Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Guidelines_for_Citizen_Safety.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
initial sample
|
||
C:\Config.Msi\6c6862.rbs
|
data
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\BouncyCastle.Crypto.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\System.ValueTuple.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI6A36.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI6A36.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI7013.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI7013.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI87B3.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI87B3.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI8A82.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSIA9F5.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSIA9F5.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\System32\InstallUtil.InstallLog
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\~DF9340E6CB357EA061.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF975FD2E2CDD5436E.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFB8E4C2B6BEE736E9.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFC5872F544B03548F.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFD5E723F7AA2005AD.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFE1D8FD4611557514.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallState
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation.zip
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.ini
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AteraAgent.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\Installer\6c6861.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\6c6863.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\MSI6A36.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSI6A36.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI6A36.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI6A36.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI7013.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSI7013.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI7013.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI7013.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI87B3.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSI87B3.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI87B3.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI87B3.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI8A93.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI8B30.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI8C79.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIA9F5.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSIA9F5.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIA9F5.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIA9F5.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SourceHash{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1A374813EDB1A6631387E414D3E73232
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
|
data
|
modified
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BA74182F76F15A9CF514DEF352303C95
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
Certificate, Version=3
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
|
Certificate, Version=3
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1A374813EDB1A6631387E414D3E73232
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BA74182F76F15A9CF514DEF352303C95
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageAgentInformation.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\Temp\~DF42B9C6EAEAA644A5.TMP
|
data
|
modified
|
||
C:\Windows\Temp\~DF575961BC4E9CA65E.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF6A1563904250F70E.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF758395496BA8A518.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFA23B2DCAA65163F4.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFE81B0F49C0EE8808.TMP
|
data
|
dropped
|
||
\Device\ConDrv
|
JSON data
|
dropped
|
There are 75 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI6A36.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7105375 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI7013.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7106625 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI87B3.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7112656 11 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="paul.fraxom@yzistanbul.me" /CompanyId="1"
/IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000Kso2pIAB" /AgentId="2094f497-2e94-42f0-b27c-add7e377a9d2"
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSIA9F5.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7121500 33 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
2094f497-2e94-42f0-b27c-add7e377a9d2 "6be74508-e40c-4e94-a6e8-129eac28e456" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000Kso2pIAB
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
2094f497-2e94-42f0-b27c-add7e377a9d2 "76e20853-e7dd-41ac-a560-28cfe22d3466" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000Kso2pIAB
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
2094f497-2e94-42f0-b27c-add7e377a9d2 "209f7be2-df48-4eff-a817-c4dc20cdcd81" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000Kso2pIAB
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Guidelines_for_Citizen_Safety.msi"
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding DA0792725E6113A4C2EFC78428B5F22F
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding F2302B5C45E6CFD0540EEC21654A91D9 E Global\MSI0000
|
||
C:\Windows\SysWOW64\net.exe
|
"NET" STOP AteraAgent
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\net1.exe
|
C:\Windows\system32\net1 STOP AteraAgent
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"TaskKill.exe" /f /im AteraAgent.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
"C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 13 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://ps.atera.com/agentpackagesmac/AgentPackageWindowsUpdate/24.6/AgentPackageWindowsUpdate.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=3a79d35f-3aae-426f-91c8-7d16143c1d7a&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
|
13.232.67.198
|
||
https://agent-api.atera.com/Production/Agent/GetRecurringPackagesckNTIALBACKOFF02ceca8-a958-11e5-bd8
|
unknown
|
||
http://schemas.datacontract.org
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/2094f497-2e94-42f0-b27c-add7e377a9d2/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=c6f3c309-b378-4eb6-be20-6f03325c221f&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
|
13.232.67.198
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageMarketplace/1.6/AgentPackageMarketplace.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=2a252f8a-196a-412e-bfc9-292322230586&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
|
13.232.67.198
|
||
https://agent-api.atera.com/Production/Agent/GetCommands)
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/track-event
|
unknown
|
||
http://dl.google.com/googletalk/googletalk-setup.exe
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageADRemote/6.0/AgentPackageADRemote.zip
|
unknown
|
||
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageA0H
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/2094f497-2e94-42f0-b27c-add7e377a9d2/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=618f72e2-0dcf-4d40-b59c-d773fc1ae2ba&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
|
13.232.67.198
