write
|
||
1E3418B1000
|
heap
|
page read and write
|
||
7FF848A0E000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
21910021000
|
trusted library allocation
|
page read and write
|
||
7FF848A94000
|
trusted library allocation
|
page read and write
|
||
7FF848AF0000
|
trusted library allocation
|
page read and write
|
||
1B48B083000
|
trusted library allocation
|
page read and write
|
||
27C5A901000
|
trusted library allocation
|
page read and write
|
||
1B48B090000
|
trusted library allocation
|
page read and write
|
||
1E341465000
|
heap
|
page read and write
|
||
1B2FD370000
|
trusted library allocation
|
page read and write
|
||
1B2FCE9C000
|
heap
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
7FF848B60000
|
trusted library allocation
|
page read and write
|
||
236BBBEF000
|
trusted library allocation
|
page read and write
|
||
24180228000
|
trusted library allocation
|
page read and write
|
||
3FF1779000
|
stack
|
page read and write
|
||
2197B06A000
|
heap
|
page read and write
|
||
7FF848A09000
|
trusted library allocation
|
page read and write
|
||
7FF848C60000
|
trusted library allocation
|
page read and write
|
||
1F0B1F47000
|
heap
|
page read and write
|
||
7FF848A70000
|
trusted library allocation
|
page read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
1E341986000
|
heap
|
page read and write
|
||
241F1C06000
|
heap
|
page execute and read and write
|
||
7FF848835000
|
trusted library allocation
|
page read and write
|
||
2197B2AE000
|
heap
|
page read and write
|
||
7FF848906000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1B489590000
|
heap
|
page read and write
|
||
1B48B090000
|
trusted library allocation
|
page read and write
|
||
1F970BA0000
|
trusted library allocation
|
page read and write
|
||
1B2FCE70000
|
trusted library allocation
|
page read and write
|
||
1E341951000
|
heap
|
page read and write
|
||
27C62A10000
|
heap
|
page execute and read and write
|
||
64500FE000
|
stack
|
page read and write
|
||
7FF848B60000
|
trusted library allocation
|
page read and write
|
||
7FF848A80000
|
trusted library allocation
|
page read and write
|
||
7FF848B60000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
1E341513000
|
heap
|
page read and write
|
||
7FF848AC4000
|
trusted library allocation
|
page read and write
|
||
2197AB00000
|
trusted library allocation
|
page read and write
|
||
7FF848B89000
|
trusted library allocation
|
page read and write
|
||
1E341904000
|
heap
|
page read and write
|
||
1B48B0B0000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
7FF78C9F0000
|
unkown
|
page readonly
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
22C06B68000
|
heap
|
page read and write
|
||
1E340F28000
|
heap
|
page read and write
|
||
21901C10000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
1B2FCE70000
|
trusted library allocation
|
page read and write
|
||
7FF84884D000
|
trusted library allocation
|
page execute and read and write
|
||
3FF1A3E000
|
stack
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1E340ED0000
|
heap
|
page read and write
|
||
241F1540000
|
heap
|
page read and write
|
||
3FF260E000
|
stack
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
FDD90FE000
|
stack
|
page read and write
|
||
7FF848B94000
|
trusted library allocation
|
page read and write
|
||
1E3418CD000
|
heap
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
2456B620000
|
trusted library allocation
|
page read and write
|
||
1E3414E9000
|
heap
|
page read and write
|
||
1B48AE90000
|
trusted library allocation
|
page read and write
|
||
7A90F7D000
|
stack
|
page read and write
|
||
241F1775000
|
heap
|
page read and write
|
||
1E34152D000
|
heap
|
page read and write
|
||
1E341955000
|
heap
|
page read and write
|
||
7FF848A12000
|
trusted library allocation
|
page read and write
|
||
1F970D6C000
|
heap
|
page read and write
|
||
236D2AD6000
|
heap
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
7FF848BA0000
|
trusted library allocation
|
page read and write
|
||
1F970BA0000
|
trusted library allocation
|
page read and write
|
||
1F0B02DC000
|
heap
|
page read and write
|
||
1E341430000
|
heap
|
page read and write
|
||
1B4894A9000
|
heap
|
page read and write
|
||
1F970C90000
|
trusted library allocation
|
page read and write
|
||
7FF848AC0000
|
trusted library allocation
|
page read and write
|
||
7FF8489F0000
|
trusted library allocation
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
24181C14000
|
trusted library allocation
|
page read and write
|
||
1B48B090000
|
trusted library allocation
|
page read and write
|
||
3FF1ABE000
|
stack
|
page read and write
|
||
24510009000
|
trusted library allocation
|
page read and write
|
||
27C4A8F0000
|
heap
|
page read and write
|
||
1B4893F8000
|
heap
|
page read and write
|
||
36045FF000
|
stack
|
page read and write
|
||
1B48B083000
|
trusted library allocation
|
page read and write
|
||
2197B308000
|
heap
|
page read and write
|
||
7A90B8E000
|
stack
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
7FF848A34000
|
trusted library allocation
|
page read and write
|
||
1E341510000
|
heap
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
FDD9179000
|
stack
|
page read and write
|
||
1E3418F4000
|
heap
|
page read and write
|
||
1E341972000
|
heap
|
page read and write
|
||
2197A940000
|
heap
|
page readonly
|
||
7FF848A00000
|
trusted library allocation
|
page execute and read and write
|
||
1F96F07D000
|
heap
|
page read and write
|
||
7FF84886B000
|
trusted library allocation
|
page read and write
|
||
27C4A360000
|
trusted library allocation
|
page read and write
|
||
7E8A54E000
|
stack
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1F970B73000
|
trusted library allocation
|
page read and write
|
||
7FF848A10000
|
trusted library allocation
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
FDD9FCE000
|
stack
|
page read and write
|
||
1B48949B000
|
heap
|
page read and write
|
||
1B2FCE30000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
3FF1679000
|
stack
|
page read and write
|
||
1B2FB40B000
|
heap
|
page read and write
|
||
7FF848830000
|
trusted library allocation
|
page read and write
|
||
1E341465000
|
heap
|
page read and write
|
||
7FF848AB0000
|
trusted library allocation
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
241F21AD000
|
heap
|
page read and write
|
||
1F96F047000
|
heap
|
page read and write
|
||
1B2FCFC0000
|
trusted library allocation
|
page read and write
|
||
1E34193C000
|
heap
|
page read and write
|
||
6450B4E000
|
stack
|
page read and write
|
||
2191007C000
|
trusted library allocation
|
page read and write
|
||
1E3418B0000
|
heap
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
2197B068000
|
heap
|
page read and write
|
||
1F970BA0000
|
trusted library allocation
|
page read and write
|
||
1E341465000
|
heap
|
page read and write
|
||
27C4B105000
|
trusted library allocation
|
page read and write
|
||
27C49D18000
|
heap
|
page read and write
|
||
1B2FB1E0000
|
heap
|
page read and write
|
||
7DF43D860000
|
trusted library allocation
|
page execute and read and write
|
||
241F157C000
|
heap
|
page read and write
|
||
1B2FCE60000
|
trusted library allocation
|
page read and write
|
||
241F1C60000
|
heap
|
page read and write
|
||
7FF848B70000
|
trusted library allocation
|
page read and write
|
||
1E3418F4000
|
heap
|
page read and write
|
||
1F910009000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
7FF8489E8000
|
trusted library allocation
|
page execute and read and write
|
||
1E34193E000
|
heap
|
page read and write
|
||
27C4BC6D000
|
trusted library allocation
|
page read and write
|
||
1F0B0260000
|
heap
|
page read and write
|
||
241804B6000
|
trusted library allocation
|
page read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
FDD94FF000
|
stack
|
page read and write
|
||
7FF8489E4000
|
trusted library allocation
|
page execute and read and write
|
||
7DF485130000
|
trusted library allocation
|
page execute and read and write
|
||
1E34193F000
|
heap
|
page read and write
|
||
2456B620000
|
trusted library allocation
|
page read and write
|
||
3606BFE000
|
stack
|
page read and write
|
||
3FF11DE000
|
stack
|
page read and write
|
||
1E34150C000
|
heap
|
page read and write
|
||
236BA480000
|
trusted library allocation
|
page read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
7FF848A60000
|
trusted library allocation
|
page read and write
|
||
7A90E7E000
|
stack
|
page read and write
|
||
7FF8489E0000
|
trusted library allocation
|
page read and write
|
||
7FF848C2A000
|
trusted library allocation
|
page read and write
|
||
1B489464000
|
heap
|
page read and write
|
||
1E3418E6000
|
heap
|
page read and write
|
||
1E341463000
|
heap
|
page read and write
|
||
236BA450000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
645017B000
|
stack
|
page read and write
|
||
