Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
registration.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
initial sample
|
||
C:\Config.Msi\41c383.rbs
|
data
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\BouncyCastle.Crypto.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\System.ValueTuple.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIC4F9.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSIC4F9.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSICAE6.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSICAE6.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIE1CA.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSIE1CA.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIE49A.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSIFFD7.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
modified
|
||
C:\Windows\Installer\MSIFFD7.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\System32\InstallUtil.InstallLog
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\~DF21C9A09377CDFE9B.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF2D3E5DF2735593AB.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF3BCE62784648DF98.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF4630E950FA28A864.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF510E6906F6ABC59A.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFF883924653294067.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallState
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation.zip
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.ini
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AteraAgent.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\Installer\41c382.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\41c384.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\MSIC4F9.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSIC4F9.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIC4F9.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIC4F9.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSICAE6.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSICAE6.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSICAE6.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSICAE6.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIE1CA.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSIE1CA.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIE1CA.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIE1CA.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIE49B.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIE596.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIE6C0.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIFFD7.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSIFFD7.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIFFD7.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIFFD7.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SourceHash{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1A374813EDB1A6631387E414D3E73232
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\329B6147266C1E26CD774EA22B79EC2E
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BA74182F76F15A9CF514DEF352303C95
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
Certificate, Version=3
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
|
Certificate, Version=3
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1A374813EDB1A6631387E414D3E73232
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\329B6147266C1E26CD774EA22B79EC2E
|
data
|
modified
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BA74182F76F15A9CF514DEF352303C95
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageAgentInformation.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\Temp\~DF7E61EBA641E00834.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF8486836D499D5DEC.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFAB9013E4DC96505C.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFC333FC5749C6A673.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFD8178A5030869E62.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFFD5FBDE6FB652FC4.TMP
|
data
|
dropped
|
||
\Device\ConDrv
|
JSON data
|
dropped
|
There are 75 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSIC4F9.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4310406 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSICAE6.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4311812 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSIE1CA.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4317703 11 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="1vf5mpi5iyis@upsnab.net" /CompanyId="1"
/IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000Kh41eIAB" /AgentId="95fbc98a-3c27-44ae-84cf-9e3acc292491"
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSIFFD7.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4325359 33 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
95fbc98a-3c27-44ae-84cf-9e3acc292491 "e8d80795-1e07-47b3-9c87-186f671b6a15" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000Kh41eIAB
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
95fbc98a-3c27-44ae-84cf-9e3acc292491 "84e6126d-3464-4d76-9c19-0160eafb16a0" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000Kh41eIAB
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
95fbc98a-3c27-44ae-84cf-9e3acc292491 "e3e24934-4319-48e9-bf87-d4583f7e9574" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000Kh41eIAB
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
95fbc98a-3c27-44ae-84cf-9e3acc292491 "bafe3b2c-3bd0-4df3-abe5-6f6b048de27b" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000Kh41eIAB
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
95fbc98a-3c27-44ae-84cf-9e3acc292491 "5da68ded-3041-4a37-bb29-975445cce246" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000Kh41eIAB
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\registration.msi"
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding 3D043D01D69573A731BD32BF0EBA042E
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding ED6036EDFA306B6AD29B763B80D7974F E Global\MSI0000
|
||
C:\Windows\SysWOW64\net.exe
|
"NET" STOP AteraAgent
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\net1.exe
|
C:\Windows\system32\net1 STOP AteraAgent
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"TaskKill.exe" /f /im AteraAgent.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
"C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 17 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95fbc98a-3c27-44ae-84cf-9e3acc292491/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=5acd82f0-57ae-41e0-85e3-b5cb80ee27df&tr=31&tt=17324433379477685&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
https://agent-api.atera.com/Production/Agent/GetCommands8
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=e39b01e5-dc44-47cf-a0d2-d7bead94718e
|
unknown
|
||
http://schemas.datacontract.org
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageAgentInformation/38.0/AgentPackageAgentInformation.zip?w8Q4MxnxsTU+y3lbIKhb1p3E6E9NGNGr43vM7ggjDRD5G9cDVa0pn3fF3kInqamc
|
108.158.75.12
|
||
https://agent-api.atera.com/Production/Agent/GetCommands)
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/track-event
|
unknown
|
||
http://dl.google.com/googletalk/googletalk-setup.exe
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=8dec4445-c0f5-4b3e-90c5-b0e958ca91da&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.199
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95fbc98a-3c27-44ae-84cf-9e3acc292491/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=b554e624-5e74-4caa-b7de-790b1533e993&tr=31&tt=17324434350865773&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=b46022d7-cbaa-40b8-8c72-fd984bb21007&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
https://agent-api.atera.com/Production/Agent/
|
unknown
|
||
http://schemas.datacontract.org/2004/07/System.ServiceProcess
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=05ecc6e5-ecbe-426c-b21f-2f414d78087e
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95fbc98a-3c27-44ae-84cf-9e3acc292491/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=e695b199-cbc9-44ed-b89a-77707fde66b0&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
http://wixtoolset.org
|
unknown
|
||
https://agent-api.atera.com/Production
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95fbc98a-3c27-44ae-84cf-9e3acc292491/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=e3aa32f8-3a58-4ef4-b289-b05205d0c00e&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
https://agent-api.atera.com/Production/Agent/GetCommandsFallback0
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageRuntimeInstaller/13.0/AgentPackageRuntimeInstaller
|
unknown
|
||
http://acontrol.atera.com/
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95fbc98a
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/AgentStarting)
|
unknown
|
||
https://ps.pndsn.com
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetRecurringPackagesce
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageNetworkDiscovery/23.9/AgentPackageNetworkDiscove
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95fbc98a-3c27-44ae-84cf-9e3acc292491/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=57719228-a14b-4385-bc90-4fb880778c52&tt=0&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.199
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=12ab6b1a-a82d-4206-b67b-cf0ecb23de70&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
http://agent-api.atera.com
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=dd31cbca-11f7-438d-95d1-0103076c3b19&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
http://schemas.datacontract.org/2004/07/
|
unknown
|
||
http://microsoft.co
|
unknown
|
||
https://github.com/icsharpcode/SharpZipLib
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageNetworkDiscovery/15.0/AgentPackageNetworkDiscovery
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=e10b719b-981a-446e-ba23-7c69d7f94ded&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageAgentI
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
|
unknown
|
||
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=9ead68d6-bdd5-4770-a068-8d3fb261cd22&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.199
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95fbc98a-3c27-44ae-84cf
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=6369cfb0-4b84-4f4d-9006-15859c206f1e
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageTaskScheduler/17.2/AgentPackageTaskScheduler.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=3af72751-dbe9-4596-b6ee-6d67e84a5830
|
unknown
|
||
https://agent-api.atera.com
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/AgentStarting
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=c7890d66-5dda-44b9-9266-433341b69fe6
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95fbc98a-3c27-44ae-84cf-9e3acc292491/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=b748dd63-e45c-4e56-a14e-2acb4546abf0&tr=31&tt=17324434315367656&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
http://www.w3.oh
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetCommands
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95fbc98a-3c27-44ae-84cf-9e3acc292491/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=2437e5c2-c49a-46e7-85a0-5bd5b0f3e346&tt=0&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=61d95b76-5b67-4486-9f2d-f8d365c1f79d
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=9ead68d6-bdd5-4770-a068-8d3fb261cd22
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=50e4cbc2-cc27-4e42-b044-8c7a8b8e200d
|
unknown
|
||
https://agent-api.atera.com/
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetRecurringPackages
|
unknown
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.Availability/13.0/Agent.Package.Availability.zip
|
unknown
|
||
https://www.newtonsoft.com/jsonschema
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95fbc98a-3c27-44ae-84cf-9e3acc292491/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=44d081ca-4526-4116-82b9-755899f28369&tt=0&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageRuntimeInstaller/1.5/AgentPackageRuntimeInstaller.