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=21b072dc-59f8-4574-823e-a233b13880ce&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/2094f497
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/2094f497-2e94-42f0-b27c-add7e377a9d2/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=f5557641-16d5-42d0-befc-2c3fa49ec144&tt=0&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/presence/sub_key/subX
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/2094f497-2e94-42f0-b27c-add7e377a9d2/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=ec94d306-e989-460d-a2a2-e676241f4153&tr=31&tt=17324433440942418&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
|
13.232.67.198
|
||
https://agent-api.atera.com/Production/Agent/
|
unknown
|
||
http://schemas.datacontract.org/2004/07/System.ServiceProcess
|
unknown
|
||
http://wixtoolset.org
|
unknown
|
||
https://agent-api.atera.com/Production
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/2094f497-2e94-42f0-b27c-add7e377a9d2/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=5b5ff814-67d7-4f31-988a-3021f6dcca17&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
|
13.232.67.198
|
||
https://agent-api.aterDZ
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/2094f497-2e94-42f0-b27c-add7e377a9d2/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=78d657fe-250a-4458-990e-8db1804a62a6&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/20
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageRuntimeInstaller/13.0/AgentPackageRuntimeInstaller
|
unknown
|
||
http://acontrol.atera.com/
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/2094f497-2e94-42f0-b27c-add7e377a9d2/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=5c21410a-40ef-453f-8c5e-f80e3c3a9e9b&tr=31&tt=17324434351531129&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
|
13.232.67.198
|
||
https://agent-api.atera.com/Production/Agent/AgentStarting)
|
unknown
|
||
https://ps.pndsn.com
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageADRemote/6.0/AgentPackageADRemote.zip
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/2094
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/2094f497-2e94-42f0-b27c
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageNetworkDiscovery/23.9/AgentPackageNetworkDiscove
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=7cbe7b17-7f3f-4c8d-9d62-c19102ed6fde&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
|
13.232.67.198
|
||
http://agent-api.atera.com
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageSystemTools/27.8/AgentPackageSystemTools.zip
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/2094f497-2e94-42f0-b27c-add7e377a9d2/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=9cb19796-6c2e-41ce-9126-598ecc9d33d5&tt=0&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
|
13.232.67.198
|
||
http://schemas.datacontract.org/2004/07/
|
unknown
|
||
https://github.com/icsharpcode/SharpZipLib
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageNetworkDiscovery/15.0/AgentPackageNetworkDiscovery
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=2a252f8a-196a-412e-bfc9-292322230586
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=19414362-703b-464a-b6c7-07f45d92c533&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
|
13.232.67.198
|
||
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageAgentI
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=19414362-703b-464a-b6c7-07f45d92c533
|
unknown
|
||
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/AcknowledgeCommands0H
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageTaskScheduler/17.2/AgentPackageTaskScheduler.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageTicketing/30.1/AgentPackageTicketing.zip
|
unknown
|
||
https://agent-api.atera.com
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=03f53b61-ad6b-486d-8509-b0e195faf765&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
|
13.232.67.198
|
||
https://agent-api.atera.com/Production/Agent/AgentStarting
|
unknown
|
||
http://www.w3.oh
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetCommands
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=b3f74bb1-6c6f-4d46-bcd1-dababeae95b1
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=2bb33ca5-3446-47a7-8747-dbbe274b3fa8
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/2094f497-2e94-42f0-b27c-add7e377a9d2/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=101aac48-536c-4c37-8daf-2942910eb004&tt=0&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
|
13.232.67.198
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=2bb33ca5-3446-47a7-8747-dbbe274b3fa8&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
|
13.232.67.198
|
||
https://agent-api.atera.com/
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetRecurringPackages
|
unknown
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.Availability/13.0/Agent.Package.Availability.zip
|
unknown
|
||
https://www.newtonsoft.com/jsonschema
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-1p
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=bf4acf61-3ccb-481c-8428-f2b8078e60c9&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
|
13.232.67.198
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageRuntimeInstaller/1.5/AgentPackageRuntimeInstaller.
|
unknown
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.Watchdog/13.0/Agent.Package.Watchdog.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=b619f5c8-c13b-4e86-88e3-ba75e0e2aa5f
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=03f53b61-ad6b-486d-8509-b0e195faf765
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageAgentInformation/38.0/AgentPackageAgentInformation.zip?7eC/6UeVMT2yOja7rugNNkxRTCpJ1tREDX7f6JkZ3OlpG2NJMgnOjIB/dqEJPBcv
|
108.158.75.93
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.Availability/0.16/Agent.Package.Availability.z
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=b3f74bb1-6c6f-4d46-bcd1-dababeae95b1&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/2094f497-2e94-42f0-b27c-add7e377a9d2/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=b225017a-a518-407e-ba60-89916d0db242&tt=0&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/2094f497-2e94-42f0-b27c-add7e377a9d2/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=ebb1f16f-c11d-4880-8816-8b8ea69a0ee1&tr=31&tt=17324434182234301&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
|
13.232.67.198
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageHeartbeat/17.14/AgentPackageHeartbeat.zip0H
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageUpgradeAgent/27.6/AgentPackageUpgradeAgent.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/2094f497-2e94-42f0-b27c-add7e377a9d2/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=b22252c6-c37c-49ec-8023-03bf78fe353a&tr=31&tt=17324434035400814&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
|
13.232.67.198
|
||
https://www.newtonsoft.com/json
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/Age
|
unknown
|
||
http://wixtoolset.org/news/
|
unknown
|
||
https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=21b072dc-59f8-4574-823e-a233b13880ce
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageAgentInformation/22.7/AgentPackageAgentInformation
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageOsUpdates/20.9/AgentPackageOsUpdates.zip
|
unknown
|
||
https://agent-api.aterD
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageNetworkDiscovery/13.0/AgentPackageNetworkDiscovery
|
unknown