7FF8489EA000
|
trusted library allocation
|
page read and write
|
||
7FF848832000
|
trusted library allocation
|
page read and write
|
||
1B48B090000
|
trusted library allocation
|
page read and write
|
||
24180001000
|
trusted library allocation
|
page read and write
|
||
236D2DC0000
|
heap
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
24569DC0000
|
heap
|
page read and write
|
||
241F157E000
|
heap
|
page read and write
|
||
7FF848AD0000
|
trusted library allocation
|
page read and write
|
||
1B48B083000
|
trusted library allocation
|
page read and write
|
||
7FF848A18000
|
trusted library allocation
|
page execute and read and write
|
||
21900492000
|
trusted library allocation
|
page read and write
|
||
1F970BC0000
|
trusted library allocation
|
page read and write
|
||
FDD9279000
|
stack
|
page read and write
|
||
CD289FD000
|
stack
|
page read and write
|
||
2190186B000
|
trusted library allocation
|
page read and write
|
||
236BC495000
|
trusted library allocation
|
page read and write
|
||
7E897F9000
|
stack
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
27C5A971000
|
trusted library allocation
|
page read and write
|
||
236CAB77000
|
trusted library allocation
|
page read and write
|
||
27C49CA0000
|
heap
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1B2FB3D6000
|
heap
|
page read and write
|
||
1F970B93000
|
trusted library allocation
|
page read and write
|
||
7FF848BA9000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1F970BA0000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1B2FCE70000
|
trusted library allocation
|
page read and write
|
||
1E341975000
|
heap
|
page read and write
|
||
7DF4A7D10000
|
trusted library allocation
|
page execute and read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1F0B1E90000
|
trusted library allocation
|
page read and write
|
||
1E341465000
|
heap
|
page read and write
|
||
27C49D55000
|
heap
|
page read and write
|
||
27C4A445000
|
heap
|
page read and write
|
||
1F0B1D90000
|
trusted library allocation
|
page read and write
|
||
1E34146E000
|
heap
|
page read and write
|
||
1B489428000
|
heap
|
page read and write
|
||
7E89978000
|
stack
|
page read and write
|
||
3604AFF000
|
stack
|
page read and write
|
||
1F970BC0000
|
trusted library allocation
|
page read and write
|
||
1E340F3E000
|
heap
|
page read and write
|
||
7FF848AF0000
|
trusted library allocation
|
page read and write
|
||
1F0B1DF0000
|
heap
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
1E341904000
|
heap
|
page read and write
|
||
1B2FCE43000
|
trusted library allocation
|
page read and write
|
||
7FF848860000
|
trusted library allocation
|
page read and write
|
||
7FF848900000
|
trusted library allocation
|
page read and write
|
||
2197B271000
|
heap
|
page read and write
|
||
236BB80A000
|
trusted library allocation
|
page read and write
|
||
7FF78C9F1000
|
unkown
|
page execute read
|
||
7FF8489E0000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
1F970BA0000
|
trusted library allocation
|
page read and write
|
||
2456B620000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
2197A444000
|
heap
|
page read and write
|
||
1E3414E4000
|
heap
|
page read and write
|
||
1E341504000
|
heap
|
page read and write
|
||
B0D147D000
|
stack
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
7E89A7E000
|
stack
|
page read and write
|
||
2197A3D8000
|
heap
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
24569B3A000
|
heap
|
page read and write
|
||
7FF848A92000
|
trusted library allocation
|
page read and write
|
||
7FF8488E0000
|
trusted library allocation
|
page execute and read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
236B9CB0000
|
heap
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
7FF848850000
|
trusted library allocation
|
page read and write
|
||
1E34196B000
|
heap
|
page read and write
|
||
1E3418CB000
|
heap
|
page read and write
|
||
1B2FCFB0000
|
trusted library allocation
|
page read and write
|
||
1B2FCE70000
|
trusted library allocation
|
page read and write
|
||
7FF84890C000
|
trusted library allocation
|
page execute and read and write
|
||
1B2FCD90000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
241F20C0000
|
heap
|
page execute and read and write
|
||
7E898FA000
|
stack
|
page read and write
|
||
27C4B114000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
7FF848A80000
|
trusted library allocation
|
page read and write
|
||
1F970B60000
|
trusted library allocation
|
page read and write
|
||
1E341452000
|
heap
|
page read and write
|
||
3FF1BBE000
|
stack
|
page read and write
|
||
1F970A40000
|
heap
|
page readonly
|
||
7E8A6CA000
|
stack
|
page read and write
|
||
27C49D58000
|
heap
|
page read and write
|
||
7FF8489D5000
|
trusted library allocation
|
page read and write
|
||
7FF848A0A000
|
trusted library allocation
|
page read and write
|
||
7FF848B70000
|
trusted library allocation
|
page read and write
|
||
644FB79000
|
stack
|
page read and write
|
||
1B2FB5C5000
|
heap
|
page read and write
|
||
7FF8489F0000
|
trusted library allocation
|
page read and write
|
||
219102F5000
|
trusted library allocation
|
page read and write
|
||
1B48B090000
|
trusted library allocation
|
page read and write
|
||
1F96F01B000
|
heap
|
page read and write
|
||
2197A390000
|
heap
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
7FF8489F0000
|
trusted library allocation
|
page read and write
|
||
24569AFC000
|
heap
|
page read and write
|
||
7FF848853000
|
trusted library allocation
|
page execute and read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
2456B620000
|
trusted library allocation
|
page read and write
|
||
27C62C8D000
|
heap
|
page read and write
|
||
27C62E10000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
7FF848BB8000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1B48B090000
|
trusted library allocation
|
page read and write
|
||
847ACFF000
|
stack
|
page read and write
|
||
1B2FCE70000
|
trusted library allocation
|
page read and write
|
||
3FF1153000
|
stack
|
page read and write
|
||
241F1520000
|
heap
|
page read and write
|
||
7FF848AA2000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
27C4A050000
|
heap
|
page read and write
|
||
1E341904000
|
heap
|
page read and write
|
||
1E341904000
|
heap
|
page read and write
|
||
1E3414E6000
|
heap
|
page read and write
|
||
1E341463000
|
heap
|
page read and write
|
||
2456B79D000
|
heap
|
page read and write
|
||
7E89878000
|
stack
|
page read and write
|
||
2456B603000
|
trusted library allocation
|
page read and write
|
||
1B49B0E9000
|
trusted library allocation
|
page read and write
|
||
7FF848A22000
|
trusted library allocation
|
page read and write
|
||
7FF848BB8000
|
trusted library allocation
|
page read and write
|
||
27C62C72000
|
heap
|
page read and write
|
||
7FF848AE0000
|
trusted library allocation
|
page read and write
|
||
2456B623000
|
trusted library allocation
|
page read and write
|
||
7FF848B10000
|
trusted library allocation
|
page read and write
|
||
1F0B1EB0000
|
trusted library allocation
|
page read and write
|
||
7FF848AC0000
|
trusted library allocation
|
page read and write
|
||
1F0B1EA0000
|
trusted library allocation
|
page read and write
|
||
1F0B1E83000
|
trusted library allocation
|
page read and write
|
||
1F970D25000
|
heap
|
page read and write
|
||
27C62C9E000
|
heap
|
page read and write
|
||
644FCFD000
|
stack
|
page read and write
|
||
1E34146A000
|
heap
|
page read and write
|
||
1E34152D000
|
heap
|
page read and write
|
||
1F0B1EA0000
|
trusted library allocation
|
page read and write
|
||
236CAB71000
|
trusted library allocation
|
page read and write
|
||
1E3418E9000
|
heap
|
page read and write
|
||
1E3418DA000
|
heap
|
page read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
7FF78D220000
|
unkown
|
page read and write
|
||
7FF848926000
|
trusted library allocation
|
page execute and read and write
|
||
1E341989000
|
heap
|
page read and write
|
||
1F970BA0000
|
trusted library allocation
|
page read and write
|
||
7FF848C90000
|
trusted library allocation
|
page read and write
|
||
2456B5F3000
|
trusted library allocation
|
page read and write
|
||
7FF848C60000
|
trusted library allocation
|
page read and write
|
||
1B48B081000
|
trusted library allocation
|
page read and write
|
||
1E3414B8000
|
heap
|
page read and write
|
||
644F73E000
|
stack
|
page read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
22C06B60000
|
heap
|
page read and write
|
||
27C4AD61000
|
trusted library allocation
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
1F0B1EA0000
|
trusted library allocation
|
page read and write
|
||
2456B5B0000
|
trusted library allocation
|
page read and write
|
||
644FE7C000
|
stack
|
page read and write
|
||
1B2FCE70000
|
trusted library allocation
|
page read and write
|
||
7FF8489D4000
|
trusted library allocation