|
unknown
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.Watchdog/13.0/Agent.Package.Watchdog.zip
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95fbc98a-3c27-44ae-84cf-9e3acc292491/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=8a545e8a-5ca3-4586-95ee-223486bad101&tr=31&tt=17324433411580562&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=b02e1ef0-ec67-47b3-a61c-d81850d0d964
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.Availability/0.16/Agent.Package.Availability.z
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95fbc98a-3c27-44ae-84cf-9e3acc292491/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=15951373-2c36-4fa8-affe-36f2ec07b81f&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
https://ps.pndsn.com/v2T
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetRecurringPackagesnection
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=9264d1e3-b040-4685-8c12-22cc4dee131b
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95fbc98a-3c27-44ae-84cf-9e3acc292491/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=939e5a96-d596-4e59-936e-7ae5d28307cc&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
https://www.newtonsoft.com/json
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=af5bf701-7249-45e5-86be-19d8d9c83003&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
https://agent-api.atera.com/Production/Agent/Age
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95fbc98a-3c27-44ae-84cf-9e3acc292491/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=d06e9be8-9779-43f1-a370-eed925135e8d&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95fbc98a-3c27-44ae-84cf-9e3acc292491/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=15a8e400-4d66-4396-85a9-a52c47560c82&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
https://ps.atera.com/agentpackageswin/AgentPackageHeartbeat/16.9
|
unknown
|
||
http://wixtoolset.org/news/
|
unknown
|
||
https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageAgentInformation/22.7/AgentPackageAgentInformation
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=aa11bfe9-8289-42c2-be65-d6291fd164cf&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95fbc98a-3c27-44ae-84cf-9e3acc292491/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=92f4880d-dc2f-4ace-a46f-d9a0bf4fb400&tr=33&tt=17324434578282801&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.199
|
||
https://agent-api.aterD
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageNetworkDiscovery/13.0/AgentPackageNetworkDiscovery
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95fbc98a-3c27-44ae-84cf-9e3acc292491/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=3dabc9ca-50ca-4769-82eb-40791913b06c&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=3f56d55c-6ba5-4af1-9be1-2dea66d5d0f7&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.IotPoc/13.0/Agent.Package.IotPoc.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=1ddb02cf-39da-4196-a130-53d484e9194d&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95fbc98a-3c27-44ae-84cf-9e3acc292491/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=6d5cfce1-b215-4be8-a3eb-65f371d376ce&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageTaskScheduler/13.0/AgentPackageTaskScheduler.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageAgentInformation/38.0/AgentPackageAgentInformation
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=cc4be31c-7bd0-4546-8157-021785aaabf9&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=a550ee73-b0e6-4203-86b7-33ebef664c1d&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
https://agent-api.P
|
unknown
|
||
http://www.w3.o
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=7ad0a761-601d-4dfb-892a-87e5a80d8cfd&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95fbc98a-3c27-44ae-84cf-9e3acc292491/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=1c583dbc-af1e-4d45-80f1-003dabe8eea7&tt=0&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
|
13.232.67.198
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageAgentInformation/38.0/AgentPackageAgentInformati
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetCommandsFallback
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ps.pndsn.com
|
13.232.67.198
|
||
bg.microsoft.map.fastly.net
|
199.232.214.172
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
d25btwd9wax8gu.cloudfront.net
|
108.158.75.12
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
||
windowsupdatebg.s.llnwi.net
|
178.79.238.128
|
||
ps.atera.com
|
unknown
|
||
agent-api.atera.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
13.232.67.198
|
ps.pndsn.com
|
United States
|
||
13.232.67.199
|
unknown
|
United States
|
||
108.158.75.12
|
d25btwd9wax8gu.cloudfront.net
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\41c383.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\41c383.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB9EFD7FDAF9AD115987000E181661F5
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CD868C8CE5A308147ABB306D829266BC
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C32B8CE0327C1E141950B4C9C2AD4DA7
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D9B1B1F0B1FC024D9390FE4B94D97D5
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\007F59F54ACD08842B2D98A10E6D1E3A
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB25C26F7C51D3C4AA2BED5600F46956
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01010F83113E72A4C81AD77422D2F947
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01D9DC4B27DFC0340B543A11D3CEBE07
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\ATERA Networks\AteraAgent\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\ATERA Networks\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\7D0A237E2F2A7564CA141B792446E854
|
INSTALLFOLDER_files_Feature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Features
|
INSTALLFOLDER_files_Feature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
|
LastUsedSource
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
|
AutoBackupLogFiles
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AteraAgent
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
AccountId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
IntegratorLogin
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
CompanyId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
AgentId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
ServerName
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AlphaAgent
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
FileDirectory
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
FileDirectory
|
There are 137 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1D0B92EA000
|
heap
|
page read and write
|
||
D20C6F5000
|
stack
|
page read and write
|
||
140BF2C9000
|
heap
|
page read and write
|
||
1FE48A20000
|
heap
|
page read and write
|
||
140BF2DB000
|
heap
|
page read and write
|
||
140BF5B0000
|
heap
|
page read and write
|
||
140BF30D000
|
heap
|
page read and write
|
||
1FE49192000
|
unkown
|
page readonly
|
||
2A87ED50000
|
heap
|
page read and write
|
||
1BB81170000
|
heap
|
page read and write
|
||
1FE61AB0000
|
heap
|
page read and write
|
||
2A865C98000
|
heap
|
page read and write
|
||
140BFBE3000
|
trusted library allocation
|
page read and write
|
||
1D0BADE9000
|
trusted library allocation
|
page read and write
|
||
1D0B928B000
|
heap
|
page read and write
|
||
1BB81821000
|
trusted library allocation
|
page read and write
|
||
1AD7AC9D000
|
heap
|
page read and write
|
||
1D0B8FF2000
|
unkown
|
page readonly
|
||
2A866713000
|
trusted library allocation
|
page read and write
|
||
140BFBF3000
|
trusted library allocation
|
page read and write
|
||
1D0D375F000
|
heap
|
page read and write
|
||
25E6D89F000
|
heap
|
page read and write
|
||
25E00566000
|
trusted library allocation
|
page read and write
|
||
1D0BAE12000
|
trusted library allocation
|
page read and write
|
||
1FE48CD0000
|
heap
|
page read and write
|
||
25E007B7000
|
trusted library allocation
|
page read and write
|
||
25E6ED9A000
|
heap
|
page read and write
|
||
2A866703000
|
trusted library allocation
|
page read and write
|
||
1BB818A3000
|
trusted library allocation
|
page read and write
|
||
1AD00047000
|
trusted library allocation
|
page read and write
|
||
1BB81893000
|
trusted library allocation
|
page read and write
|
||
4400000
|
heap
|
page read and write
|
||
2A865C90000
|
heap
|
page read and write
|
||
1D0B92C1000
|
heap
|
page read and write
|
||
25E6DA90000
|
heap
|
page read and write
|
||
2A866020000
|
heap
|
page read and write
|
||
1FE492A3000
|
trusted library allocation
|
page read and write
|
||
1FE48962000
|
unkown
|
page readonly
|
||
25E6EE6A000
|
heap
|
page read and write
|
||
1AD000BF000
|
trusted library allocation
|
page read and write
|
||
2A87EE13000
|
heap
|
page read and write
|
||
1BB811F5000
|
heap
|
page read and write
|
||
1FE492B3000
|
trusted library allocation
|
page read and write
|
||
1D0BAE14000
|
trusted library allocation
|
page read and write
|
||
1AD7AC69000
|
heap
|
page read and write
|
||
25E6D8EA000
|
heap
|
page read and write
|
||
1D0BAEDC000
|
trusted library allocation
|
page read and write
|
||
140BF2FD000
|
heap
|
page read and write
|
||
25E0006B000
|
trusted library allocation
|
page read and write
|
||
140BF2C0000
|
heap
|
page read and write
|
||
2A865CCC000
|
heap
|
page read and write
|
||
1D0BADEC000
|
trusted library allocation
|
page read and write
|
||
46FC000
|
heap
|
page read and write
|
||
1FE49231000
|
trusted library allocation
|
page read and write
|
||
1BB811B5000
|
heap
|
page read and write
|
||
25E6D860000
|
heap
|
page read and write
|
||
1AD7AF60000
|
heap
|
page read and write
|
||
1D0B9220000
|
heap
|
page read and write
|
||
1D0BAE92000
|
trusted library allocation
|
page read and write
|
||
1FE48A60000
|
heap
|
page read and write
|
||
1FE48AAC000
|
heap
|
page read and write
|
||
25E00242000
|
trusted library allocation
|
page read and write
|
||
1AD7AC9F000
|
heap
|
page read and write
|
||
2A8666D7000
|
trusted library allocation
|
page read and write
|
||
2A865D13000
|
heap
|
page read and write
|
||
47E4000
|
trusted library allocation
|
page read and write
|
||
4A31000
|
trusted library allocation
|
page read and write
|
||
2A86674F000
|
trusted library allocation
|
page read and write
|
||
1AD00001000
|
trusted library allocation
|
page read and write
|
||
7FFD34254000
|
trusted library allocation
|
page read and write
|
||
1D0B92A1000
|
heap
|
page read and write
|
||
1FE48A66000
|
heap
|
page read and write
|
||
25E6D960000
|
heap
|
page read and write
|
||
1D0BAE1A000
|
trusted library allocation
|
page read and write
|
||
1D0D3456000
|
heap
|
page read and write
|
||
140BFBB7000
|
trusted library allocation
|
page read and write
|
||
4B8F000
|
heap
|
page read and write
|
||
1BB818DF000
|
trusted library allocation
|
page read and write
|
||
1D0BAD61000
|
trusted library allocation
|
page read and write
|
||
25E00001000
|
trusted library allocation
|
page read and write
|
||
1D0B9260000
|
heap
|
page read and write
|
||
2A866691000
|
trusted library allocation
|
page read and write
|
||
140BF346000
|
heap
|
page read and write
|
||
1BB81380000
|
heap
|
page read and write
|
||
1BB81179000
|
heap
|
page read and write
|
||
2A865CE0000
|
heap
|
page read and write
|
||
1AD7AC60000
|
heap
|
page read and write
|
||
1BB811AD000
|
heap
|
page read and write
|
||
1D0D3700000
|
heap
|
page read and write
|
||
1AD00073000
|
trusted library allocation
|
page read and write
|
||
1BB81867000
|
trusted library allocation
|
page read and write
|
||
25E6EDB0000
|
heap
|
page read and write
|
||
4C02000
|
heap
|
page read and write
|
||
25E004C0000
|
trusted library allocation
|
page read and write
|
||
1D0B9266000
|
heap
|
page read and write
|
||
140BFB71000
|
trusted library allocation
|
page read and write
|
||
4AD4000
|
trusted library allocation
|
page read and write
|
||
1D0BAEC6000
|
trusted library allocation
|
page read and write
|
||
1AD7ACE6000
|
heap
|
page read and write
|
||
1D0B927F000
|
heap
|
page read and write
|
||
2A865CAB000
|
heap
|
page read and write
|
||
140BFC2F000
|
trusted library allocation
|
page read and write
|
||
4741000
|
trusted library allocation
|
page read and write
|
||
1AD00083000
|
trusted library allocation
|
page read and write
|
||
25E6D8BF000
|
heap
|
page read and write
|
||
1BB9A15A000
|
heap
|
page read and write
|
||
25E00838000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34186000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34090000
|
trusted library allocation
|
page read and write
|
||
5BE000
|
unkown
|
page read and write
|
||
7FFD342E4000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
2EC8000
|
stack
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4623000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
2C6D000
|
heap
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
25E6EAB3000
|
heap
|
page read and write
|
||
7FFD3424E000
|
trusted library allocation
|
page read and write
|
||
7FFD341C0000
|
trusted library allocation
|
page execute and read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
1D0CAD6F000
|
trusted library allocation
|
page read and write