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.IotPoc/13.0/Agent.Package.IotPoc.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=9d2bb483-a1d5-41c5-b567-c3f48ab6ed2c
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/AcknowledgeCommands
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageTaskScheduler/13.0/AgentPackageTaskScheduler.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageAgentInformation/38.0/AgentPackageAgentInformation
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/2094f497-2e94-42f0-b27c-add7e377a9d2/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=28392dc4-8934-4e46-983c-9a044d541e87&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
|
13.232.67.198
|
||
https://agent-api.P
|
unknown
|
||
http://www.w3.o
|
unknown
|
||
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageA
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ps.pndsn.com
|
13.232.67.198
|
||
bg.microsoft.map.fastly.net
|
199.232.210.172
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
d25btwd9wax8gu.cloudfront.net
|
108.158.75.93
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
||
windowsupdatebg.s.llnwi.net
|
178.79.238.0
|
||
ps.atera.com
|
unknown
|
||
agent-api.atera.com
|
unknown
|
||
time.windows.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
108.158.75.93
|
d25btwd9wax8gu.cloudfront.net
|
United States
|
||
13.232.67.198
|
ps.pndsn.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\6c6862.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\6c6862.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB9EFD7FDAF9AD115987000E181661F5
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CD868C8CE5A308147ABB306D829266BC
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C32B8CE0327C1E141950B4C9C2AD4DA7
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D9B1B1F0B1FC024D9390FE4B94D97D5
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\007F59F54ACD08842B2D98A10E6D1E3A
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB25C26F7C51D3C4AA2BED5600F46956
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01010F83113E72A4C81AD77422D2F947
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01D9DC4B27DFC0340B543A11D3CEBE07
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\ATERA Networks\AteraAgent\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\ATERA Networks\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\7D0A237E2F2A7564CA141B792446E854
|
INSTALLFOLDER_files_Feature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Features
|
INSTALLFOLDER_files_Feature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
|
LastUsedSource
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
|
AutoBackupLogFiles
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AteraAgent
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
AccountId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
IntegratorLogin
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
CompanyId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
AgentId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
ServerName
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AlphaAgent
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
FileDirectory
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
FileDirectory
|
There are 135 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4726000
|
heap
|
page read and write
|
||
18896E70000
|
heap
|
page read and write
|
||
7FFB23AF0000
|
unkown
|
page read and write
|
||
2AC4FE22000
|
unkown
|
page readonly
|
||
188970C0000
|
heap
|
page read and write
|
||
188979FA000
|
trusted library allocation
|
page read and write
|
||
1588008C000
|
trusted library allocation
|
page read and write
|
||
2C453663000
|
trusted library allocation
|
page read and write
|
||
18896E78000
|
heap
|
page read and write
|
||
20EC378B000
|
heap
|
page read and write
|
||
188AFF9F000
|
heap
|
page read and write
|
||
18897FD3000
|
trusted library allocation
|
page read and write
|
||
158EC7A2000
|
unkown
|
page readonly
|
||
20EC40C3000
|
trusted library allocation
|
page read and write
|
||
20EC410F000
|
trusted library allocation
|
page read and write
|
||
2C452CC9000
|
heap
|
page read and write
|
||
2AC4FF4C000
|
heap
|
page read and write
|
||
7FFAAB4E4000
|
trusted library allocation
|
page read and write
|
||
15880135000
|
trusted library allocation
|
page read and write
|
||
188979BC000
|
trusted library allocation
|
page read and write
|
||
20EC3800000
|
heap
|
page read and write
|
||
158EF00F000
|
heap
|
page read and write
|
||
47E1000
|
trusted library allocation
|
page read and write
|
||
49D8000
|
heap
|
page read and write
|
||
20EC4051000
|
trusted library allocation
|
page read and write
|
||
2AC50642000
|
unkown
|
page readonly
|
||
2C453673000
|
trusted library allocation
|
page read and write
|
||
20EC40D3000
|
trusted library allocation
|
page read and write
|
||
18897F00000
|
trusted library allocation
|
page read and write
|
||
2AC50120000
|
heap
|
page read and write
|
||
188978D7000
|
trusted library allocation
|
page read and write
|
||
7FFB23AF0000
|
unkown
|
page read and write
|
||
44B9000
|
heap
|
page read and write
|
||
4119000
|
heap
|
page read and write
|
||
4BF4000
|
trusted library allocation
|
page read and write
|
||
158800B2000
|
trusted library allocation
|
page read and write
|
||
2C452D01000
|
heap
|
page read and write
|
||
2C4536AF000
|
trusted library allocation
|
page read and write
|
||
18897B47000
|
trusted library allocation
|
page read and write
|
||
4B51000
|
trusted library allocation
|
page read and write
|
||
2AC50701000
|
trusted library allocation
|
page read and write
|
||
20EC39E0000
|
heap
|
page read and write
|
||
15880089000
|
trusted library allocation
|
page read and write
|
||
158EC911000
|
heap
|
page read and write
|
||
20EC37AB000
|
heap
|
page read and write
|
||
188B003D000
|
heap
|
page read and write
|
||
2C4535F1000
|
trusted library allocation
|
page read and write
|
||
158EC97D000
|
heap
|
page read and write
|
||
15880166000
|
trusted library allocation
|
page read and write
|
||
1588017C000
|
trusted library allocation
|
page read and write
|
||
158800C9000
|
trusted library allocation
|
page read and write
|
||
20EC3770000
|
heap
|
page read and write
|
||
15880001000
|
trusted library allocation
|
page read and write
|
||
2C452CC0000
|
heap
|
page read and write
|
||
18896E20000
|
heap
|
page read and write
|
||
158EC8F4000
|
heap
|
page read and write
|
||
158ECC70000
|
heap
|
page read and write
|
||
2C453637000
|
trusted library allocation
|
page read and write
|
||
7FFB23AF0000
|
unkown
|
page read and write
|
||
7FFB23AF0000
|
unkown
|
page read and write
|
||
15880132000
|
trusted library allocation
|
page read and write
|
||
2AC50783000
|
trusted library allocation
|
page read and write
|
||
1889776E000
|
trusted library allocation
|
page read and write
|
||
4887000
|
trusted library allocation
|
page read and write
|
||
4329CF5000
|
stack
|
page read and write
|
||
2AC4FF00000
|
heap
|
page read and write
|
||
158EED07000
|
heap
|
page read and write
|
||
20EC37B3000
|
heap
|
page read and write
|
||
158EEC90000
|
heap
|
page read and write
|
||
18897944000
|
trusted library allocation
|
page read and write
|
||
2AC4FF09000
|
heap
|
page read and write
|
||
18897B33000
|
trusted library allocation
|
page read and write
|
||
18896EF4000
|
heap
|
page read and write
|
||
18896EAD000
|
heap
|
page read and write
|
||
7FFB23AF0000
|
unkown
|
page read and write
|
||
2C46BD60000
|
heap
|
page read and write
|
||
158ECB50000
|
heap
|
page read and write
|
||
158800BA000
|
trusted library allocation
|