|
page execute and read and write
|
||
1F970BB0000
|
trusted library allocation
|
page read and write
|
||
3FF19BE000
|
stack
|
page read and write
|
||
7FF8489F0000
|
trusted library allocation
|
page read and write
|
||
1E34190A000
|
heap
|
page read and write
|
||
2197A930000
|
trusted library allocation
|
page read and write
|
||
1E340FB5000
|
heap
|
page read and write
|
||
3605FFE000
|
stack
|
page read and write
|
||
24181873000
|
trusted library allocation
|
page read and write
|
||
7FF848A70000
|
trusted library allocation
|
page read and write
|
||
36059EC000
|
stack
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
27C62AD0000
|
heap
|
page read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1B48B083000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
7FF848B00000
|
trusted library allocation
|
page read and write
|
||
2418081E000
|
trusted library allocation
|
page read and write
|
||
1E3414F0000
|
heap
|
page read and write
|
||
236B9EBC000
|
heap
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
36055F2000
|
stack
|
page read and write
|
||
7FF848852000
|
trusted library allocation
|
page read and write
|
||
7FF848BB0000
|
trusted library allocation
|
page read and write
|
||
1E34151D000
|
heap
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
7FF848A40000
|
trusted library allocation
|
page execute and read and write
|
||
241F2449000
|
heap
|
page read and write
|
||
2197B050000
|
heap
|
page read and write
|
||
1E341955000
|
heap
|
page read and write
|
||
27C5A921000
|
trusted library allocation
|
page read and write
|
||
2456B620000
|
trusted library allocation
|
page read and write
|
||
27C5ABEA000
|
trusted library allocation
|
page read and write
|
||
236BA3E0000
|
trusted library allocation
|
page read and write
|
||
1B2FB3DC000
|
heap
|
page read and write
|
||
7FF848970000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848A10000
|
trusted library allocation
|
page execute and read and write
|
||
1B489494000
|
heap
|
page read and write
|
||
236B9E60000
|
trusted library allocation
|
page read and write
|
||
1E341457000
|
heap
|
page read and write
|
||
7DF4993E0000
|
trusted library allocation
|
page execute and read and write
|
||
27C5A910000
|
trusted library allocation
|
page read and write
|
||
7FF848A00000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848950000
|
trusted library allocation
|
page execute and read and write
|
||
2197B279000
|
heap
|
page read and write
|
||
7FF848A70000
|
trusted library allocation
|
page read and write
|
||
1B2FB2C0000
|
heap
|
page read and write
|
||
FDD9379000
|
stack
|
page read and write
|
||
1F970A60000
|
heap
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
7FF848A20000
|
trusted library allocation
|
page execute and read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1E341465000
|
heap
|
page read and write
|
||
27C4A350000
|
heap
|
page readonly
|
||
7FF848AE6000
|
trusted library allocation
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
1B4894F0000
|
heap
|
page read and write
|
||
1E341929000
|
heap
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
3605DFE000
|
stack
|
page read and write
|
||
1E341463000
|
heap
|
page read and write
|
||
7FF8489D5000
|
trusted library allocation
|
page read and write
|
||
1F970BD0000
|
heap
|
page read and write
|
||
27C4C1CB000
|
trusted library allocation
|
page read and write
|
||
21900813000
|
trusted library allocation
|
page read and write
|
||
7FF8489E1000
|
trusted library allocation
|
page read and write
|
||
1F970BA0000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
2197B06E000
|
heap
|
page read and write
|
||
24181C18000
|
trusted library allocation
|
page read and write
|
||
1F96EF80000
|
heap
|
page read and write
|
||
1E34150B000
|
heap
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
36053EF000
|
stack
|
page read and write
|
||
7FF848AC1000
|
trusted library allocation
|
page read and write
|
||
1E3414E9000
|
heap
|
page read and write
|
||
1E3414E1000
|
heap
|
page read and write
|
||
1E341502000
|
heap
|
page read and write
|
||
2456B620000
|
trusted library allocation
|
page read and write
|
||
1E3418CA000
|
heap
|
page read and write
|
||
1B4893C0000
|
heap
|
page read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
1B4895A0000
|
heap
|
page read and write
|
||
7FF848AD1000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
1F0B0292000
|
heap
|
page read and write
|
||
7FF848AA8000
|
trusted library allocation
|
page read and write
|
||
1B2FCFD0000
|
trusted library allocation
|
page read and write
|
||
1E341461000
|
heap
|
page read and write
|
||
236B9D90000
|
heap
|
page read and write
|
||
7FF848CA0000
|
trusted library allocation
|
page read and write
|
||
7FF8488E6000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
1B48B090000
|
trusted library allocation
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
847AC73000
|
stack
|
page read and write
|
||
1E340F96000
|
heap
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
21901840000
|
trusted library allocation
|
page read and write
|
||
CD28A7C000
|
stack
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
7FF84886B000
|
trusted library allocation
|
page read and write
|
||
1F96F250000
|
heap
|
page read and write
|
||
27C62BF0000
|
heap
|
page read and write
|
||
24569B34000
|
heap
|
page read and write
|
||
241F242A000
|
heap
|
page read and write
|
||
1F0B02F9000
|
heap
|
page read and write
|
||
B0D157E000
|
stack
|
page read and write
|
||
1B48AF53000
|
trusted library allocation
|
page read and write
|
||
1B4894CB000
|
heap
|
page read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
7FF848865000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
7FF848A80000
|
trusted library allocation
|
page read and write
|
||
1B4A3470000
|
heap
|
page execute and read and write
|
||
1B29000E000
|
trusted library allocation
|
page read and write
|
||
241F1C40000
|
heap
|
page read and write
|
||
1E341514000
|
heap
|
page read and write
|
||
7FF848B50000
|
trusted library allocation
|
page read and write
|
||
2197AA10000
|
trusted library allocation
|
page read and write
|
||
7FF848C40000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1B489466000
|
heap
|
page read and write
|
||
1E341460000
|
heap
|
page read and write
|
||
2456B6F0000
|
trusted library allocation
|
page read and write
|
||
7FF848A00000
|
trusted library allocation
|
page execute and read and write
|
||
3605BE5000
|
stack
|
page read and write
|
||
27C49D12000
|
heap
|
page read and write
|
||
241F2428000
|
heap
|
page read and write
|
||
1F970BA0000
|
trusted library allocation
|
page read and write
|
||
7FF848A90000
|
trusted library allocation
|
page read and write
|
||
241902EA000
|
trusted library allocation
|
page read and write
|
||
27C4AB28000
|
trusted library allocation
|
page read and write
|
||
7FF848AE2000
|
trusted library allocation
|
page read and write
|
||
7FF848BA9000
|
trusted library allocation
|
page read and write
|
||
7FF84883D000
|
trusted library allocation
|
page execute and read and write
|
||
1B48B0A0000
|
trusted library allocation
|
page read and write
|
||
36059F8000
|
stack
|
page read and write
|
||
1E34196B000
|
heap
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
7FF848C70000
|
trusted library allocation
|
page execute and read and write
|
||
1E340D50000
|
heap
|
page read and write
|
||
7FF848A30000
|
trusted library allocation
|
page read and write
|
||
1B4895F0000
|
heap
|
page read and write
|
||
FDD8BEE000
|
stack
|
page read and write
|
||
7FF848C90000
|
trusted library allocation
|
page read and write
|
||
2456B630000
|
heap
|
page read and write
|
||
1B48B0A0000
|
trusted library allocation
|
page read and write
|
||
1F0B02AB000
|
heap
|
page read and write
|
||
24569B08000
|
heap
|
page read and write
|
||
236BC499000
|
trusted library allocation
|
page read and write
|
||
24569B36000
|
heap
|
page read and write
|
||
236D2BF5000
|
heap
|
page read and write
|
||
7FF848862000
|
trusted library allocation
|
page read and write
|
||
236D2B9C000
|
heap
|
page read and write
|
||
7FF8489E0000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
241F2290000
|
heap
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
7FF848B80000
|
trusted library allocation
|
page read and write
|
||
1E341952000
|
heap
|
page read and write
|
||
E931BDE000
|
stack
|
page read and write
|
||
7FF848CB0000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
7FF848AA0000
|
trusted library allocation
|
page read and write
|
||
7FF848A04000
|
trusted library allocation
|
page execute and read and write
|
||
7DF4D4690000
|
trusted library allocation
|
page execute and read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
7FF848A30000
|
trusted library allocation
|
page read and write
|
||
7FF848A20000
|