|
||
25E10081000
|
trusted library allocation
|
page read and write
|
||
2A8665B0000
|
unkown
|
page readonly
|
||
7FFD34270000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
6D84000
|
trusted library allocation
|
page read and write
|
||
140BF5B5000
|
heap
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
2F04000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
6D70000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4BA0000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
1D0D3560000
|
unkown
|
page readonly
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
45C0000
|
trusted library section
|
page read and write
|
||
1BB81730000
|
trusted library allocation
|
page read and write
|
||
25E001A2000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
2A8766A1000
|
trusted library allocation
|
page read and write
|
||
25E000E2000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4C2E000
|
stack
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
2925FB000
|
stack
|
page read and write
|
||
4DFC000
|
trusted library allocation
|
page execute and read and write
|
||
140BF305000
|
heap
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
7FFD342D2000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
25E00836000
|
trusted library allocation
|
page read and write
|
||
1D0B92A3000
|
heap
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
7FFD3415C000
|
trusted library allocation
|
page execute and read and write
|
||
D20ECE9000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
7FFD342B0000
|
trusted library allocation
|
page execute and read and write
|
||
3075000
|
heap
|
page read and write
|
||
25E6F2C4000
|
heap
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
4BC0000
|
heap
|
page read and write
|
||
3238000
|
heap
|
page read and write
|
||
1D0D3724000
|
heap
|
page read and write
|
||
1FE48A68000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
140BFBAB000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
2A8665E3000
|
unkown
|
page readonly
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
2A866634000
|
unkown
|
page readonly
|
||
4C00000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
D20D8FE000
|
stack
|
page read and write
|
||
1AD7AD46000
|
heap
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
25E6F26B000
|
heap
|
page read and write
|
||
296A000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
7FFD342C2000
|
trusted library allocation
|
page read and write
|
||
1AD00143000
|
trusted library allocation
|
page read and write
|
||
25E6EDD2000
|
heap
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
1BB81270000
|
heap
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
AE1C1FE000
|
stack
|
page read and write
|
||
7EF78000
|
trusted library allocation
|
page execute and read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
2F6A1FE000
|
stack
|
page read and write
|
||
2F18000
|
heap
|
page read and write
|
||
2A87EDD1000
|
heap
|
page read and write
|
||
25E004E4000
|
trusted library allocation
|
page read and write
|
||
7FFD34272000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
6C00000
|
remote allocation
|
page read and write
|
||
25E6EF1E000
|
heap
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34140000
|
trusted library allocation
|
page read and write
|
||
D20FAE9000
|
stack
|
page read and write
|
||
72EE000
|
stack
|
page read and write
|
||
7FFD3409D000
|
trusted library allocation
|
page execute and read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
D20DEE9000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4870000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
1D0B92AF000
|
heap
|
page read and write
|
||
6FFE000
|
stack
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
1FE48A4A000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
2A87ED8C000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
720E000
|
stack
|
page read and write
|
||
25E0010D000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
D20F6F8000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
6E20000
|
remote allocation
|
page read and write
|
||
291FFC000
|
stack
|
page read and write
|
||
6DB0000
|
trusted library allocation
|
page execute and read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
25E6F29D000
|
heap
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
25E6EDCE000
|
heap
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
7FFD342A0000
|
trusted library allocation
|
page read and write
|
||
7FFD340FC000
|
trusted library allocation
|
page execute and read and write
|
||
9D67DFE000
|
stack
|
page read and write
|
||
4BF0000
|
heap
|
page read and write
|
||
25E00195000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
7FFD342C0000
|
trusted library allocation
|
page execute and read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
7FFD34240000
|
trusted library allocation
|
page read and write
|
||
D20C3FF000
|
stack
|
page read and write
|
||
46D4000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
2F69EFE000
|
stack
|
page read and write
|
||
2F85000
|
heap
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
1D0D34A2000
|
heap
|
page read and write
|
||
5A35000
|
trusted library allocation
|
page read and write
|
||
6D83000
|
trusted library allocation
|
page read and write
|
||
6D70000
|
trusted library allocation
|
page read and write
|
||
7FFD340B4000
|
trusted library allocation
|
page read and write
|
||
4C07000
|
trusted library allocation
|
page execute and read and write
|
||
48CE000
|
stack
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
1FE61A32000
|
unkown
|
page readonly
|
||
7FFD3423E000
|
trusted library allocation
|
page read and write
|
||
487D000
|
trusted library allocation
|
page execute and read and write
|
||
4850000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD342B9000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
7FFD340A2000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
48FC000
|
heap
|
page read and write
|
||
4CF0000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
7FFD34250000
|
trusted library allocation
|
page execute and read and write
|
||
4B30000
|
heap
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
2A866618000
|
unkown
|
page readonly
|
||
1AD7AC86000
|
heap
|
page read and write
|
||
7FFD342B0000
|
trusted library allocation
|
page read and write
|
||
1AD7B140000
|
heap
|
page read and write
|
||
7FFD342E0000
|
trusted library allocation
|
page execute and read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
7200000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
7F230000
|
trusted library allocation
|
page execute and read and write
|
||
9D679FE000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
7FFD34350000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6A84000
|
trusted library allocation
|
page read and write
|
||
7170000
|
heap
|
page execute and read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
1AD7B3E0000
|
heap
|
page read and write
|
||
7FFD3414C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD342C0000
|
trusted library allocation
|
page execute and read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
4590000
|
trusted library allocation
|
page read and write
|
||
1FE48CA0000
|
trusted library allocation
|
page read and write
|
||
7FFD341C0000
|
trusted library allocation
|
page execute and read and write
|
||
2E10000
|
heap
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
25E6E1C0000
|
heap
|
page execute and read and write
|
||
7FFD34297000
|
trusted library allocation
|
page read and write
|
||
1FE48C10000
|
heap
|
page read and write
|
||
52DBEFE000
|
stack
|
page read and write
|
||
25D0000
|
heap
|
page read and write
|
||
7FFD34279000
|
trusted library allocation
|
page read and write
|
||
1FE491A8000
|
unkown
|
page readonly
|
||
6D81000
|
trusted library allocation
|
page read and write
|
||
1D0B9180000
|
heap
|
page read and write
|
||
140BF309000
|
heap
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
2A1A000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
25E007AB000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
7FFD34280000
|
trusted library allocation
|
page read and write
|
||
2F71000
|
heap
|
page read and write
|
||
25E0072A000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
1FE59231000
|
trusted library allocation
|
page read and write
|
||
7FFD34289000
|
trusted library allocation
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
25E6F25B000
|
heap
|
page read and write
|
||
7FFD342B0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4700000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
25E6DA95000
|
heap
|
page read and write
|
||
AE1BFFE000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
7FFD340A3000
|
trusted library allocation
|
page read and write
|
||
25E001AA000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
25E00832000
|
trusted library allocation
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
heap
|
page readonly
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
D20F4E9000
|
stack
|
page read and write
|
||
7FFD34233000
|
trusted library allocation
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
2F69FFE000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
7FFD340CD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34284000
|
trusted library allocation
|
page read and write
|
||
7FFD342F6000
|
trusted library allocation
|
page read and write
|
||
25E00828000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
70C0000
|
trusted library allocation
|
page execute and read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
25E6EE62000
|
heap
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
25E6E059000
|
heap
|
page read and write
|
||
2F6A2FD000
|
stack
|
page read and write
|
||
52DBBFE000
|
stack
|
page read and write
|
||
D20EBE9000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
49F9000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
1BB91821000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
25E6D8A1000
|
heap
|
page read and write
|
||
1BB8194F000
|
trusted library allocation
|
page read and write
|
||
25E6F750000
|
heap
|
page read and write
|
||
7FFD342D0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
7FFD34240000
|
trusted library allocation
|
page read and write
|
||
1AD7ACA3000
|
heap
|
page read and write
|
||
4B22000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
7340000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
25E009D1000
|
trusted library allocation
|
page read and write
|
||
140BFC9C000
|
trusted library allocation
|
page read and write
|
||
BFB8AFF000
|
stack
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
2C0E000
|
stack
|
page read and write
|
||
715E000
|
stack
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
1FE61A56000
|
unkown
|
page readonly
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
1AD7ACAB000
|
heap
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
heap
|
page read and write
|
||
4B16000
|
trusted library allocation
|
page read and write
|
||
D20C9FE000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
7FFD341B0000
|
trusted library allocation
|
page execute and read and write
|
||
25E6D8A7000
|
heap
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
472D000
|
heap
|
page read and write
|
||
1AD7BDD0000
|
heap
|
page read and write
|
||
1FE61A43000
|
unkown
|
page readonly
|
||
25E6D87B000
|
heap
|
page read and write
|
||
291AFE000
|
stack
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
1FE48AA7000
|
heap
|
page read and write
|
||
140BFC9F000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
461E000
|
stack
|
page read and write
|
||
1D0D3714000
|
heap
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
2A8666CB000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
2A866480000
|
heap
|
page read and write
|
||
1BB81750000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
25E002C4000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
7FFD342C7000
|
trusted library allocation
|
page read and write
|
||
1FE61B47000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
5D45000
|
trusted library allocation
|
page read and write
|
||
1FE49190000
|
unkown
|
page readonly
|
||
7FFD34310000
|
trusted library allocation
|
page execute and read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
29259320000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
25E6DAA0000
|
heap
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
D20D3E9000
|
stack
|
page read and write
|
||
4580000
|
trusted library allocation
|
page execute and read and write
|
||
2919FE000
|
stack
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
1D0D3712000
|
heap
|
page read and write
|
||
7FFD340BD000
|
trusted library allocation
|
page execute and read and write
|
||
6AA0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
1AD7BF80000
|
heap
|
page execute and read and write
|
||
2C64000
|
heap
|
page read and write
|
||
2A8667D3000
|
trusted library allocation
|
page read and write
|
||
291CFE000
|
stack
|
page read and write
|
||
7FFD34470000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page execute and read and write
|
||
2AA5000
|
heap
|
page read and write
|
||