page read and write
|
||
20EC4097000
|
trusted library allocation
|
page read and write
|
||
2C452D4A000
|
heap
|
page read and write
|
||
2C452F10000
|
heap
|
page read and write
|
||
158800B4000
|
trusted library allocation
|
page read and write
|
||
18897701000
|
trusted library allocation
|
page read and write
|
||
188B0344000
|
heap
|
page read and write
|
||
18897806000
|
trusted library allocation
|
page read and write
|
||
2C452CFD000
|
heap
|
page read and write
|
||
2AC4FEC0000
|
heap
|
page read and write
|
||
158EED7B000
|
heap
|
page read and write
|
||
158EC8D0000
|
heap
|
page read and write
|
||
188979E8000
|
trusted library allocation
|
page read and write
|
||
2AC50773000
|
trusted library allocation
|
page read and write
|
||
284B000
|
stack
|
page read and write
|
||
6BC0000
|
remote allocation
|
page read and write
|
||
46FC000
|
trusted library allocation
|
page execute and read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
7FFAAB350000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B60000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
188AFF8C000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
7FFAAB506000
|
trusted library allocation
|
page read and write
|
||
6F20000
|
trusted library allocation
|
page read and write
|
||
49D0000
|
heap
|
page read and write
|
||
7FFAAB4E0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB540000
|
trusted library allocation
|
page execute and read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
4770000
|
trusted library allocation
|
page read and write
|
||
2DE4000
|
heap
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
432A0FD000
|
stack
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
E1D8AFE000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
432A8FD000
|
stack
|
page read and write
|
||
48A5000
|
trusted library allocation
|
page read and write
|
||
2AC50855000
|
trusted library allocation
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
7FFAAB35D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB520000
|
trusted library allocation
|
page read and write
|
||
43F0CFE000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
2AC69034000
|
heap
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
20EDC903000
|
heap
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
7FFAAB650000
|
trusted library allocation
|
page read and write
|
||
67EE000
|
stack
|
page read and write
|
||
2AC500F0000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
2C452CE6000
|
heap
|
page read and write
|
||
47D0000
|
heap
|
page read and write
|
||
7FFAAB580000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
432A3FE000
|
stack
|
page read and write
|
||
432B7E7000
|
stack
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
158EEFFD000
|
heap
|
page read and write
|
||
20EC4040000
|
heap
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
188970B0000
|
trusted library allocation
|
page read and write
|
||
2AC68F7C000
|
unkown
|
page readonly
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
4320000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4E6000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
18897FAA000
|
trusted library allocation
|
page read and write
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
188977D4000
|
trusted library allocation
|
page read and write
|
||
9DD000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
2AC5082F000
|
trusted library allocation
|
page read and write
|
||
43EE000
|
stack
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
7FFAAB35D000
|
trusted library allocation
|
page execute and read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
7FFAAB34D000
|
trusted library allocation
|
page execute and read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
41C9DFE000
|
stack
|
page read and write
|
||
1889778C000
|
trusted library allocation
|
page read and write
|
||
6B2C000
|
trusted library allocation
|
page read and write
|
||
7FFAAB590000
|
trusted library allocation
|
page read and write
|
||
158EEFE4000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4FD000
|
trusted library allocation
|
page read and write
|
||
4926000
|
heap
|
page read and write
|
||
188977EC000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
188977CC000
|
trusted library allocation
|
page read and write
|
||
1A1142E8000
|
heap
|
page read and write
|
||
158EE5C0000
|
heap
|
page execute and read and write
|
||
7FFAAB4FE000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
457F000
|
stack
|
page read and write
|
||
2F0C000
|
heap
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
46F3000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
483D000
|
trusted library allocation
|
page read and write
|
||
18896EAF000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
487E000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
432AFFC000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
48B4000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
41F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB570000
|
trusted library allocation
|
page read and write
|
||
7FFAAB406000
|
trusted library allocation
|
page execute and read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
18896EB7000
|
heap
|
page read and write
|
||
C48000
|
heap
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
7FFAAB363000
|
trusted library allocation
|
page read and write
|
||
7EED0000
|
trusted library allocation
|
page execute and read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
4710000
|
trusted library allocation
|
page execute and read and write
|
||
709E000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
1889789F000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
2C452CA0000
|
heap
|
page read and write
|
||
432A5E9000
|
stack
|
page read and write
|
||
158EE5B0000
|
heap
|
page execute and read and write
|
||
4AE0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
504E000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
43F06FB000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
158EC850000
|
heap
|
page read and write
|
||
4700000
|
trusted library allocation
|
page read and write
|
||
3165000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
2C46BDF2000
|
heap
|
page read and write
|
||
2E80000
|
trusted library allocation
|
page read and write
|
||
2AC4FE4C000
|
unkown
|
page readonly
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
432ADE7000
|
stack
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
7FFAAB509000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4588000
|
trusted library allocation
|
page read and write
|
||
15880178000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
2E58000
|
heap
|
page read and write
|
||
7FFAAB4E0000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
2C45362D000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
18897040000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
18897FBD000
|
trusted library allocation
|
page read and write
|
||
70A0000
|
heap
|
page read and write
|
||
4610000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
4329E37000
|
stack
|
page read and write
|
||
18897580000
|
heap
|
page execute and read and write
|
||
7FFAAB353000
|
trusted library allocation
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
20EC3700000
|
heap
|
page read and write
|
||
1889776A000
|
trusted library allocation
|
page read and write
|
||
6D1E000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
3162000
|
heap
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
43F05FE000
|
stack
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