trusted library allocation
|
page read and write
|
||
1F970D20000
|
heap
|
page read and write
|
||
2197B2FB000
|
heap
|
page read and write
|
||
1F0B028C000
|
heap
|
page read and write
|
||
7FF848A00000
|
trusted library allocation
|
page read and write
|
||
E931E7F000
|
stack
|
page read and write
|
||
1B48AEA0000
|
heap
|
page readonly
|
||
7FF848B83000
|
trusted library allocation
|
page read and write
|
||
24569B77000
|
heap
|
page read and write
|
||
1B48B0A0000
|
trusted library allocation
|
page read and write
|
||
7FF848A50000
|
trusted library allocation
|
page read and write
|
||
7FF848B50000
|
trusted library allocation
|
page read and write
|
||
2456B620000
|
trusted library allocation
|
page read and write
|
||
7FF848AD2000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
7DF456370000
|
trusted library allocation
|
page execute and read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
2456B620000
|
trusted library allocation
|
page read and write
|
||
1B4894B8000
|
heap
|
page read and write
|
||
1E3414E7000
|
heap
|
page read and write
|
||
7FF8489DD000
|
trusted library allocation
|
page execute and read and write
|
||
27C4AD69000
|
trusted library allocation
|
page read and write
|
||
1F0B1EA0000
|
trusted library allocation
|
page read and write
|
||
7FF848936000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8489DD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8489F3000
|
trusted library allocation
|
page read and write
|
||
7FF848A30000
|
trusted library allocation
|
page execute and read and write
|
||
2197A392000
|
heap
|
page read and write
|
||
1E3414E6000
|
heap
|
page read and write
|
||
7FF848970000
|
trusted library allocation
|
page execute and read and write
|
||
7DF476900000
|
trusted library allocation
|
page execute and read and write
|
||
1B2FCE40000
|
trusted library allocation
|
page read and write
|
||
7FF848900000
|
trusted library allocation
|
page read and write
|
||
7FF848A2E000
|
trusted library allocation
|
page read and write
|
||
7FF848A60000
|
trusted library allocation
|
page read and write
|
||
1B28001B000
|
trusted library allocation
|
page read and write
|
||
7E895FA000
|
stack
|
page read and write
|
||
1E341942000
|
heap
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1F0C2119000
|
trusted library allocation
|
page read and write
|
||
7FF848A34000
|
trusted library allocation
|
page read and write
|
||
7DF4A7CF0000
|
trusted library allocation
|
page execute and read and write
|
||
7DF4D46A0000
|
trusted library allocation
|
page execute and read and write
|
||
1B4893F0000
|
heap
|
page read and write
|
||
7FF848AA2000
|
trusted library allocation
|
page read and write
|
||
1B48B090000
|
trusted library allocation
|
page read and write
|
||
1F0B0430000
|
heap
|
page read and write
|
||
7FF848AF0000
|
trusted library allocation
|
page read and write
|
||
644F7BE000
|
stack
|
page read and write
|
||
3FF268D000
|
stack
|
page read and write
|
||
7FF848BBA000
|
trusted library allocation
|
page read and write
|
||
1F0B1D50000
|
heap
|
page read and write
|
||
241F1BC0000
|
trusted library allocation
|
page read and write
|
||
2456B5C0000
|
heap
|
page readonly
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
236BBC68000
|
trusted library allocation
|
page read and write
|
||
1B2FCD72000
|
heap
|
page read and write
|
||
241F15C5000
|
heap
|
page read and write
|
||
27C4B234000
|
trusted library allocation
|
page read and write
|
||
2456B5D0000
|
trusted library allocation
|
page read and write
|
||
27C4C44C000
|
trusted library allocation
|
page read and write
|
||
1F0B02A8000
|
heap
|
page read and write
|
||
1E340F85000
|
heap
|
page read and write
|
||
1B2FCDA0000
|
heap
|
page readonly
|
||
7FF8489CD000
|
trusted library allocation
|
page execute and read and write
|
||
21900001000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
236D2AD0000
|
heap
|
page read and write
|
||
7FF848A32000
|
trusted library allocation
|
page read and write
|
||
7DF49C5A0000
|
trusted library allocation
|
page execute and read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
7DF4993F0000
|
trusted library allocation
|
page execute and read and write
|
||
1B489426000
|
heap
|
page read and write
|
||
7FF848C5C000
|
trusted library allocation
|
page read and write
|
||
241F158A000
|
heap
|
page read and write
|
||
27C629AE000
|
heap
|
page read and write
|
||
7FF848ACA000
|
trusted library allocation
|
page read and write
|
||
2197A39E000
|
heap
|
page read and write
|
||
2456B620000
|
trusted library allocation
|
page read and write
|
||
1B48B090000
|
trusted library allocation
|
page read and write
|
||
27C49CD0000
|
heap
|
page read and write
|
||
1E340F0C000
|
heap
|
page read and write
|
||
1B2FD380000
|
trusted library allocation
|
page read and write
|
||
236B9E40000
|
trusted library allocation
|
page read and write
|
||
7FF8489F0000
|
trusted library allocation
|
page execute and read and write
|
||
1E34152B000
|
heap
|
page read and write
|
||
7FF848A01000
|
trusted library allocation
|
page read and write
|
||
1F96F018000
|
heap
|
page read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
236D2BF9000
|
heap
|
page read and write
|
||
7FF848A16000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848B50000
|
trusted library allocation
|
page read and write
|
||
7E896F9000
|
stack
|
page read and write
|
||
236CA8F2000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1E341940000
|
heap
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
7E899FE000
|
stack
|
page read and write
|
||
7E8977D000
|
stack
|
page read and write
|
||
2197A9B0000
|
heap
|
page execute and read and write
|
||
1B290009000
|
trusted library allocation
|
page read and write
|
||
2197AA40000
|
trusted library allocation
|
page read and write
|
||
1B2FB360000
|
heap
|
page read and write
|
||
1E3418FD000
|
heap
|
page read and write
|
||
1F0B0268000
|
heap
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
3FF157A000
|
stack
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
1F96F002000
|
heap
|
page read and write
|
||
7FF8488D0000
|
trusted library allocation
|
page read and write
|
||
236D2B7C000
|
heap
|
page read and write
|
||
27C4B019000
|
trusted library allocation
|
page read and write
|
||
7FF848A05000
|
trusted library allocation
|
page read and write
|
||
241F1420000
|
heap
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
1B2FCFB0000
|
trusted library allocation
|
page read and write
|
||
7FF848BB2000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1B2FB388000
|
heap
|
page read and write
|
||
1F0B1E83000
|
trusted library allocation
|
page read and write
|
||
241F2170000
|
heap
|
page read and write
|
||
7FF848940000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848A00000
|
trusted library allocation
|
page read and write
|
||
FDD947E000
|
stack
|
page read and write
|
||
7FF848AE0000
|
trusted library allocation
|
page read and write
|
||
FDD91FD000
|
stack
|
page read and write
|
||
1E3418F4000
|
heap
|
page read and write
|
||
219102ED000
|
trusted library allocation
|
page read and write
|
||
7FF848C30000
|
trusted library allocation
|
page read and write
|
||
1B2FCE73000
|
trusted library allocation
|
page read and write
|
||
7FF848C60000
|
trusted library allocation
|
page read and write
|
||
7FF848AB2000
|
trusted library allocation
|
page read and write
|
||
7FF848BBC000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
236CAB79000
|
trusted library allocation
|
page read and write
|
||
7FF84883D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848B20000
|
trusted library allocation
|
page read and write
|
||
7E8957E000
|
stack
|
page read and write
|
||
FDD93F9000
|
stack
|
page read and write
|
||
27C62C48000
|
heap
|
page read and write
|
||
1B48AF60000
|
heap
|
page read and write
|
||
1E341461000
|
heap
|
page read and write
|
||
1B48B0A0000
|
trusted library allocation
|
page read and write
|
||
1F0B1E73000
|
trusted library allocation
|
page read and write
|
||
644FFFE000
|
stack
|
page read and write
|
||
1E341526000
|
heap
|
page read and write
|
||
7FF848960000
|
trusted library allocation
|
page execute and read and write
|
||
1B2FCFA0000
|
heap
|
page execute and read and write
|
||
219102EF000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
2456B700000
|
trusted library allocation
|
page read and write
|
||
FB7E5FD000
|
stack
|
page read and write
|
||
1F0B031B000
|
heap
|
page read and write
|
||
3FF1837000
|
stack
|
page read and write
|
||
7FF848AC0000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
7FF848AE0000
|
trusted library allocation
|
page read and write
|
||
1B2FCE60000
|
trusted library allocation
|
page read and write
|
||
24569DF0000
|
heap
|
page read and write
|
||
36068FF000
|
stack
|
page read and write
|
||
1E3418E9000
|
heap
|
page read and write