25E6EA99000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
2EEA000
|
heap
|
page read and write
|
||
7FFD342C0000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
2920FB000
|
stack
|
page read and write
|
||
2F69AFE000
|
stack
|
page read and write
|
||
4BC3000
|
trusted library allocation
|
page execute and read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
1AD7B130000
|
trusted library allocation
|
page read and write
|
||
1FE48960000
|
unkown
|
page readonly
|
||
290E000
|
stack
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
25E6EE65000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
25E001B6000
|
trusted library allocation
|
page read and write
|
||
7FFD3428B000
|
trusted library allocation
|
page read and write
|
||
49D0000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
4700000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
trusted library allocation
|
page read and write
|
||
6D8C000
|
trusted library allocation
|
page read and write
|
||
25E6EF90000
|
heap
|
page read and write
|
||
D20FEFD000
|
stack
|
page read and write
|
||
7FFD340AD000
|
trusted library allocation
|
page execute and read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
7FFD34080000
|
trusted library allocation
|
page read and write
|
||
4B12000
|
trusted library allocation
|
page read and write
|
||
7FFD34250000
|
trusted library allocation
|
page read and write
|
||
2A87EDA4000
|
heap
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
1AD7B145000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6D70000
|
trusted library allocation
|
page read and write
|
||
2D1A000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
140BF2A0000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
7FFD34156000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
1AD0003D000
|
trusted library allocation
|
page read and write
|
||
2918FC000
|
stack
|
page read and write
|
||
25E00080000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
1FE5923D000
|
trusted library allocation
|
page read and write
|
||
25E0020F000
|
trusted library allocation
|
page read and write
|
||
7FFD342F0000
|
trusted library allocation
|
page execute and read and write
|
||
1BB81971000
|
trusted library allocation
|
page read and write
|
||
1D0D3420000
|
heap
|
page read and write
|
||
25E6DA40000
|
heap
|
page read and write
|
||
D20F7EA000
|
stack
|
page read and write
|
||
2A8665C2000
|
unkown
|
page readonly
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
7FFD34250000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4970000
|
trusted library allocation
|
page read and write
|
||
25E10021000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4BCD000
|
trusted library allocation
|
page execute and read and write
|
||
3237000
|
heap
|
page read and write
|
||
7FFD340AD000
|
trusted library allocation
|
page execute and read and write
|
||
D20F9EC000
|
stack
|
page read and write
|
||
D20E9E9000
|
stack
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
291EFD000
|
stack
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
25E00560000
|
trusted library allocation
|
page read and write
|
||
6EBE000
|
stack
|
page read and write
|
||
1AD0012C000
|
trusted library allocation
|
page read and write
|
||
46B0000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
5741000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
7FFD342B0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
D20E8EC000
|
stack
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
2C2B000
|
heap
|
page read and write
|
||
2928FE000
|
stack
|
page read and write
|
||
49D0000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
2C82000
|
heap
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
4B9D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3422A000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
D20E0E8000
|
stack
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
2A22000
|
heap
|
page read and write
|
||
423E000
|
stack
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
1AD7BE1D000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
1BB9182D000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
7FFD34295000
|
trusted library allocation
|
page read and write
|
||
71A0000
|
trusted library allocation
|
page read and write
|
||
1BB8194C000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34480000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
1BB81975000
|
trusted library allocation
|
page read and write
|
||
2CFE000
|
heap
|
page read and write
|
||
4E40000
|
trusted library allocation
|
page read and write
|
||
25E6EC3E000
|
unkown
|
page readonly
|
||
25E6F2E5000
|
heap
|
page read and write
|
||
25E6E1D0000
|
trusted library allocation
|
page read and write
|
||
4405000
|
trusted library allocation
|
page execute and read and write
|
||
25E6EF23000
|
heap
|
page read and write
|
||
25E00724000
|
trusted library allocation
|
page read and write
|
||
2A866638000
|
unkown
|
page readonly
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
1AD7ACA7000
|
heap
|
page read and write
|
||
1FE48E95000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
2C85000
|
heap
|
page read and write
|
||
7FFD34262000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
2550000
|
heap
|
page read and write
|
||
7FFD34390000
|
trusted library allocation
|
page read and write
|
||
711E000
|
stack
|
page read and write
|
||
1D0BAD50000
|
heap
|
page execute and read and write
|
||
1D0D3732000
|
heap
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
2A865C40000
|
heap
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
7FFD342F0000
|
trusted library allocation
|
page execute and read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34300000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
AE1BDFE000
|
stack
|
page read and write
|
||
4E40000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
249B000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
4D8F000
|
heap
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
452C000
|
stack
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
43CD000
|
trusted library allocation
|
page execute and read and write
|
||
4730000
|
heap
|
page execute and read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
140BFCC1000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
25E004DE000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
7FFD34266000
|
trusted library allocation
|
page read and write
|
||
7FFD34256000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
7FFD34146000
|
trusted library allocation
|
page read and write
|
||
25E000A1000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
46DC000
|
trusted library allocation
|
page read and write
|
||
7FFD3425D000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34430000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
25E007DF000
|
trusted library allocation
|
page read and write
|
||
2A866636000
|
unkown
|
page readonly
|
||
7FFD34150000
|
trusted library allocation
|
page execute and read and write
|
||
25E001B2000
|
trusted library allocation
|
page read and write
|
||
BFB8BFF000
|
stack
|
page read and write
|
||
484C000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
7160000
|
trusted library allocation
|
page read and write
|
||
2E5B000
|
stack
|
page read and write
|
||
7FFD340AD000
|
trusted library allocation
|
page execute and read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
4CEE000
|
stack
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
7FFD342D7000
|
trusted library allocation
|
page read and write
|
||
1FE61A9A000
|
unkown
|
page readonly
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
D20EDE9000
|
stack
|
page read and write
|
||
4660000
|
trusted library allocation
|
page execute and read and write
|
||
D20CAFD000
|
stack
|
page read and write
|
||
2A87EE90000
|
heap
|
page execute and read and write
|
||
7FFD342D0000
|
trusted library allocation
|
page execute and read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
2F47000
|
heap
|
page read and write
|
||
4C0B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD341C0000
|
trusted library allocation
|
page execute and read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4721000
|
trusted library allocation
|
page read and write
|
||
25E6EA9C000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
BFB95FE000
|
stack
|
page read and write
|
||
25E000D2000
|
trusted library allocation
|
page read and write
|
||
140D8324000
|
heap
|
page read and write
|
||
7FFD340B4000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
736E000
|
stack
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
3010000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6AA0000
|
trusted library allocation
|
page read and write
|
||
49D0000
|
trusted library allocation
|
page read and write
|
||
29259420000
|
heap
|
page read and write
|
||
291BFE000
|
stack
|
page read and write
|
||
7FFD342B0000
|
trusted library allocation
|
page read and write
|
||
1BB81780000
|
heap
|
page read and write
|
||
7FFD34245000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4966000
|
trusted library allocation
|
page execute and read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
1AD7AE30000
|
heap
|
page read and write
|
||
27F7000
|
stack
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
72CE000
|
stack
|
page read and write
|
||
2A866680000
|
heap
|
page execute and read and write
|
||
2A87EDFB000
|
heap
|
page read and write
|
||
7FFD34240000
|
trusted library allocation
|
page read and write
|
||
1D0B90A0000
|
heap
|
page read and write
|
||
1D0B9225000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
1AD7BE90000
|
heap
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
25D5000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
25E6F293000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34156000
|
trusted library allocation
|
page execute and read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
46B0000
|
trusted library allocation
|
page read and write
|
||
25CE000
|
stack
|
page read and write
|
||
1D0B92A9000
|
heap
|
page read and write
|
||
140D8396000
|
heap
|
page read and write
|
||
1D0D351B000
|
heap
|
page read and write
|
||
140BF2E6000
|
heap
|
page read and write
|
||
7310000
|
heap
|
page read and write
|
||
7FFD34420000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
1AD7B110000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
D20DAEA000
|
stack
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
25E6EEBF000
|
heap
|
page read and write
|
||
140D84C0000
|
heap
|
page execute and read and write
|
||
7FFD340C4000
|
trusted library allocation
|
page read and write
|
||
7355000
|
heap
|
page read and write
|
||
25E001BE000
|
trusted library allocation
|
page read and write
|
||
7FFD3408D000
|
trusted library allocation
|
page execute and read and write
|
||
1AD7AF65000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4649000
|
trusted library allocation
|
page execute and read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
7022000
|
heap
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
25E6F298000
|
heap
|
page read and write
|
||
31E8000
|
heap
|
page read and write
|
||
7FFD341BB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD340AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD340A4000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
9D67CFE000
|
stack
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
25E007AF000
|
trusted library allocation
|
page read and write
|
||
47CE000
|
stack
|
page read and write
|
||
7FFD34240000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
7FFD34093000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6AA0000
|
trusted library allocation
|
page read and write
|
||
7FFD34294000
|
trusted library allocation
|
page read and write
|
||
52DB8FD000
|
stack
|
page read and write
|
||
6E20000
|
heap
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4D41000
|
trusted library allocation
|
page read and write
|
||
71C0000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
1FE48AA9000
|
heap
|
page read and write
|
||
9D677FE000
|
stack
|
page read and write
|
||
4AC6000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
2B4F000
|
stack
|
page read and write
|
||
7380000
|
heap
|
page read and write
|
||
7FFD34291000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
7FFD343A0000
|
trusted library allocation
|
page execute and read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
25E6ED90000
|
heap
|
page read and write
|
||
731A000
|
heap
|
page read and write
|
||
AE1C2FE000
|
stack
|
page read and write
|
||
7FFD34220000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
2F695E1000
|
stack
|
page read and write
|
||
140CFB81000
|
trusted library allocation
|
page read and write
|
||
4BC4000
|
trusted library allocation
|
page read and write
|
||
31D3000
|
heap
|
page read and write
|
||
2FA5000
|
heap
|
page read and write
|
||
6C00000
|
remote allocation
|
page read and write
|
||
D20C829000
|
stack
|
page read and write
|
||
25E6E020000
|
heap
|
page execute and read and write
|
||
6FCE000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4B93000
|
trusted library allocation
|
page execute and read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
25E6F090000
|