46DE000
|
stack
|
page read and write
|
||
7FFAAB344000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB36D000
|
trusted library allocation
|
page execute and read and write
|
||
18897F57000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
20EC408B000
|
trusted library allocation
|
page read and write
|
||
188977DC000
|
trusted library allocation
|
page read and write
|
||
6B44000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4E0000
|
trusted library allocation
|
page read and write
|
||
44BB000
|
trusted library allocation
|
page execute and read and write
|
||
2CF5000
|
heap
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6B23000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
2EEA000
|
heap
|
page read and write
|
||
7FFAAB33D000
|
trusted library allocation
|
page execute and read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
43F15FE000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
432C5FE000
|
stack
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
2D60000
|
trusted library allocation
|
page read and write
|
||
CB0CCFE000
|
stack
|
page read and write
|
||
2FB2000
|
heap
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
7FFAAB503000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
2C4635FD000
|
trusted library allocation
|
page read and write
|
||
188976A0000
|
heap
|
page execute and read and write
|
||
7FFAAB32D000
|
trusted library allocation
|
page execute and read and write
|
||
6B21000
|
trusted library allocation
|
page read and write
|
||
188A770E000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
4828000
|
trusted library allocation
|
page read and write
|
||
18897F53000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
495E000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
158EC860000
|
heap
|
page read and write
|
||
2F22000
|
heap
|
page read and write
|
||
4329FFF000
|
stack
|
page read and write
|
||
41C95FF000
|
stack
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
7FFAAB320000
|
trusted library allocation
|
page read and write
|
||
43F16FB000
|
stack
|
page read and write
|
||
158EEFC6000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
2CD000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
188979B6000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
158EEFD8000
|
heap
|
page read and write
|
||
7FFAAB324000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
158ECAE0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3FC000
|
trusted library allocation
|
page execute and read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
7FFAAB370000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
188A7701000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
2D63000
|
trusted library allocation
|
page execute and read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4770000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
188977A1000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
188978D3000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
4AB000
|
stack
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
7AF000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B60000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
188A7713000
|
trusted library allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6D50000
|
trusted library allocation
|
page execute and read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4BE6000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
188B03A6000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
18896E95000
|
heap
|
page read and write
|
||
20EDC8F2000
|
heap
|
page read and write
|
||
20EC3796000
|
heap
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
432B9FF000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
188B0852000
|
heap
|
page read and write
|
||
43F04FE000
|
stack
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
2BB433D000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
48C6000
|
trusted library allocation
|
page read and write
|
||
4BD8000
|
heap
|
page read and write
|
||
7FFAAB34D000
|
trusted library allocation
|
page execute and read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
2C452D47000
|
heap
|
page read and write
|
||
18896E50000
|
heap
|
page read and write
|
||
188977E0000
|
trusted library allocation
|
page read and write
|
||
41C9AFE000
|
stack
|
page read and write
|
||
188B03E4000
|
heap
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
414A000
|
heap
|
page read and write
|
||
48C2000
|
trusted library allocation
|
page read and write
|
||
67AE000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
46F9000
|
trusted library allocation
|
page execute and read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4FC000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4F3000
|
trusted library allocation
|
page read and write
|
||
7FFAAB610000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
41C94FE000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
7FFAAB34D000
|
trusted library allocation
|
page execute and read and write
|
||
76C000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7450000
|
heap
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
27FE000
|
stack
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB354000
|
trusted library allocation
|
page read and write
|
||
20EDC893000
|
heap
|
page read and write
|
||
14B000
|
stack
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
29BF000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
18897FEC000
|
trusted library allocation
|
page read and write
|
||
45E0000
|
heap
|
page read and write
|
||
18897ED0000
|
trusted library allocation
|
page read and write
|
||
2EC5000
|
trusted library allocation
|
page execute and read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
490E000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
trusted library allocation
|
page read and write
|
||
4760000
|
trusted library allocation
|
page read and write
|
||
6B60000
|
trusted library allocation
|
page read and write
|
||
7FFAAB5B0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
2910000
|
heap
|
page read and write
|
||
703000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
2C45362B000
|
trusted library allocation
|
page read and write
|
||
6F5D000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
73C0000
|
remote allocation
|
page read and write
|
||
7FFAAB3F6000
|
trusted library allocation
|
page read and write
|
||
20EC408F000
|
trusted library allocation
|
page read and write
|
||
7FFAAB730000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3E0000
|
trusted library allocation
|
page read and write
|
||
188977D8000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
479C000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB505000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6F20000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
7FFAAB559000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
4330000
|
trusted library allocation
|
page execute and read and write
|
||
41C97FD000
|
stack
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
46F6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB4F0000
|
trusted library allocation
|
page read and write
|
||
4795000
|
trusted library allocation
|
page read and write
|
||
158ECC75000
|
heap
|
page read and write
|
||
44EA000
|
heap
|
page read and write
|
||
7FFAAB660000
|
trusted library allocation
|
page read and write
|
||
E1D8CFE000
|
stack
|
page read and write
|
||
2BB477E000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4AA3000
|
trusted library allocation