|
||
7FF848980000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8489D8000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848852000
|
trusted library allocation
|
page read and write
|
||
2197B040000
|
heap
|
page execute and read and write
|
||
7DF49C590000
|
trusted library allocation
|
page execute and read and write
|
||
241F23F5000
|
heap
|
page read and write
|
||
6450BCE000
|
stack
|
page read and write
|
||
1B48B0E2000
|
heap
|
page read and write
|
||
7FF848B90000
|
trusted library allocation
|
page read and write
|
||
1B48B0E1000
|
trusted library allocation
|
page read and write
|
||
1B2FCFD0000
|
trusted library allocation
|
page read and write
|
||
27C49D2C000
|
heap
|
page read and write
|
||
2456B7A6000
|
heap
|
page read and write
|
||
7FF848BB5000
|
trusted library allocation
|
page read and write
|
||
24569DA5000
|
heap
|
page read and write
|
||
241F1B50000
|
trusted library allocation
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
1F96F045000
|
heap
|
page read and write
|
||
7FF848B92000
|
trusted library allocation
|
page read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
1B48B090000
|
trusted library allocation
|
page read and write
|
||
7FF8489F2000
|
trusted library allocation
|
page read and write
|
||
1F970BB0000
|
trusted library allocation
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1B2FB3A7000
|
heap
|
page read and write
|
||
7FF848A50000
|
trusted library allocation
|
page read and write
|
||
7FF8489D0000
|
trusted library allocation
|
page read and write
|
||
1E340EDC000
|
heap
|
page read and write
|
||
241F1770000
|
heap
|
page read and write
|
||
7FF848C20000
|
trusted library allocation
|
page read and write
|
||
7DF476910000
|
trusted library allocation
|
page execute and read and write
|
||
3FF18B9000
|
stack
|
page read and write
|
||
7FF8489F1000
|
trusted library allocation
|
page read and write
|
||
1B2FCFB0000
|
trusted library allocation
|
page read and write
|
||
7FF848A06000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848A80000
|
trusted library allocation
|
page read and write
|
||
1F96EFD0000
|
heap
|
page read and write
|
||
24181848000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
7FF848823000
|
trusted library allocation
|
page execute and read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
7FF848AC0000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
7FF848842000
|
trusted library allocation
|
page read and write
|
||
1B2FB43D000
|
heap
|
page read and write
|
||
7FF8489F9000
|
trusted library allocation
|
page read and write
|
||
7FF848B10000
|
trusted library allocation
|
page read and write
|
||
1B489422000
|
heap
|
page read and write
|
||
7FF848C30000
|
trusted library allocation
|
page read and write
|
||
236BA881000
|
trusted library allocation
|
page read and write
|
||
1B48B090000
|
trusted library allocation
|
page read and write
|
||
21900490000
|
trusted library allocation
|
page read and write
|
||
7FF8488F0000
|
trusted library allocation
|
page execute and read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
7FF848834000
|
trusted library allocation
|
page read and write
|
||
1E3418F4000
|
heap
|
page read and write
|
||
7FF8489F0000
|
trusted library allocation
|
page read and write
|
||
1E34191C000
|
heap
|
page read and write
|
||
1F96F08B000
|
heap
|
page read and write
|
||
B0D11AE000
|
stack
|
page read and write
|
||
1E3418DB000
|
heap
|
page read and write
|
||
241F159C000
|
heap
|
page read and write
|
||
236BC14F000
|
trusted library allocation
|
page read and write
|
||
1E340F71000
|
heap
|
page read and write
|
||
236BA4E0000
|
heap
|
page execute and read and write
|
||
7FF848A10000
|
trusted library allocation
|
page read and write
|
||
7FF848B60000
|
trusted library allocation
|
page read and write
|
||
1E3418CB000
|
heap
|
page read and write
|
||
1E341461000
|
heap
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
21901B47000
|
trusted library allocation
|
page read and write
|
||
7DF4D4680000
|
trusted library allocation
|
page execute and read and write
|
||
241F1C65000
|
heap
|
page read and write
|
||
2456BDA0000
|
heap
|
page execute and read and write
|
||
FDDA04C000
|
stack
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
7FF848A0D000
|
trusted library allocation
|
page execute and read and write
|
||
1F970A50000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
7FF848936000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848C50000
|
trusted library allocation
|
page read and write
|
||
7FF848C80000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
27C4A055000
|
heap
|
page read and write
|
||
7E89B7C000
|
stack
|
page read and write
|
||
236BB097000
|
trusted library allocation
|
page read and write
|
||
1E3414E4000
|
heap
|
page read and write
|
||
7FF848916000
|
trusted library allocation
|
page execute and read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
7FF848A0A000
|
trusted library allocation
|
page read and write
|
||
1F970B93000
|
trusted library allocation
|
page read and write
|
||
241F21C1000
|
heap
|
page read and write
|
||
236BC0C7000
|
trusted library allocation
|
page read and write
|
||
24190021000
|
trusted library allocation
|
page read and write
|
||
7FF8488EC000
|
trusted library allocation
|
page execute and read and write
|
||
24569DF5000
|
heap
|
page read and write
|
||
7FF848A10000
|
trusted library allocation
|
page execute and read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1E341452000
|
heap
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
7FF848A40000
|
trusted library allocation
|
page execute and read and write
|
||
1B2FCE85000
|
heap
|
page read and write
|
||
7FF848B90000
|
trusted library allocation
|
page read and write
|
||
21900719000
|
trusted library allocation
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
27C4C170000
|
trusted library allocation
|
page read and write
|
||
7E891B2000
|
stack
|
page read and write
|
||
1F0B2111000
|
trusted library allocation
|
page read and write
|
||
7FF848AF0000
|
trusted library allocation
|
page read and write
|
||
27C49D10000
|
heap
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
7A90B02000
|
stack
|
page read and write
|
||
7FF78D224000
|
unkown
|
page readonly
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
21910001000
|
trusted library allocation
|
page read and write
|
||
7FF848B84000
|
trusted library allocation
|
page read and write
|
||
236BAF9C000
|
trusted library allocation
|
page read and write
|
||
1F0B1E06000
|
heap
|
page read and write
|
||
7FF848854000
|
trusted library allocation
|
page read and write
|
||
7FF848BA8000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1B2FCE51000
|
trusted library allocation
|
page read and write
|
||
241813D9000
|
trusted library allocation
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
1F970BB0000
|
trusted library allocation
|
page read and write
|
||
7FF8489D3000
|
trusted library allocation
|
page read and write
|
||
1E341952000
|
heap
|
page read and write
|
||
236BC0F2000
|
trusted library allocation
|
page read and write
|
||
2197A530000
|
heap
|
page read and write
|
||
3FF250E000
|
stack
|
page read and write
|
||
1B48B083000
|
trusted library allocation
|
page read and write
|
||
1B2FCFC0000
|
trusted library allocation
|
page read and write
|
||
7FF848906000
|
trusted library allocation
|
page execute and read and write
|
||
644FC79000
|
stack
|
page read and write
|
||
1E3418F4000
|
heap
|
page read and write
|
||
241818CE000
|
trusted library allocation
|
page read and write
|
||
1E341951000
|
heap
|
page read and write
|
||
7FF848ACA000
|
trusted library allocation
|
page read and write
|
||
1B2FCE70000
|
trusted library allocation
|
page read and write
|
||
21910070000
|
trusted library allocation
|
page read and write
|
||
1F970BA0000
|
trusted library allocation
|
page read and write
|
||
1F0C211E000
|
trusted library allocation
|
page read and write
|
||
1E3418B9000
|
heap
|
page read and write
|
||
1B2FD390000
|
trusted library allocation
|
page read and write
|
||
FDD95FB000
|
stack
|
page read and write
|
||
7FF848B00000
|
trusted library allocation
|
page read and write
|
||
7FF8489C0000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
1F970B93000
|
trusted library allocation
|
page read and write
|
||
7FF848970000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848A39000
|
trusted library allocation
|
page read and write
|
||
236BA520000
|
trusted library allocation
|
page read and write
|
||
236B9EBA000
|
heap
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
24569A20000
|
heap
|
page read and write
|
||
7FF848C4A000
|
trusted library allocation
|
page read and write
|
||
236D2DE1000
|
heap
|
page read and write
|
||
1B2FCE80000
|
heap
|
page read and write
|
||
1B48946A000
|
heap
|
page read and write