heap
|
page execute and read and write
|
||
25E00826000
|
trusted library allocation
|
page read and write
|
||
2540000
|
heap
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
D20EFEC000
|
stack
|
page read and write
|
||
6D7E000
|
stack
|
page read and write
|
||
25E6EE67000
|
heap
|
page read and write
|
||
292596F5000
|
heap
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
2A865E80000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
D20D1FD000
|
stack
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
2916FE000
|
stack
|
page read and write
|
||
1AD7BE86000
|
heap
|
page read and write
|
||
D20E7EC000
|
stack
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
7FFD34092000
|
trusted library allocation
|
page read and write
|
||
6D81000
|
trusted library allocation
|
page read and write
|
||
4A20000
|
heap
|
page execute and read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
7FFD34270000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
D20E1E8000
|
stack
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
9D680FE000
|
stack
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
2F6A3FE000
|
stack
|
page read and write
|
||
44A0000
|
heap
|
page read and write
|
||
496E000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
2C27000
|
heap
|
page read and write
|
||
7FFD34094000
|
trusted library allocation
|
page read and write
|
||
1FE61C30000
|
heap
|
page execute and read and write
|
||
2A8667BC000
|
trusted library allocation
|
page read and write
|
||
7FFD34082000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
BFB8FFE000
|
stack
|
page read and write
|
||
25E0055B000
|
trusted library allocation
|
page read and write
|
||
25E0082C000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
4470000
|
heap
|
page readonly
|
||
4BD0000
|
trusted library allocation
|
page read and write
|
||
25E6DA60000
|
heap
|
page read and write
|
||
46F3000
|
trusted library allocation
|
page execute and read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4711000
|
trusted library allocation
|
page read and write
|
||
7FFD34070000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
D20DFE8000
|
stack
|
page read and write
|
||
4A00000
|
trusted library allocation
|
page read and write
|
||
7FFD34120000
|
trusted library allocation
|
page read and write
|
||
AE1BEFF000
|
stack
|
page read and write
|
||
5A31000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
46D5000
|
trusted library allocation
|
page read and write
|
||
D20F0E9000
|
stack
|
page read and write
|
||
4A8D000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
43C4000
|
trusted library allocation
|
page read and write
|
||
4CDC000
|
stack
|
page read and write
|
||
25E6EEB7000
|
heap
|
page read and write
|
||
25E6F250000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
915000
|
heap
|
page read and write
|
||
7FFD34276000
|
trusted library allocation
|
page read and write
|
||
D20F1E9000
|
stack
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34330000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
7FFD3413C000
|
trusted library allocation
|
page execute and read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
2A865C00000
|
heap
|
page read and write
|
||
25E00206000
|
trusted library allocation
|
page read and write
|
||
25E6EB20000
|
trusted library allocation
|
page read and write
|
||
1FE59241000
|
trusted library allocation
|
page read and write
|
||
1BB81385000
|
heap
|
page read and write
|
||
7FFD34280000
|
trusted library allocation
|
page read and write
|
||
25E6F162000
|
unkown
|
page readonly
|
||
7FFD340C0000
|
trusted library allocation
|
page read and write
|
||
4700000
|
trusted library allocation
|
page read and write
|
||
1D0B91D0000
|
heap
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4C6F000
|
stack
|
page read and write
|
||
4646000
|
trusted library allocation
|
page execute and read and write
|
||
2D06000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
7FFD34300000
|
trusted library allocation
|
page execute and read and write
|
||
1BB811AB000
|
heap
|
page read and write
|
||
AE1C0FF000
|
stack
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
294E000
|
stack
|
page read and write
|
||
1FE49381000
|
trusted library allocation
|
page read and write
|
||
7FFD34150000
|
trusted library allocation
|
page read and write
|
||
734A000
|
heap
|
page read and write
|
||
2F69DFE000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
4805000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
7FFD3408D000
|
trusted library allocation
|
page execute and read and write
|
||
2923FC000
|
stack
|
page read and write
|
||
4727000
|
trusted library allocation
|
page execute and read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
25E10001000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
52DBFFD000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
7FFD340FC000
|
trusted library allocation
|
page execute and read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
7FFD34160000
|
trusted library allocation
|
page execute and read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
1FE61A02000
|
unkown
|
page readonly
|
||
25E6EF8D000
|
heap
|
page read and write
|
||
1FE61B61000
|
heap
|
page read and write
|
||
1D0D34C9000
|
heap
|
page read and write
|
||
7FFD342D0000
|
trusted library allocation
|
page read and write
|
||
BFB87F1000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
25E003D4000
|
trusted library allocation
|
page read and write
|
||
2F0C000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6FBE000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
25E00189000
|
trusted library allocation
|
page read and write
|
||
4AF5000
|
trusted library allocation
|
page read and write
|
||
6D3E000
|
stack
|
page read and write
|
||
25E00067000
|
trusted library allocation
|
page read and write
|
||
7FFD340B3000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
2A865BF0000
|
heap
|
page read and write
|
||
7FFD342D0000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
1AD1000D000
|
trusted library allocation
|
page read and write
|
||
25E6F301000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
7FFD34130000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34440000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34243000
|
trusted library allocation
|
page read and write
|
||
1D0BAED8000
|
trusted library allocation
|
page read and write
|
||
25E6F27F000
|
heap
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
25E6EDF6000
|
heap
|
page read and write
|
||
1AD7AC30000
|
heap
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
2A866621000
|
unkown
|
page readonly
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
1BB9A19A000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
46E0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6AB0000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
1FE48CD5000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4880000
|
heap
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
7FFD3422C000
|
trusted library allocation
|
page read and write
|
||
2CEB000
|
heap
|
page read and write
|
||
292594B0000
|
heap
|
page read and write
|
||
7FFD34233000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
2F69CFE000
|
stack
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
7FFD340C4000
|
trusted library allocation
|
page read and write
|
||
25E000C1000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
292594B8000
|
heap
|
page read and write
|
||
1AD10011000
|
trusted library allocation
|
page read and write
|
||
7FFD342A0000
|
trusted library allocation
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
1D0B91A0000
|
heap
|
page read and write
|
||
7FFD34300000
|
trusted library allocation
|
page execute and read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
7FFD342D0000
|
trusted library allocation
|
page read and write
|
||
440B000
|
trusted library allocation
|
page execute and read and write
|
||
46B0000
|
trusted library allocation
|
page read and write
|
||
2A86661F000
|
unkown
|
page readonly
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
25E0054E000
|
trusted library allocation
|
page read and write
|
||
7FFD341CB000
|
trusted library allocation
|
page execute and read and write
|
||
45F0000
|
heap
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4640000
|
trusted library allocation
|
page read and write
|
||
1FE4935C000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34280000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
1FE61B42000
|
heap
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
1AD7ACBD000
|
heap
|
page read and write
|
||
1D0BAEDA000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
46D5000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
D20CDFE000
|
stack
|
page read and write
|
||
25E6D886000
|
heap
|
page read and write
|
||
140BF3F0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6E1E000
|
stack
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
1D0B8FF0000
|
unkown
|
page readonly
|
||
700E000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34281000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
7FFD34290000
|
trusted library allocation
|
page read and write
|
||
25E004E0000
|
trusted library allocation
|
page read and write
|
||
1BB81196000
|
heap
|
page read and write
|
||
1FE48960000
|
unkown
|
page readonly
|
||
50C000
|
stack
|
page read and write
|
||
1AD7B5A0000
|
heap
|
page execute and read and write
|
||
4BC0000
|
trusted library allocation
|
page read and write
|
||
140CFB7D000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4740000
|
trusted library allocation
|
page read and write
|
||
1FE61A6B000
|
unkown
|
page readonly
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
703D000
|
heap
|
page read and write
|
||
1FE48A64000
|
heap
|
page read and write
|
||
7FFD34250000
|
trusted library allocation
|
page read and write
|
||
52DB5FF000
|
stack
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
25E6EDF8000
|
heap
|
page read and write
|
||
7FFD34235000
|
trusted library allocation
|
page read and write
|
||
4630000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
25E1000E000
|
trusted library allocation
|
page read and write
|
||
25E6EA16000
|
heap
|
page read and write
|
||
7FFD34093000
|
trusted library allocation
|
page execute and read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
BFB92FE000
|
stack
|
page read and write
|
||
7FFD342A9000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
7FFD340C4000
|
trusted library allocation
|
page read and write
|
||
D20D0E9000
|
stack
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4725000
|
trusted library allocation
|
page execute and read and write
|
||
2BBE000
|
stack
|
page read and write
|
||
4407000
|
trusted library allocation
|
page execute and read and write
|
||
25E6E200000
|
trusted library allocation
|
page read and write
|
||
4B94000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
2A8665D2000
|
unkown
|
page readonly
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
3212000
|
heap
|
page read and write
|
||
4B90000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
46D5000
|
trusted library allocation
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
7164000
|
trusted library allocation
|
page read and write
|
||
25E00558000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
1FE49220000
|
heap
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4E20000
|
heap
|
page execute and read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
140BFCB3000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
25E0016D000
|
trusted library allocation
|
page read and write
|
||
2B0D000
|
stack
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
AE1B7FE000
|
stack
|
page read and write
|
||
9D681FD000
|
stack
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
1FE61A67000
|
unkown
|
page readonly
|
||
2960000
|
heap
|
page read and write
|
||
3010000
|
heap
|
page read and write
|
||
49AF000
|
stack
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
25E6DC65000
|
heap
|
page read and write
|
||
43C3000
|
trusted library allocation
|
page execute and read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4E02000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6AA0000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
140BF450000
|
heap
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
2F9D000
|
stack
|
page read and write
|
||
25E0072E000
|
trusted library allocation
|
page read and write
|
||
25E0023A000
|
trusted library allocation
|
page read and write
|
||
7FFD342D4000
|
trusted library allocation
|
page read and write
|
||
7190000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
7FFD340A0000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34084000
|
trusted library allocation
|
page read and write
|
||
D1A9ABC000
|
stack
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
1AD7BE4F000
|
heap
|
page read and write
|
||
7FFD342E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD340CD000
|
trusted library allocation
|
page execute and read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
7FFD34290000
|
trusted library allocation
|
page read and write
|
||
1FE61A89000
|
unkown
|
page readonly