|
page read and write
|
||
7FFAAB470000
|
trusted library allocation
|
page execute and read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
158EED49000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
20EDC870000
|
heap
|
page read and write
|
||
18896ECD000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
2F24000
|
heap
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
43F08FE000
|
stack
|
page read and write
|
||
4B40000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB560000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
41C9181000
|
stack
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
7FFAAB530000
|
trusted library allocation
|
page read and write
|
||
CB0C9FE000
|
stack
|
page read and write
|
||
7FFAAB333000
|
trusted library allocation
|
page execute and read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
188B041A000
|
heap
|
page read and write
|
||
6B31000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
1A114100000
|
heap
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
2C452D45000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3F0000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6B60000
|
trusted library allocation
|
page read and write
|
||
188B03B3000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
2F1E000
|
stack
|
page read and write
|
||
60E000
|
stack
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
7FF430210000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB342000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
311E000
|
unkown
|
page read and write
|
||
2C46BE0F000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
4720000
|
heap
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
1889778F000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
18896E30000
|
heap
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
188978C3000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6F20000
|
trusted library allocation
|
page read and write
|
||
2C452D07000
|
heap
|
page read and write
|
||
432B3E9000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
432B8F7000
|
stack
|
page read and write
|
||
73D0D000
|
unkown
|
page read and write
|
||
20EC37CB000
|
heap
|
page read and write
|
||
4B15000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
717E000
|
stack
|
page read and write
|
||
43299CF000
|
stack
|
page read and write
|
||
733E000
|
stack
|
page read and write
|
||
3144000
|
heap
|
page read and write
|
||
2C453741000
|
trusted library allocation
|
page read and write
|
||
6F10000
|
trusted library allocation
|
page execute and read and write
|
||
1A114200000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
20EC37B7000
|
heap
|
page read and write
|
||
158EED1F000
|
heap
|
page read and write
|
||
4A2E000
|
stack
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB570000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
CB0C3FE000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
41EC000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
2AC68ED0000
|
unkown
|
page readonly
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB5A0000
|
trusted library allocation
|
page execute and read and write
|
||
188977FC000
|
trusted library allocation
|
page read and write
|
||
18897A33000
|
trusted library allocation
|
page read and write
|
||
43F12FD000
|
stack
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
705E000
|
stack
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
2D51000
|
heap
|
page read and write
|
||
6F20000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
7F298000
|
trusted library allocation
|
page execute and read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
2AC4FF03000
|
heap
|
page read and write
|
||
7FFAAB520000
|
trusted library allocation
|
page read and write
|
||
7FFAAB500000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
73CF1000
|
unkown
|
page execute read
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
D0C000
|
stack
|
page read and write
|
||
73CF0000
|
unkown
|
page readonly
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
CB0C5FE000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
20EDC872000
|
heap
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
426D000
|
stack
|
page read and write
|
||
682E000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4FCE000
|
stack
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
73D0F000
|
unkown
|
page readonly
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
7477000
|
heap
|
page read and write
|
||
6F04000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EF1000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3DC000
|
trusted library allocation
|
page execute and read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
188977E8000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
158EE530000
|
heap
|
page execute and read and write
|
||
432A4FE000
|
stack
|
page read and write
|
||
44B5000
|
trusted library allocation
|
page execute and read and write
|
||
680000
|
heap
|
page read and write
|
||
18897600000
|
heap
|
page execute and read and write
|
||
7FFAAB374000
|
trusted library allocation
|
page read and write
|
||
316C000
|
heap
|
page read and write
|
||
2C46BD96000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
7FFAAB37B000
|
trusted library allocation
|
page execute and read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
2C452D1D000
|
heap
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
heap
|
page execute and read and write
|
||
2E40000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
479B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB3F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB4FA000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
70CD000
|
heap
|
page read and write
|
||
59E1000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
18897AF7000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
73C0000
|
remote allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
743E000
|
stack
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
20EDC907000
|
heap
|
page read and write
|
||
4A7E000
|
stack
|
page read and write
|
||
188B0782000
|
heap
|
page read and write
|
||
7FFAAB35D000
|
trusted library allocation
|
page execute and read and write
|
||
432AEFF000
|
stack
|
page read and write
|
||
7FFAAB5C0000
|
trusted library allocation
|
page read and write
|
||
432B5F4000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
188B0740000
|
unkown
|
page readonly
|
||
1589000F000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6D60000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
72E000
|
stack
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB330000
|
trusted library allocation
|
page read and write
|
||
158EC915000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
4BE3000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
7FFAAB5F0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
158ECB90000
|
heap
|
page read and write
|
||
7FFAAB550000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
2AC500D0000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
158EED43000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
43F17FA000
|
stack
|
page read and write
|
||
7FFAAB3E0000
|
trusted library allocation
|
page execute and read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
24D000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
7F600000
|
trusted library allocation
|
page execute and read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
18897F89000
|
trusted library allocation
|
page read and write
|
||
43F0BFE000
|
stack