|
||
2197AE6C000
|
heap
|
page read and write
|
||
1F96F210000
|
heap
|
page read and write
|
||
1F0B1F35000
|
heap
|
page read and write
|
||
3FF14FE000
|
stack
|
page read and write
|
||
CD2897E000
|
stack
|
page read and write
|
||
24190010000
|
trusted library allocation
|
page read and write
|
||
21900F8A000
|
trusted library allocation
|
page read and write
|
||
241F2600000
|
trusted library allocation
|
page read and write
|
||
1F0B0245000
|
heap
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
36063FB000
|
stack
|
page read and write
|
||
7DF485120000
|
trusted library allocation
|
page execute and read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
7FF848AE0000
|
trusted library allocation
|
page read and write
|
||
7FF848A08000
|
trusted library allocation
|
page execute and read and write
|
||
1F0B1ED0000
|
heap
|
page execute and read and write
|
||
241F23E0000
|
heap
|
page read and write
|
||
7FF848C70000
|
trusted library allocation
|
page execute and read and write
|
||
FB7E8FF000
|
stack
|
page read and write
|
||
27C49DB1000
|
heap
|
page read and write
|
||
1B290001000
|
trusted library allocation
|
page read and write
|
||
236D2DE5000
|
heap
|
page read and write
|
||
1E34196A000
|
heap
|
page read and write
|
||
27C4A040000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1E34145C000
|
heap
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
7FF848AA4000
|
trusted library allocation
|
page read and write
|
||
241F23FD000
|
heap
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
7FF848B73000
|
trusted library allocation
|
page read and write
|
||
241F22B0000
|
heap
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
241F23C0000
|
heap
|
page execute and read and write
|
||
7FF848906000
|
trusted library allocation
|
page read and write
|
||
1F96F04C000
|
heap
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
2197B350000
|
heap
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
2197B258000
|
heap
|
page read and write
|
||
24180724000
|
trusted library allocation
|
page read and write
|
||
236B9E70000
|
heap
|
page read and write
|
||
7FF848B20000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
2197A595000
|
heap
|
page read and write
|
||
7FF848822000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
644FBFE000
|
stack
|
page read and write
|
||
2197B282000
|
heap
|
page read and write
|
||
27C4C511000
|
trusted library allocation
|
page read and write
|
||
219018C6000
|
trusted library allocation
|
page read and write
|
||
1E34190B000
|
heap
|
page read and write
|
||
7FF848C50000
|
trusted library allocation
|
page read and write
|
||
1F970B6C000
|
heap
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
FDD8FFE000
|
stack
|
page read and write
|
||
236D2D6A000
|
heap
|
page read and write
|
||
7FF848910000
|
trusted library allocation
|
page read and write
|
||
21900086000
|
trusted library allocation
|
page read and write
|
||
1B2FCE73000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
241F1500000
|
heap
|
page read and write
|
||
1B2FCE53000
|
trusted library allocation
|
page read and write
|
||
1B2FCFD0000
|
trusted library allocation
|
page read and write
|
||
2197AB10000
|
heap
|
page read and write
|
||
1B4895F5000
|
heap
|
page read and write
|
||
1E3414FF000
|
heap
|
page read and write
|
||
7FF8488FC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF78D21E000
|
unkown
|
page read and write
|
||
3FF1B3B000
|
stack
|
page read and write
|
||
1E3418F4000
|
heap
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
2197B148000
|
heap
|
page read and write
|
||
236BBC7E000
|
trusted library allocation
|
page read and write
|
||
241F1582000
|
heap
|
page read and write
|
||
7FF8489D0000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
644FAFE000
|
stack
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1B48942C000
|
heap
|
page read and write
|
||
7FF848864000
|
trusted library allocation
|
page read and write
|
||
1B2FCE70000
|
trusted library allocation
|
page read and write
|
||
2456B5A6000
|
heap
|
page read and write
|
||
236B9EB0000
|
heap
|
page read and write
|
||
7FF848A9B000
|
trusted library allocation
|
page read and write
|
||
241F1580000
|
heap
|
page read and write
|
||
1F970BA0000
|
trusted library allocation
|
page read and write
|
||
7FF848AA6000
|
trusted library allocation
|
page read and write
|
||
22C06A90000
|
heap
|
page read and write
|
||
7FF848B50000
|
trusted library allocation
|
page read and write
|
||
236CA881000
|
trusted library allocation
|
page read and write
|
||
1B2FCFC0000
|
trusted library allocation
|
page read and write
|
||
1F970BA0000
|
trusted library allocation
|
page read and write
|
||
1F0B1DB0000
|
trusted library allocation
|
page read and write
|
||
3FF147E000
|
stack
|
page read and write
|
||
3604CFF000
|
stack
|
page read and write
|
||
1B49B0E1000
|
trusted library allocation
|
page read and write
|
||
1E341904000
|
heap
|
page read and write
|
||
27C4A8C0000
|
heap
|
page execute and read and write
|
||
2456B620000
|
trusted library allocation
|
page read and write
|
||
7FF848C80000
|
trusted library allocation
|
page read and write
|
||
1B2FD370000
|
trusted library allocation
|
page read and write
|
||
7FF848AB0000
|
trusted library allocation
|
page read and write
|
||
1E34151E000
|
heap
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
2456B620000
|
trusted library allocation
|
page read and write
|
||
27C62C2A000
|
heap
|
page read and write
|
||
7FF848AC4000
|
trusted library allocation
|
page read and write
|
||
21900ECC000
|
trusted library allocation
|
page read and write
|
||
1E340E80000
|
remote allocation
|
page read and write
|
||
1E3414E2000
|
heap
|
page read and write
|
||
7FF84884B000
|
trusted library allocation
|
page read and write
|
||
2456B620000
|
trusted library allocation
|
page read and write
|
||
847AE7D000
|
stack
|
page read and write
|
||
1E341904000
|
heap
|
page read and write
|
||
7FF848A60000
|
trusted library allocation
|
page read and write
|
||
2456B6F0000
|
trusted library allocation
|
page read and write
|
||
1F0B2100000
|
heap
|
page execute and read and write
|
||
27C4A390000
|
trusted library allocation
|
page read and write
|
||
27C62916000
|
heap
|
page read and write
|
||
7FF848843000
|
trusted library allocation
|
page execute and read and write
|
||
1B48AF50000
|
trusted library allocation
|
page read and write
|
||
7FF8489FA000
|
trusted library allocation
|
page read and write
|
||
27C4A440000
|
heap
|
page read and write
|
||
21900805000
|
trusted library allocation
|
page read and write
|
||
241F2499000
|
heap
|
page read and write
|
||
1B2FB3AA000
|
heap
|
page read and write
|
||
1E34151D000
|
heap
|
page read and write
|
||
7FF848AC0000
|
trusted library allocation
|
page read and write
|
||
1F970BB0000
|
trusted library allocation
|
page read and write
|
||
7FF848AD0000
|
trusted library allocation
|
page read and write
|
||
7FF848C50000
|
trusted library allocation
|
page read and write
|
||
1B2FCD70000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1B48B0A0000
|
trusted library allocation
|
page read and write
|
||
236D2DCE000
|
heap
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
236D2CF1000
|
heap
|
page read and write
|
||
236D2AC0000
|
heap
|
page execute and read and write
|
||
1B49B0EF000
|
trusted library allocation
|
page read and write
|
||
1F0B02D9000
|
heap
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
1B2FCE70000
|
trusted library allocation
|
page read and write
|
||
2456B620000
|
trusted library allocation
|
page read and write
|
||
1E3414F0000
|
heap
|
page read and write
|
||
241F242E000
|
heap
|
page read and write
|
||
7FF848A01000
|
trusted library allocation
|
page read and write
|
||
7FF8489D0000
|
trusted library allocation
|
page read and write
|
||
1F970BB0000
|
trusted library allocation
|
page read and write
|
||
2456B601000
|
trusted library allocation
|
page read and write
|
||
7FF848AB0000
|
trusted library allocation
|
page read and write
|
||
3FF258C000
|
stack
|
page read and write
|
||
7E8947E000
|
stack
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1E340E60000
|
heap
|
page read and write
|
||
27C62AB0000
|
heap
|
page read and write
|
||
7FF8489C4000
|
trusted library allocation
|
page read and write
|
||
241F2167000
|
heap
|
page read and write
|
||
2419007D000
|
trusted library allocation
|
page read and write
|
||
7FF848A14000
|
trusted library allocation
|
page execute and read and write
|
||
27C4BA4B000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
7FF848A80000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1F970BA0000
|
trusted library allocation
|
page read and write
|
||
7FF8488E0000
|
trusted library allocation
|
page read and write
|
||
7FF848C5C000
|
trusted library allocation
|
page read and write