|
||
1D0D34CD000
|
heap
|
page read and write
|
||
25E007A7000
|
trusted library allocation
|
page read and write
|
||
7F028000
|
trusted library allocation
|
page execute and read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
25E001BA000
|
trusted library allocation
|
page read and write
|
||
4488000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
D20DCFB000
|
stack
|
page read and write
|
||
D1A9BBF000
|
stack
|
page read and write
|
||
7200000
|
trusted library allocation
|
page read and write
|
||
5745000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
4963000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
7FFD34290000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
2F0F000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4C33000
|
heap
|
page read and write
|
||
7FFD341B0000
|
trusted library allocation
|
page execute and read and write
|
||
43D4000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
1FE61A70000
|
unkown
|
page readonly
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
25E00203000
|
trusted library allocation
|
page read and write
|
||
7FFD342E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD340AD000
|
trusted library allocation
|
page execute and read and write
|
||
49F5000
|
trusted library allocation
|
page read and write
|
||
4700000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
45D0000
|
trusted library section
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
7FFD340B3000
|
trusted library allocation
|
page read and write
|
||
4DD3000
|
trusted library allocation
|
page read and write
|
||
7FFD340A4000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
71CD000
|
stack
|
page read and write
|
||
2A876691000
|
trusted library allocation
|
page read and write
|
||
4B80000
|
trusted library section
|
page read and write
|
||
7FFD34230000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
7FF410460000
|
trusted library allocation
|
page execute and read and write
|
||
1D0D348E000
|
heap
|
page read and write
|
||
2A8666CF000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
9D67FFE000
|
stack
|
page read and write
|
||
1D0B91D5000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
heap
|
page execute and read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
7FFD34280000
|
trusted library allocation
|
page execute and read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
1BB9A222000
|
heap
|
page read and write
|
||
2E98000
|
stack
|
page read and write
|
||
1FE4935F000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
496C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34260000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
7FFD3425D000
|
trusted library allocation
|
page read and write
|
||
25E000DE000
|
trusted library allocation
|
page read and write
|
||
D20F3EC000
|
stack
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
2B0E000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
25E00304000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
2F25000
|
heap
|
page read and write
|
||
7FFD340BB000
|
trusted library allocation
|
page execute and read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
7FFD34298000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
4A2E000
|
stack
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
25E00830000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
1BB81140000
|
heap
|
page read and write
|
||
7FFD340CB000
|
trusted library allocation
|
page execute and read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34243000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
25E00090000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4CE0000
|
trusted library allocation
|
page execute and read and write
|
||
1D0D372F000
|
heap
|
page read and write
|
||
7FFD34190000
|
trusted library allocation
|
page execute and read and write
|
||
4BB0000
|
heap
|
page read and write
|
||
25E6EF86000
|
heap
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
25E000D6000
|
trusted library allocation
|
page read and write
|
||
6DD0000
|
trusted library allocation
|
page read and write
|
||
140CFB71000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
7FFD340AB000
|
trusted library allocation
|
page execute and read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
25E001AE000
|
trusted library allocation
|
page read and write
|
||
25E6F140000
|
heap
|
page read and write
|
||
7FFD34275000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
45DE000
|
stack
|
page read and write
|
||
2A865CDA000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
7FFD340EC000
|
trusted library allocation
|
page execute and read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4860000
|
trusted library allocation
|
page read and write
|
||
1BB9A150000
|
heap
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
2A866649000
|
unkown
|
page readonly
|
||
318E000
|
stack
|
page read and write
|
||
1D0D375D000
|
heap
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
25E007DB000
|
trusted library allocation
|
page read and write
|
||
7FFD340BD000
|
trusted library allocation
|
page execute and read and write
|
||
1AD7BE21000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34266000
|
trusted library allocation
|
page read and write
|
||
29A3000
|
heap
|
page read and write
|
||
1D0CAD61000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
45E0000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
1BB81370000
|
heap
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
7FFD3424E000
|
trusted library allocation
|
page read and write
|
||
7FFD34216000
|
trusted library allocation
|
page read and write
|
||
1D0B91E0000
|
heap
|
page read and write
|
||
4C70000
|
heap
|
page readonly
|
||
BFB94FD000
|
stack
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
1FE48BF0000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
D20E2E9000
|
stack
|
page read and write
|
||
25E00185000
|
trusted library allocation
|
page read and write
|
||
4402000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
27BB000
|
stack
|
page read and write
|
||
46F4000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
1D0D35F4000
|
unkown
|
page readonly
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
D20D7FC000
|
stack
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
7FFD340A8000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
4ACB000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
140D832A000
|
heap
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
4700000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
47D3000
|
trusted library allocation
|
page read and write
|
||
D20E4EB000
|
stack
|
page read and write
|
||
7FFD34098000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4C20000
|
trusted library allocation
|
page read and write
|
||
4AC3000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
4D30000
|
heap
|
page execute and read and write
|
||
7330000
|
heap
|
page read and write
|
||
7FFD340A2000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
29A5000
|
heap
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
1FE61B27000
|
heap
|
page read and write
|
||
726E000
|
stack
|
page read and write
|
||
1FE61A87000
|
unkown
|
page readonly
|
||
25E6DF83000
|
trusted library allocation
|
page read and write
|
||
BFB8EFF000
|
stack
|
page read and write
|
||
1AD7AC9B000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
7EF60000
|
trusted library allocation
|
page execute and read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
1BB81963000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
25E6EB92000
|
unkown
|
page readonly
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
7F248000
|
trusted library allocation
|
page execute and read and write
|
||
2A21000
|
heap
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
trusted library allocation
|
page read and write
|
||
140BF301000
|
heap
|
page read and write
|
||
140BFBAF000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
1D0D3710000
|
heap
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34450000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
7FFD3426A000
|
trusted library allocation
|
page read and write
|
||
6E20000
|
remote allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
7FFD342B9000
|
trusted library allocation
|
page read and write
|
||
140D82E0000
|
heap
|
page read and write
|
||
31E1000
|
heap
|
page read and write
|
||
7FFD34299000
|
trusted library allocation
|
page read and write
|
||
704E000
|
stack
|
page read and write
|
||
7FFD34186000
|
trusted library allocation
|
page execute and read and write
|
||
4A78000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
2D07000
|
heap
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
1FE61A72000
|
unkown
|
page readonly
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
2ACF000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
2A865D8A000
|
heap
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34340000
|
trusted library allocation
|
page read and write
|
||
49F5000
|
trusted library allocation
|
page read and write
|
||
327D000
|
stack
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
4711000
|
trusted library allocation
|
page read and write
|
||
AE1B6F1000
|
stack
|
page read and write
|
||
7FFD340BD000
|
trusted library allocation
|
page execute and read and write
|
||
43B0000
|
trusted library allocation
|
page read and write
|
||
1BB9A1E8000
|
heap
|
page read and write
|
||
1FE61A54000
|
unkown
|
page readonly
|
||
25E000A6000
|
trusted library allocation
|
page read and write
|
||
4643000
|
trusted library allocation
|
page read and write
|
||
6F8D000
|
stack
|
page read and write
|
||
7FA40000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34290000
|
trusted library allocation
|
page read and write
|
||
1BB811BB000
|
heap
|
page read and write
|
||
471E000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
52DB7FE000
|
stack
|
page read and write
|
||
2A87ED68000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4990000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
1AD10001000
|
trusted library allocation
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
7FFD34270000
|
trusted library allocation
|
page read and write
|
||
700E000
|
stack
|
page read and write
|
||
1FE61A21000
|
unkown
|
page readonly
|
||
4791000
|
trusted library allocation
|
page read and write
|
||
D20CEFE000
|
stack
|
page read and write
|
||
7FFD34210000
|
trusted library allocation
|
page read and write
|
||
25E6EF89000
|
heap
|
page read and write
|
||
BFB93FF000
|
stack
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
140BFCC5000
|
trusted library allocation
|
page read and write
|
||
25E007EF000
|
trusted library allocation
|
page read and write
|
||
7FFD34280000
|
trusted library allocation
|
page read and write
|
||
4A91000
|
trusted library allocation
|
page read and write
|
||
2BCE000
|
stack
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
1AD7BE8E000
|
heap
|
page read and write
|
||
1FE61A6E000
|
unkown
|
page readonly
|
||
7F010000
|
trusted library allocation
|
page execute and read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
25E00191000
|
trusted library allocation
|
page read and write
|
||
25E00564000
|
trusted library allocation
|
page read and write
|
||
2A87EDFF000
|
heap
|
page read and write
|
||
7FFD34080000
|
trusted library allocation
|
page read and write
|
||
1FE61A83000
|
unkown
|
page readonly
|
||
140BF455000
|
heap
|
page read and write
|
||
46D9000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
D20D9E9000
|
stack
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
25E6EE89000
|
heap
|
page read and write
|
||
2A87ED77000
|
heap
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
1D0BACA3000
|
heap
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page execute and read and write
|
||
462D000
|
trusted library allocation
|
page execute and read and write
|
||
140BF410000
|
trusted library allocation
|
page read and write
|
||
25E007A9000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
1D0BACB0000
|
heap
|
page read and write
|
||
140BF31D000
|
heap
|
page read and write
|
||
7FFD3426D000
|
trusted library allocation
|
page read and write
|
||
31DB000
|
heap
|
page read and write
|
||
25E00058000
|
trusted library allocation
|
page read and write
|
||
140D82F6000
|
heap
|
page read and write
|
||
1BB9A2D0000
|
heap
|
page execute and read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
7FFD342E0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
140D82E3000
|
heap
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4B04000
|
trusted library allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
7FFD340FC000
|
trusted library allocation
|
page execute and read and write
|
||
25E001A6000
|
trusted library allocation
|
page read and write
|
||
7180000
|
trusted library allocation
|
page read and write
|
||
7FFD34260000
|
trusted library allocation
|
page read and write
|
||
1FE61AAC000
|
unkown
|
page readonly
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
4714000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
1D0D34FC000
|
heap
|
page read and write
|
||
7FFD34230000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
9D676F1000
|
stack