|
page read and write
|
||
188978BF000
|
trusted library allocation
|
page read and write
|
||
239E000
|
stack
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
188B04E7000
|
heap
|
page read and write
|
||
7FFAAB540000
|
trusted library allocation
|
page read and write
|
||
5B51000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
7FFAAB350000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
18897766000
|
trusted library allocation
|
page read and write
|
||
7FFAAB590000
|
trusted library allocation
|
page execute and read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB530000
|
trusted library allocation
|
page read and write
|
||
7FFAAB569000
|
trusted library allocation
|
page read and write
|
||
4C36000
|
trusted library allocation
|
page read and write
|
||
7FFAAB50E000
|
trusted library allocation
|
page read and write
|
||
7FFAAB400000
|
trusted library allocation
|
page read and write
|
||
7FFAAB620000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3F6000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
E1D83FE000
|
stack
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
20ED405D000
|
trusted library allocation
|
page read and write
|
||
E1D8EFE000
|
stack
|
page read and write
|
||
6F7E000
|
stack
|
page read and write
|
||
4A09000
|
heap
|
page read and write
|
||
6F9E000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
20EC39E5000
|
heap
|
page read and write
|
||
508F000
|
stack
|
page read and write
|
||
4340000
|
trusted library allocation
|
page read and write
|
||
4757000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
49BE000
|
stack
|
page read and write
|
||
7FFAAB520000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4AA6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB400000
|
trusted library allocation
|
page execute and read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
73FE000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
57E1000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB5A0000
|
trusted library allocation
|
page execute and read and write
|
||
4A90000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
188977A3000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
43F11FC000
|
stack
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
2EA0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB5A0000
|
trusted library allocation
|
page execute and read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
trusted library allocation
|
page read and write
|
||
2AC6900B000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
2AC4FE20000
|
unkown
|
page readonly
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
188B0742000
|
unkown
|
page readonly
|
||
432C0FD000
|
stack
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6CDF000
|
stack
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
432B6FE000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4210000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
188977E4000
|
trusted library allocation
|
page read and write
|
||
707E000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
158EED76000
|
heap
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page execute and read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
188B0516000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
5B55000
|
trusted library allocation
|
page read and write
|
||
20EDC919000
|
heap
|
page read and write
|
||
20ED4051000
|
trusted library allocation
|
page read and write
|
||
432BAFA000
|
stack
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
2AC4FEEA000
|
heap
|
page read and write
|
||
6EE4000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
47FE000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4C32000
|
trusted library allocation
|
page read and write
|
||
7FFAAB36B000
|
trusted library allocation
|
page execute and read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
4960000
|
trusted library allocation
|
page read and write
|
||
2AC4FF05000
|
heap
|
page read and write
|
||
7FFAAB4D0000
|
trusted library allocation
|
page read and write
|
||
432BFFC000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4E3000
|
trusted library allocation
|
page read and write
|
||
188AF730000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4D0000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
CCC000
|
stack
|
page read and write
|
||
4319000
|
trusted library allocation
|
page execute and read and write
|
||
4B19000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
158EC91F000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
2EC2000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
2AC502F0000
|
heap
|
page read and write
|
||
2C453745000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
2C46BDED000
|
heap
|
page read and write
|
||
45DC000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
4010000
|
heap
|
page read and write
|
||
4B15000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
15880172000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
188979A2000
|
trusted library allocation
|
page read and write
|
||
20EC3940000
|
trusted library allocation
|
page read and write
|
||
2DDE000
|
unkown
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
7FFAAB580000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
3FF0000
|
trusted library allocation
|
page read and write
|
||
20EC3960000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
4300000
|
trusted library allocation
|
page read and write
|
||
7FFAAB510000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
7FFAAB352000
|
trusted library allocation
|
page read and write
|
||
2D4E000
|
heap
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
3FB0000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
18897A35000
|
trusted library allocation
|
page read and write
|
||
6EEE000
|
trusted library allocation
|
page read and write
|
||
20EC3B45000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
2D0D000
|
stack
|
page read and write
|
||
7FFAAB333000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
41C9CFE000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
43F0FFE000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
18897F55000
|
trusted library allocation
|
page read and write
|
||
158EEFEB000
|
heap
|
page read and write
|
||
2C453000000
|
trusted library allocation
|
page read and write
|
||
432C4FE000
|
stack
|
page read and write
|
||
2DD8000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFAAB720000
|
trusted library allocation
|
page read and write
|
||
2AC60711000
|
trusted library allocation
|
page read and write
|
||
43F07FE000
|
stack
|
page read and write
|
||
6F20000
|
trusted library allocation
|
page read and write
|
||
414E000
|
stack
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
7EEE8000
|
trusted library allocation
|
page execute and read and write
|
||
2AC506F0000
|
heap
|
page execute and read and write
|
||
4310000
|
trusted library allocation
|
page read and write
|
||
73D06000
|
unkown
|
page readonly
|
||
2AC502E0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
2AC505F0000
|
heap
|
page read and write
|
||
432C8FE000
|
stack
|
page read and write
|
||
188B084F000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
18897F59000
|
trusted library allocation
|
page read and write
|
||
3156000
|
heap
|
page read and write
|
||
7FFAAB360000
|
trusted library allocation
|
page read and write
|
||
73C0000
|
remote allocation
|
page read and write
|
||
7FFAAB580000
|
trusted library allocation
|
page read and write
|
||
158EEEC4000
|
unkown
|
page readonly
|
||
158EC7C4000
|