|
||
7FF848B56000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
236D2DEB000
|
heap
|
page read and write
|
||
1F96EFF9000
|
heap
|
page read and write
|
||
FDD957E000
|
stack
|
page read and write
|
||
1F0B1E90000
|
trusted library allocation
|
page read and write
|
||
236CA8FE000
|
trusted library allocation
|
page read and write
|
||
241F1730000
|
heap
|
page read and write
|
||
1F96F00D000
|
heap
|
page read and write
|
||
1E34194C000
|
heap
|
page read and write
|
||
24181B4F000
|
trusted library allocation
|
page read and write
|
||
1E341465000
|
heap
|
page read and write
|
||
7FF848A70000
|
trusted library allocation
|
page read and write
|
||
1E3414E4000
|
heap
|
page read and write
|
||
3FF1938000
|
stack
|
page read and write
|
||
236D2CFD000
|
heap
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
7FF848853000
|
trusted library allocation
|
page execute and read and write
|
||
236BA440000
|
heap
|
page read and write
|
||
27C62982000
|
heap
|
page read and write
|
||
1F0B1EB0000
|
trusted library allocation
|
page read and write
|
||
7DF4A7950000
|
trusted library allocation
|
page execute and read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
7DF4768F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8489E0000
|
trusted library allocation
|
page read and write
|
||
7FF848833000
|
trusted library allocation
|
page execute and read and write
|
||
644F6B3000
|
stack
|
page read and write
|
||
1F0B0289000
|
heap
|
page read and write
|
||
36052FF000
|
stack
|
page read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
FDD8F7E000
|
stack
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
27C49C40000
|
heap
|
page read and write
|
||
3FF16FD000
|
stack
|
page read and write
|
||
1E3414B8000
|
heap
|
page read and write
|
||
644FDF6000
|
stack
|
page read and write
|
||
24569B6B000
|
heap
|
page read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
1E3418BF000
|
heap
|
page read and write
|
||
2197B2EC000
|
heap
|
page read and write
|
||
236CAB6B000
|
trusted library allocation
|
page read and write
|
||
236BAAA9000
|
trusted library allocation
|
page read and write
|
||
241813F1000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
1B2FCFE0000
|
heap
|
page read and write
|
||
236B9EFC000
|
heap
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
3604EFE000
|
stack
|
page read and write
|
||
1E340F64000
|
heap
|
page read and write
|
||
1E3418F4000
|
heap
|
page read and write
|
||
1B48AEE2000
|
heap
|
page read and write
|
||
1E341463000
|
heap
|
page read and write
|
||
7FF848AB0000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
1F96F01F000
|
heap
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
7FF848A09000
|
trusted library allocation
|
page read and write
|
||
7FF848A14000
|
trusted library allocation
|
page read and write
|
||
3606CFF000
|
stack
|
page read and write
|
||
1F970B93000
|
trusted library allocation
|
page read and write
|
||
21901C0C000
|
trusted library allocation
|
page read and write
|
||
1E341514000
|
heap
|
page read and write
|
||
7E891FE000
|
stack
|
page read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
E931B5E000
|
stack
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
1F96F098000
|
heap
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
2197B250000
|
heap
|
page read and write
|
||
1E341438000
|
heap
|
page read and write
|
||
1F970B70000
|
trusted library allocation
|
page read and write
|
||
24180810000
|
trusted library allocation
|
page read and write
|
||
27C4AD67000
|
trusted library allocation
|
page read and write
|
||
236D2D26000
|
heap
|
page read and write
|
||
24569B62000
|
heap
|
page read and write
|
||
7FF848B63000
|
trusted library allocation
|
page read and write
|
||
7FF848A10000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848A60000
|
trusted library allocation
|
page read and write
|
||
1E341565000
|
heap
|
page read and write
|
||
7FF848834000
|
trusted library allocation
|
page read and write
|
||
1E341479000
|
heap
|
page read and write
|
||
2456B610000
|
trusted library allocation
|
page read and write
|
||
7FF848C60000
|
trusted library allocation
|
page execute and read and write
|
||
1E341521000
|
heap
|
page read and write
|
||
1E340FA6000
|
heap
|
page read and write
|
||
1E341914000
|
heap
|
page read and write
|
||
7FF8489D6000
|
trusted library allocation
|
page execute and read and write
|
||
2456B610000
|
trusted library allocation
|
page read and write
|
||
7FF848BAC000
|
trusted library allocation
|
page read and write
|
||
1F970BA0000
|
trusted library allocation
|
page read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
36047FE000
|
stack
|
page read and write
|
||
27C5ABF8000
|
trusted library allocation
|
page read and write
|
||
1E34196B000
|
heap
|
page read and write
|
||
236CA890000
|
trusted library allocation
|
page read and write
|
||
21900933000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
2456B620000
|
trusted library allocation
|
page read and write
|
||
1F970B80000
|
heap
|
page execute and read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1E34198B000
|
heap
|
page read and write
|
||
1B2FB391000
|
heap
|
page read and write
|
||
2197AA00000
|
heap
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
7FF848A10000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848AAA000
|
trusted library allocation
|
page read and write
|
||
7FF848B80000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
2197A590000
|
heap
|
page read and write
|
||
2456B620000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1F970A10000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
1E341442000
|
heap
|
page read and write
|
||
1F0B1EA0000
|
trusted library allocation
|
page read and write
|
||
1B2FCE70000
|
trusted library allocation
|
page read and write
|
||
7FF848845000
|
trusted library allocation
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
27C4BCE5000
|
trusted library allocation
|
page read and write
|
||
1E34151A000
|
heap
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
7DF499400000
|
trusted library allocation
|
page execute and read and write
|
||
27C5ABEE000
|
trusted library allocation
|
page read and write
|
||
1B48B0D0000
|
heap
|
page execute and read and write
|
||
1E3418E3000
|
heap
|
page read and write
|
||
847AD7E000
|
stack
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
7FF848C40000
|
trusted library allocation
|
page read and write
|
||
236B9ED0000
|
heap
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1E340E30000
|
heap
|
page read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
36055F4000
|
stack
|
page read and write
|
||
1F0B0294000
|
heap
|
page read and write
|
||
7FF848950000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848833000
|
trusted library allocation
|
page execute and read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1F0B1DE0000
|
trusted library allocation
|
page read and write
|
||
7FF848C90000
|
trusted library allocation
|
page read and write
|
||
27C62BD0000
|
heap
|
page read and write
|
||
7FF848AB0000
|
trusted library allocation
|
page read and write
|
||
1B2FCE70000
|
trusted library allocation
|
page read and write
|
||
1E341968000
|
heap
|
page read and write
|
||
7FF848AD0000
|
trusted library allocation
|
page read and write
|
||
7FF848B9C000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
1F0B029A000
|
heap
|
page read and write
|
||
7FF8489E4000
|
trusted library allocation
|
page execute and read and write
|
||
36050FC000
|
stack
|
page read and write
|
||
1F910001000
|
trusted library allocation
|
page read and write
|
||
36061FE000
|
stack
|
page read and write
|
||
27C6295F000
|
heap
|
page read and write
|
||
1F0B1F00000
|
heap
|
page read and write
|
||
1E3418F4000
|
heap
|
page read and write
|
||
1F0B029D000
|
heap
|
page read and write
|
||
1E3418B4000
|
heap
|
page read and write
|
||
7DF4A7940000
|
trusted library allocation
|
page execute and read and write
|
||
7FF84885D000
|
trusted library allocation
|
page execute and read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
7FF848910000
|
trusted library allocation
|
page execute and read and write
|
||
236D2D5C000
|
heap
|
page read and write
|
||
1F0B1DD0000
|
trusted library allocation
|
page read and write
|
||
1E340E80000
|
remote allocation
|
page read and write
|
||
1E34190F000
|
heap
|
page read and write
|
||
1E34152D000
|
heap
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
7DF49C5B0000
|
trusted library allocation
|
page execute and read and write
|
||
1E341514000
|
heap
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
7FF848A40000
|
trusted library allocation
|
page execute and read and write
|
||
1F970BA0000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
7FF84885D000
|
trusted library allocation
|
page execute and read and write