|
page read and write
|
||
25E6F28F000
|
heap
|
page read and write
|
||
7FFD340A3000
|
trusted library allocation
|
page read and write
|
||
4960000
|
trusted library allocation
|
page read and write
|
||
6B3E000
|
stack
|
page read and write
|
||
5E81000
|
trusted library allocation
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
2A8665F4000
|
unkown
|
page readonly
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
25E0082A000
|
trusted library allocation
|
page read and write
|
||
AE1B8FE000
|
stack
|
page read and write
|
||
1BB811B9000
|
heap
|
page read and write
|
||
490E000
|
stack
|
page read and write
|
||
D20F5E9000
|
stack
|
page read and write
|
||
7FFD3415C000
|
trusted library allocation
|
page execute and read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page read and write
|
||
3520000
|
heap
|
page read and write
|
||
D20E5EB000
|
stack
|
page read and write
|
||
52DB9FE000
|
stack
|
page read and write
|
||
730E000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
1D0D3508000
|
heap
|
page read and write
|
||
7370000
|
heap
|
page execute and read and write
|
||
1AD00155000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
2F699FE000
|
stack
|
page read and write
|
||
1D0D378D000
|
heap
|
page read and write
|
||
7FFD34176000
|
trusted library allocation
|
page execute and read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
BFB90FE000
|
stack
|
page read and write
|
||
31BA000
|
heap
|
page read and write
|
||
7FFD34285000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
7FFD34150000
|
trusted library allocation
|
page read and write
|
||
7FFD341A0000
|
trusted library allocation
|
page execute and read and write
|
||
1FE48C30000
|
heap
|
page read and write
|
||
1D0B9014000
|
unkown
|
page readonly
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
34FF000
|
stack
|
page read and write
|
||
1BB81120000
|
heap
|
page read and write
|
||
7FFD34299000
|
trusted library allocation
|
page read and write
|
||
7FFD34083000
|
trusted library allocation
|
page execute and read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
1BB81040000
|
heap
|
page read and write
|
||
7FFD340C0000
|
trusted library allocation
|
page read and write
|
||
25E007E7000
|
trusted library allocation
|
page read and write
|
||
2922FC000
|
stack
|
page read and write
|
||
2A865CEC000
|
heap
|
page read and write
|
||
6CBE000
|
stack
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
25E00232000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
7FFD340A0000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
heap
|
page read and write
|
||
D20F2EC000
|
stack
|
page read and write
|
||
9D682FE000
|
stack
|
page read and write
|
||
4950000
|
trusted library allocation
|
page read and write
|
||
1D0D34EA000
|
heap
|
page read and write
|
||
2A8667E1000
|
trusted library allocation
|
page read and write
|
||
7FFD340DC000
|
trusted library allocation
|
page execute and read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
49ED000
|
stack
|
page read and write
|
||
6C00000
|
remote allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
D20D2FF000
|
stack
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4A8F000
|
stack
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
7FFD342A9000
|
trusted library allocation
|
page read and write
|
||
6D8E000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
25E6EDE9000
|
heap
|
page read and write
|
||
25E007E3000
|
trusted library allocation
|
page read and write
|
||
D1A9EFE000
|
stack
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6E20000
|
remote allocation
|
page read and write
|
||
6D84000
|
trusted library allocation
|
page read and write
|
||
7FFD34223000
|
trusted library allocation
|
page read and write
|
||
7FFD340A3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34166000
|
trusted library allocation
|
page execute and read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4E30000
|
trusted library allocation
|
page read and write
|
||
7FFD34320000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
1AD0003B000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
7FFD342A0000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
7FFD34230000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6DA4000
|
trusted library allocation
|
page read and write
|
||
7FFD34094000
|
trusted library allocation
|
page read and write
|
||
7FFD34380000
|
trusted library allocation
|
page read and write
|
||
7FFD342A0000
|
trusted library allocation
|
page read and write
|
||
2F13000
|
heap
|
page read and write
|
||
2F69BFD000
|
stack
|
page read and write
|
||
2A86661A000
|
unkown
|
page readonly
|
||
140BFBAD000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
25E6F160000
|
unkown
|
page readonly
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
4714000
|
trusted library allocation
|
page read and write
|
||
52DBAFF000
|
stack
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
2C4A000
|
heap
|
page read and write
|
||
1D0B9250000
|
trusted library allocation
|
page read and write
|
||
25E6DF70000
|
trusted library allocation
|
page read and write
|
||
7FFD34246000
|
trusted library allocation
|
page read and write
|
||
7FFD34186000
|
trusted library allocation
|
page execute and read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
1FE61A85000
|
unkown
|
page readonly
|
||
D20EEE9000
|
stack
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
7FFD340CB000
|
trusted library allocation
|
page execute and read and write
|
||
31DC000
|
heap
|
page read and write
|
||
BFB8CFE000
|
stack
|
page read and write
|
||
A2F000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
25E007AD000
|
trusted library allocation
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
2A865E60000
|
trusted library allocation
|
page read and write
|
||
D20C73F000
|
stack
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
1BB8185B000
|
trusted library allocation
|
page read and write
|
||
6A90000
|
trusted library allocation
|
page execute and read and write
|
||
2F698FE000
|
stack
|
page read and write
|
||
7FFD34136000
|
trusted library allocation
|
page read and write
|
||
2998000
|
heap
|
page read and write
|
||
4390000
|
trusted library section
|
page read and write
|
||
1D0D3562000
|
unkown
|
page readonly
|
||
2A865C20000
|
heap
|
page read and write
|
||
7FFD34260000
|
trusted library allocation
|
page read and write
|
||
1D0D3736000
|
heap
|
page read and write
|
||
7FFD340B0000
|
trusted library allocation
|
page read and write
|
||
4420000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
9D67AFD000
|
stack
|
page read and write
|
||
7FFD34130000
|
trusted library allocation
|
page execute and read and write
|
||
A6E000
|
stack
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
24D7000
|
stack
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
7FFD340BD000
|
trusted library allocation
|
page execute and read and write
|
||
D20D6FC000
|
stack
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4650000
|
trusted library allocation
|
page read and write
|
||
7FFD342F0000
|
trusted library allocation
|
page execute and read and write
|
||
2926FA000
|
stack
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
25E000DA000
|
trusted library allocation
|
page read and write
|
||
9D67BFE000
|
stack
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
7FFD34160000
|
trusted library allocation
|
page execute and read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
1BB8185F000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
47A1000
|
trusted library allocation
|
page read and write
|
||
25E6DC60000
|
heap
|
page read and write
|
||
25E00434000
|
trusted library allocation
|
page read and write
|
||
7FFD34235000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
7FFD3425E000
|
trusted library allocation
|
page read and write
|
||
7FFD34156000
|
trusted library allocation
|
page read and write
|
||
25E0072C000
|
trusted library allocation
|
page read and write
|
||
49FC000
|
trusted library allocation
|
page read and write
|
||
2A865EE0000
|
heap
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
2A865EE5000
|
heap
|
page read and write
|
||
7FFD342BE000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
2A865CB6000
|
heap
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
7FFD342F0000
|
trusted library allocation
|
page execute and read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
7FFD34370000
|
trusted library allocation
|
page read and write
|
||
4600000
|
heap
|
page read and write
|
||
25E6F2CD000
|
heap
|
page read and write
|
||
25E6F27D000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
31DB000
|
heap
|
page read and write
|
||
1BB811CD000
|
heap
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
1BB9A1B9000
|
heap
|
page read and write
|
||
25E6E064000
|
heap
|
page read and write
|
||
2A16000
|
heap
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
2A8665C6000
|
unkown
|
page readonly
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
1BB811B1000
|
heap
|
page read and write
|
||
2914F5000
|
stack
|
page read and write
|
||
7FFD3427A000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
AE1BBFE000
|
stack
|
page read and write
|
||
43F0000
|
heap
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
25E6F650000
|
heap
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
7FFD342AE000
|
trusted library allocation
|
page read and write
|
||
25E0083A000
|
trusted library allocation
|
page read and write
|
||
4431000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
29259400000
|
heap
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
140BF180000
|
heap
|
page read and write
|
||
AE1BCFE000
|
stack
|
page read and write
|
||
1D0D373C000
|
heap
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34220000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
D20CCFF000
|
stack
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
25E001C2000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
2A865CD2000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
7FFD34093000
|
trusted library allocation
|
page execute and read and write
|
||
1FE48A10000
|
heap
|
page read and write
|
||
1D0D3530000
|
heap
|
page execute and read and write
|
||
1AD00151000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
47DB000
|
trusted library allocation
|
page read and write
|
||
1FE48A80000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
5FE000
|
unkown
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
D20D47E000
|
stack
|
page read and write
|
||
6D70000
|
trusted library allocation
|
page read and write
|
||
4DF9000
|
trusted library allocation
|
page execute and read and write
|
||
D20EAEC000
|
stack
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
2A8D000
|
stack
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4E10000
|
trusted library allocation
|
page execute and read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
7FFD340B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34126000
|
trusted library allocation
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
25E6E9D0000
|
heap
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
6C30000
|
heap
|
page execute and read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
1FE49385000
|
trusted library allocation
|
page read and write
|
||
7FFD34233000
|
trusted library allocation
|
page read and write
|
||
4832000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
25E10013000
|
trusted library allocation
|
page read and write
|
||
47D6000
|
trusted library allocation
|
page read and write
|
||
7FFD34252000
|
trusted library allocation
|
page read and write
|
||
2C26000
|
heap
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
7FFD342A7000
|
trusted library allocation
|
page read and write
|
||
480E000
|
stack
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4BCB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD342E0000
|
trusted library allocation
|
page execute and read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
7033000
|
heap
|
page read and write
|
||
D20CFF5000
|
stack
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
1FE61A13000
|
unkown
|
page readonly
|
||
46FD000
|
trusted library allocation
|
page execute and read and write
|
||
D20CBFE000
|
stack
|
page read and write
|
||
2A866605000
|
unkown
|
page readonly
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
1FE61A15000
|
unkown
|
page readonly
|
||
298D000
|
heap
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
25E007B1000
|
trusted library allocation
|
page read and write
|
||
464C000
|
trusted library allocation
|
page execute and read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
1BB81810000
|
heap
|
page execute and read and write
|
||
4704000
|
trusted library allocation
|
page read and write
|
||
2A8665C4000
|
unkown
|
page readonly
|
||
25E00092000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
3233000
|
heap
|
page read and write
|
||
140D8393000
|
heap
|
page read and write
|
||
4D2D000
|
stack
|
page read and write
|
||
25E6E050000
|
heap
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
52DB6FF000
|
stack
|
page read and write
|
||
49F4000
|
trusted library allocation
|
page read and write
|
||
25E00834000
|