|
||
FDDA0CE000
|
stack
|
page read and write
|
||
22C06E55000
|
heap
|
page read and write
|
||
241F2405000
|
heap
|
page read and write
|
||
241F1B10000
|
trusted library allocation
|
page read and write
|
||
1B2FCE70000
|
trusted library allocation
|
page read and write
|
||
2197B046000
|
heap
|
page execute and read and write
|
||
7DF456360000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848CA6000
|
trusted library allocation
|
page read and write
|
||
27C62C08000
|
heap
|
page read and write
|
||
7FF8489E6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8489E6000
|
trusted library allocation
|
page execute and read and write
|
||
24190001000
|
trusted library allocation
|
page read and write
|
||
27C49C30000
|
heap
|
page read and write
|
||
7FF848BA4000
|
trusted library allocation
|
page read and write
|
||
236D2B16000
|
heap
|
page read and write
|
||
7FF848C40000
|
trusted library allocation
|
page read and write
|
||
236D2DB1000
|
heap
|
page read and write
|
||
241F15C8000
|
heap
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
1E341452000
|
heap
|
page read and write
|
||
1B48B090000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
236BB5AC000
|
trusted library allocation
|
page read and write
|
||
236D2BF0000
|
heap
|
page read and write
|
||
236D2D36000
|
heap
|
page read and write
|
||
1B4892E0000
|
heap
|
page read and write
|
||
27C4A340000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
22C06AB0000
|
heap
|
page read and write
|
||
2197B2FD000
|
heap
|
page read and write
|
||
236BA4F0000
|
heap
|
page execute and read and write
|
||
241F1B80000
|
trusted library allocation
|
page read and write
|
||
1F0B0220000
|
heap
|
page read and write
|
||
2418047D000
|
trusted library allocation
|
page read and write
|
||
1E3414B6000
|
heap
|
page read and write
|
||
1E3418F4000
|
heap
|
page read and write
|
||
7FF848A90000
|
trusted library allocation
|
page read and write
|
||
1B48B090000
|
trusted library allocation
|
page read and write
|
||
7FF848A90000
|
trusted library allocation
|
page read and write
|
||
B0D167C000
|
stack
|
page read and write
|
||
64501FE000
|
stack
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
7FF848900000
|
trusted library allocation
|
page read and write
|
||
2197B0AB000
|
heap
|
page read and write
|
||
7FF848AA0000
|
trusted library allocation
|
page read and write
|
||
1B2FB570000
|
heap
|
page read and write
|
||
27C62A36000
|
heap
|
page execute and read and write
|
||
1F970BB0000
|
trusted library allocation
|
page read and write
|
||
245699F0000
|
heap
|
page read and write
|
||
24500001000
|
trusted library allocation
|
page read and write
|
||
7FF848CA3000
|
trusted library allocation
|
page read and write
|
||
2456B620000
|
trusted library allocation
|
page read and write
|
||
847AEFC000
|
stack
|
page read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
7FF848916000
|
trusted library allocation
|
page execute and read and write
|
||
27C62A30000
|
heap
|
page execute and read and write
|
||
7FF848863000
|
trusted library allocation
|
page execute and read and write
|
||
24569AF1000
|
heap
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1F0B1F30000
|
heap
|
page read and write
|
||
7FF848860000
|
trusted library allocation
|
page read and write
|
||
1E341465000
|
heap
|
page read and write
|
||
36048FF000
|
stack
|
page read and write
|
||
1E34196E000
|
heap
|
page read and write
|
||
7FF848AB0000
|
trusted library allocation
|
page read and write
|
||
7FF84883D000
|
trusted library allocation
|
page execute and read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1F970BA0000
|
trusted library allocation
|
page read and write
|
||
7FF848B70000
|
trusted library allocation
|
page read and write
|
||
2197B150000
|
heap
|
page read and write
|
||
7FF848920000
|
trusted library allocation
|
page execute and read and write
|
||
1B2FB3D4000
|
heap
|
page read and write
|
||
7FF848B99000
|
trusted library allocation
|
page read and write
|
||
1F970BA0000
|
trusted library allocation
|
page read and write
|
||
1E341904000
|
heap
|
page read and write
|
||
FDD8EFE000
|
stack
|
page read and write
|
||
2456B620000
|
trusted library allocation
|
page read and write
|
||
1F0B1E90000
|
trusted library allocation
|
page read and write
|
||
1B280001000
|
trusted library allocation
|
page read and write
|
||
E931F7C000
|
stack
|
page read and write
|
||
1F970D31000
|
heap
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
7FF8489F0000
|
trusted library allocation
|
page read and write
|
||
22C06E50000
|
heap
|
page read and write
|
||
2456B610000
|
trusted library allocation
|
page read and write
|
||
7FF848910000
|
trusted library allocation
|
page execute and read and write
|
||
2197B0C1000
|
heap
|
page read and write
|
||
1B48AF7E000
|
heap
|
page read and write
|
||
1E34146C000
|
heap
|
page read and write
|
||
236B9DC5000
|
heap
|
page read and write
|
||
1B2FCE70000
|
trusted library allocation
|
page read and write
|
||
236D2DB9000
|
heap
|
page read and write
|
||
236D2CD0000
|
heap
|
page read and write
|
||
24181370000
|
trusted library allocation
|
page read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
2197A300000
|
heap
|
page read and write
|
||
1B2FCFD0000
|
trusted library allocation
|
page read and write
|
||
1E3418F4000
|
heap
|
page read and write
|
||
7FF848833000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848BA0000
|
trusted library allocation
|
page read and write
|
||
2197A350000
|
heap
|
page read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
2456B6F0000
|
trusted library allocation
|
page read and write
|
||
1E340ED6000
|
heap
|
page read and write
|
||
847ADFE000
|
stack
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
FDDA14C000
|
stack
|
page read and write
|
||
27C4BDE2000
|
trusted library allocation
|
page read and write
|
||
1E340FC4000
|
heap
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1E3418FD000
|
heap
|
page read and write
|
||
2197B0E2000
|
heap
|
page read and write
|
||
27C62BFB000
|
heap
|
page read and write
|
||
241F1B30000
|
trusted library allocation
|
page read and write
|
||
1B48B083000
|
trusted library allocation
|
page read and write
|
||
241813E9000
|
trusted library allocation
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
1E3414E2000
|
heap
|
page read and write
|
||
1B48B080000
|
trusted library allocation
|
page read and write
|
||
2197A3DC000
|
heap
|
page read and write
|
||
36057EE000
|
stack
|
page read and write
|
||
7FF848840000
|
trusted library allocation
|
page read and write
|
||
236BBC70000
|
trusted library allocation
|
page read and write
|
||
236D2BD0000
|
heap
|
page read and write
|
||
7A90EFE000
|
stack
|
page read and write
|
||
7DF43D850000
|
trusted library allocation
|
page execute and read and write
|
||
1B2FB393000
|
heap
|
page read and write
|
||
1B48AEC0000
|
trusted library allocation
|
page read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
7FF848946000
|
trusted library allocation
|
page execute and read and write
|
||
36064FE000
|
stack
|
page read and write
|
||
1B2FCE50000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1F0B2006000
|
heap
|
page read and write
|
||
1B2FB419000
|
heap
|
page read and write
|
||
7FF848A20000
|
trusted library allocation
|
page read and write
|
||
27C62CA0000
|
heap
|
page read and write
|
||
7FF848BBC000
|
trusted library allocation
|
page read and write
|
||
236BACB9000
|
trusted library allocation
|
page read and write
|
||
219102F7000
|
trusted library allocation
|
page read and write
|
||
236BB1B7000
|
trusted library allocation
|
page read and write
|
||
241902F7000
|
trusted library allocation
|
page read and write
|
||
2197B0B9000
|
heap
|
page read and write
|
||
7FF848B83000
|
trusted library allocation
|
page read and write
|
||
7FF848A24000
|
trusted library allocation
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
CD285C3000
|
stack
|
page read and write
|
||
2456B600000
|
trusted library allocation
|
page read and write
|
||
7FF848A90000
|
trusted library allocation
|
page read and write
|
||
236B9E00000
|
heap
|
page read and write
|
||
1B2FCE60000
|
trusted library allocation
|
page read and write
|
||
7FF78C9F1000
|
unkown
|
page execute read
|
||
241F2120000
|
heap
|
page read and write
|
||
2197B346000
|
heap
|
page read and write
|
||
7FF78CF92000
|
unkown
|
page readonly
|
||
1B489595000
|
heap
|
page read and write
|
||
1F0B1E80000
|
trusted library allocation
|
page read and write
|
||
2456B610000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
1F970B90000
|
trusted library allocation
|
page read and write
|
||
2197B170000
|
heap
|
page read and write
|
||
7FF84886D000
|
trusted library allocation
|
page execute and read and write
|
There are 1735 hidden memdumps, click here to show them.