trusted library allocation
|
page read and write
|
||
7FFD340EC000
|
trusted library allocation
|
page execute and read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
2D0A000
|
heap
|
page read and write
|
||
BFB91FE000
|
stack
|
page read and write
|
||
1FE61B4C000
|
heap
|
page read and write
|
||
25E6F268000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
1BB9A206000
|
heap
|
page read and write
|
||
4722000
|
trusted library allocation
|
page read and write
|
||
1FE48CC0000
|
heap
|
page execute and read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34260000
|
trusted library allocation
|
page read and write
|
||
2F6A0FE000
|
stack
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
2BE8000
|
heap
|
page read and write
|
||
3525000
|
heap
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
2C77000
|
heap
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
9D67EFE000
|
stack
|
page read and write
|
||
7FFD342C0000
|
trusted library allocation
|
page read and write
|
||
2A866632000
|
unkown
|
page readonly
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
52DC0FE000
|
stack
|
page read and write
|
||
7FFD34266000
|
trusted library allocation
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4CA0000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4980000
|
trusted library allocation
|
page execute and read and write
|
||
2A865D76000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4A81000
|
trusted library allocation
|
page read and write
|
||
4814000
|
trusted library allocation
|
page read and write
|
||
1FE49373000
|
trusted library allocation
|
page read and write
|
||
7FFD34270000
|
trusted library allocation
|
page read and write
|
||
6F4E000
|
stack
|
page read and write
|
||
4C6E000
|
stack
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
722E000
|
stack
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
7FFD342B0000
|
trusted library allocation
|
page execute and read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
2A8667BF000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
1D0D3550000
|
heap
|
page execute and read and write
|
||
25E0005A000
|
trusted library allocation
|
page read and write
|
||
4E81000
|
trusted library allocation
|
page read and write
|
||
322B000
|
heap
|
page read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
7FFD340A3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34257000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
7FFD34240000
|
trusted library allocation
|
page read and write
|
||
4788000
|
trusted library allocation
|
page read and write
|
||
90E000
|
stack
|
page read and write
|
||
2A86664B000
|
unkown
|
page readonly
|
||
292596F0000
|
heap
|
page read and write
|
||
732E000
|
stack
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
7FFD34290000
|
trusted library allocation
|
page read and write
|
||
6C00000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
49F5000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
479D000
|
trusted library allocation
|
page read and write
|
||
2CD8000
|
heap
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
7FFD340A3000
|
trusted library allocation
|
page execute and read and write
|
||
72AE000
|
stack
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
2A8666CD000
|
trusted library allocation
|
page read and write
|
||
25E00726000
|
trusted library allocation
|
page read and write
|
||
1FE4898C000
|
unkown
|
page readonly
|
||
D20E3F7000
|
stack
|
page read and write
|
||
2A8667E5000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
2F45000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4570000
|
heap
|
page read and write
|
||
4969000
|
trusted library allocation
|
page execute and read and write
|
||
2A866025000
|
heap
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
43A0000
|
trusted library section
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
7FFD340A4000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
2C18000
|
heap
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
4670000
|
trusted library allocation
|
page read and write
|
||
D20E6E9000
|
stack
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
4873000
|
trusted library allocation
|
page read and write
|
||
7FFD3409B000
|
trusted library allocation
|
page execute and read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
25E004BA000
|
trusted library allocation
|
page read and write
|
||
7FFD34288000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
25E6EF5B000
|
heap
|
page read and write
|
||
1FE48E90000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
31F6000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
9D678FE000
|
stack
|
page read and write
|
||
43D0000
|
trusted library allocation
|
page read and write
|
||
2915FE000
|
stack
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
1AD0003F000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4750000
|
heap
|
page readonly
|
||
7FFD342A0000
|
trusted library allocation
|
page execute and read and write
|
||
1D0BAED2000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
2C18000
|
heap
|
page read and write
|
||
291DFE000
|
stack
|
page read and write
|
||
1AD7ACAD000
|
heap
|
page read and write
|
||
7FFD34260000
|
trusted library allocation
|
page read and write
|
||
25E6DF80000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
7FFD3426D000
|
trusted library allocation
|
page read and write
|
||
7FFD3409D000
|
trusted library allocation
|
page execute and read and write
|
||
25E00728000
|
trusted library allocation
|
page read and write
|
||
25E6DF50000
|
trusted library allocation
|
page read and write
|
||
7FFD34140000
|
trusted library allocation
|
page execute and read and write
|
||
4BC0000
|
trusted library allocation
|
page read and write
|
||
7FFD34073000
|
trusted library allocation
|
page execute and read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
6EFF000
|
stack
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
6AA0000
|
trusted library allocation
|
page read and write
|
||
6C7E000
|
stack
|
page read and write
|
||
1D0D34ED000
|
heap
|
page read and write
|
||
4D40000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
25E00063000
|
trusted library allocation
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
471C000
|
trusted library allocation
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
7FFD34360000
|
trusted library allocation
|
page read and write
|
||
1D0B9230000
|
trusted library allocation
|
page read and write
|
||
4370000
|
heap
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
1D0D3720000
|
heap
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
4D8E000
|
stack
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
25E003D6000
|
trusted library allocation
|
page read and write
|
||
70D0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
7FFD340AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34250000
|
trusted library allocation
|
page read and write
|
||
2E4F000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
25E6F2A7000
|
heap
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
1BB81375000
|
heap
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
2927FC000
|
stack
|
page read and write
|
||
4620000
|
trusted library allocation
|
page read and write
|
||
2917FE000
|
stack
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
25E0020A000
|
trusted library allocation
|
page read and write
|
||
25E007D9000
|
trusted library allocation
|
page read and write
|
||
25E00440000
|
trusted library allocation
|
page read and write
|
||
1BB9A208000
|
heap
|
page read and write
|
||
25E6EB90000
|
unkown
|
page readonly
|
||
2C24000
|
heap
|
page read and write
|
||
7FA58000
|
trusted library allocation
|
page execute and read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
AE1B9FE000
|
stack
|
page read and write
|
||
494E000
|
stack
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34275000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34146000
|
trusted library allocation
|
page read and write
|
||
D20DBE9000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
7FFD34090000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
25E000CA000
|
trusted library allocation
|
page read and write
|
||
140BFA10000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
1FE48C80000
|
trusted library allocation
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
1D0B8FF0000
|
unkown
|
page readonly
|
||
7FFD340A5000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4822000
|
trusted library allocation
|
page read and write
|
||
7FFD340CC000
|
trusted library allocation
|
page execute and read and write
|
||
25E6EDE2000
|
heap
|
page read and write
|
||
4713000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4DF0000
|
trusted library allocation
|
page read and write
|
||
7FFD342A0000
|
trusted library allocation
|
page read and write
|
||
1AD7AE50000
|
heap
|
page read and write
|
||
BFB8DFD000
|
stack
|
page read and write
|
||
7FFD342F0000
|
trusted library allocation
|
page read and write
|
||
1D0BAC20000
|
heap
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
30A5000
|
heap
|
page read and write
|
||
3588000
|
heap
|
page read and write
|
||
52DBCFE000
|
stack
|
page read and write
|
||
25E0018D000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
7FFD3409D000
|
trusted library allocation
|
page execute and read and write
|
||
4768000
|
trusted library allocation
|
page read and write
|
||
D20DDE9000
|
stack
|
page read and write
|
||
2924FE000
|
stack
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
478F000
|
trusted library allocation
|
page read and write
|
||
2A87EE0F000
|
heap
|
page read and write
|
||
140BF280000
|
heap
|
page read and write
|
||
7FFD34460000
|
trusted library allocation
|
page read and write
|
||
71B0000
|
trusted library allocation
|
page execute and read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
7FFD3429B000
|
trusted library allocation
|
page read and write
|
||
6AFE000
|
stack
|
page read and write
|
||
D20D5FD000
|
stack
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4D3E000
|
stack
|
page read and write
|
||
2A87669D000
|
trusted library allocation
|
page read and write
|
||
1FE61A69000
|
unkown
|
page readonly
|
||
25E000CE000
|
trusted library allocation
|
page read and write
|
||
140BF260000
|
heap
|
page read and write
|
||
52DBDFE000
|
stack
|
page read and write
|
||
2E8B000
|
stack
|
page read and write
|
||
7FFD34276000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
140D82FE000
|
heap
|
page read and write
|
||
25E000C5000
|
trusted library allocation
|
page read and write
|
||
4CC000
|
stack
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
1BB8185D000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
25E0082E000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
1D0B92A7000
|
heap
|
page read and write
|
||
140BFB60000
|
heap
|
page execute and read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34270000
|
trusted library allocation
|
page read and write
|
||
4E70000
|
heap
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
7FFD34176000
|
trusted library allocation
|
page execute and read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
52DB4F1000
|
stack
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4826000
|
trusted library allocation
|
page read and write
|
||
1AD7AC40000
|
heap
|
page read and write
|
||
6AA0000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
1AD0012F000
|
trusted library allocation
|
page read and write
|
||
4BA0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
7FFD34095000
|
trusted library allocation
|
page read and write
|
||
7FFD342A9000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
AE1BAFD000
|
stack
|
page read and write
|
||
2A86661C000
|
unkown
|
page readonly
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4BC7000
|
trusted library allocation
|
page execute and read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
1BB91831000
|
trusted library allocation
|
page read and write
|
||
7FFD34256000
|
trusted library allocation
|
page read and write
|
||
7FFD34282000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
7000000
|
heap
|
page read and write
|
||
1D0BACA0000
|
heap
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
6CFE000
|
stack
|
page read and write
|
||
3580000
|
heap
|
page read and write
|
||
7FFD340A0000
|
trusted library allocation
|
page read and write
|
||
2984000
|
heap
|
page read and write
|
||
7FFD34156000
|
trusted library allocation
|
page read and write
|
||
7FFD3412C000
|
trusted library allocation
|
page execute and read and write
|
||
2A866616000
|
unkown
|
page readonly
|
||
4E40000
|
trusted library allocation
|
page read and write
|
||
7FFD3407D000
|
trusted library allocation
|
page execute and read and write
|
||
4A7F000
|
trusted library allocation
|
page read and write
|
||
7FFD34074000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
25E6F311000
|
heap
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
25E6F260000
|
heap
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
472B000
|
trusted library allocation
|
page execute and read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
There are 2314 hidden memdumps, click here to show them.