unkown
|
page readonly
|
||
4AE0000
|
trusted library allocation
|
page read and write
|
||
158EC880000
|
heap
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3AC000
|
trusted library allocation
|
page execute and read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
E1D82F1000
|
stack
|
page read and write
|
||
7FFAAB322000
|
trusted library allocation
|
page read and write
|
||
20EC3990000
|
heap
|
page execute and read and write
|
||
491E000
|
stack
|
page read and write
|
||
7FFB23AD1000
|
unkown
|
page execute read
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
2AC69002000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB510000
|
trusted library allocation
|
page execute and read and write
|
||
4870000
|
trusted library allocation
|
page execute and read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
41C99FF000
|
stack
|
page read and write
|
||
6FC000
|
heap
|
page read and write
|
||
2D53000
|
heap
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4E6000
|
trusted library allocation
|
page read and write
|
||
6EE1000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
7FFB23AF5000
|
unkown
|
page readonly
|
||
432A2FE000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
2F18000
|
heap
|
page read and write
|
||
43F13FC000
|
stack
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
41C98FF000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
49C0000
|
heap
|
page read and write
|
||
4A8D000
|
trusted library allocation
|
page execute and read and write
|
||
188977BD000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
7FFAAB550000
|
trusted library allocation
|
page read and write
|
||
2C452E90000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4530000
|
heap
|
page execute and read and write
|
||
550000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
2C452F00000
|
trusted library allocation
|
page read and write
|
||
432BDFB000
|
stack
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB36D000
|
trusted library allocation
|
page execute and read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4000000
|
heap
|
page readonly
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
2F76000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFAAB600000
|
trusted library allocation
|
page read and write
|
||
7FFAAB550000
|
trusted library allocation
|
page execute and read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
E1D87FF000
|
stack
|
page read and write
|
||
7FFAAB39C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB500000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
313D000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
158EEFCF000
|
heap
|
page read and write
|
||
188B03A0000
|
heap
|
page read and write
|
||
73D06000
|
unkown
|
page readonly
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
20EC36E0000
|
heap
|
page read and write
|
||
2C4635F1000
|
trusted library allocation
|
page read and write
|
||
4A30000
|
heap
|
page execute and read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
158EC975000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
4964000
|
trusted library allocation
|
page read and write
|
||
432B2FB000
|
stack
|
page read and write
|
||
18897F16000
|
trusted library allocation
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
7FFAAB4ED000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
2947000
|
stack
|
page read and write
|
||
2AC4FE20000
|
unkown
|
page readonly
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
772000
|
heap
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
7FFAAB400000
|
trusted library allocation
|
page execute and read and write
|
||
2887000
|
stack
|
page read and write
|
||
158EEE30000
|
unkown
|
page readonly
|
||
4220000
|
heap
|
page read and write
|
||
20EC417C000
|
trusted library allocation
|
page read and write
|
||
4319000
|
heap
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
1A114560000
|
heap
|
page read and write
|
||
497C000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
2AC50843000
|
trusted library allocation
|
page read and write
|
||
2AC60701000
|
trusted library allocation
|
page read and write
|
||
2E3D000
|
heap
|
page read and write
|
||
2AC500B0000
|
heap
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
432AA34000
|
stack
|
page read and write
|
||
432A6E9000
|
stack
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
4603000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
469E000
|
stack
|
page read and write
|
||
2975000
|
heap
|
page read and write
|
||
188B0590000
|
heap
|
page read and write
|
||
2AC4FF48000
|
heap
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
1A1142E0000
|
heap
|
page read and write
|
||
158ECAC0000
|
trusted library allocation
|
page read and write
|
||
2CFA000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
432AA7F000
|
stack
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
432C2FE000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
158ECB25000
|
heap
|
page read and write
|
||
73CF1000
|
unkown
|
page execute read
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4F0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
2AC4FF0D000
|
heap
|
page read and write
|
||
4794000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
188B0854000
|
heap
|
page read and write
|
||
20EDC8A6000
|
heap
|
page read and write
|
||
4AF0000
|
heap
|
page execute and read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
4910000
|
heap
|
page readonly
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
CB0C4FE000
|
stack
|
page read and write
|
||
7FFAAB37D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB4D7000
|
trusted library allocation
|
page read and write
|
||
7FFAAB410000
|
trusted library allocation
|
page execute and read and write
|
||
188B0460000
|
heap
|
page read and write
|
||
4BAD000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
2C452C90000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
188B03DE000
|
heap
|
page read and write
|
||
18897FE5000
|
trusted library allocation
|
page read and write
|
||
18897FF0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
188978CF000
|
trusted library allocation
|
page read and write
|
||
7FFAAB440000
|
trusted library allocation
|
page execute and read and write
|
||
432BEF7000
|
stack
|
page read and write
|
||
8AD000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6B60000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4213000
|
trusted library allocation
|
page read and write
|
||
188B0780000
|
heap
|
page read and write
|
||
4C24000
|
trusted library allocation
|
page read and write
|
||
487B000
|
trusted library allocation
|
page read and write
|
||
43F0AFE000
|
stack
|
page read and write
|
||
158EED72000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
73D0F000
|
unkown
|
page readonly
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
4AA9000
|
trusted library allocation
|
page execute and read and write
|
||
2DE6000
|
heap
|
page read and write
|
||
4C42000
|
trusted library allocation
|
page read and write
|
||
2D50000
|
trusted library allocation
|
page read and write
|
||
D55000
|
heap
|
page read and write
|
||
20EC37F2000
|
heap
|
page read and write
|
||
4799000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6DDE000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB540000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6EE3000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
188AF700000
|
trusted library allocation
|
page read and write
|
||
188AFFBF000
|
heap
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
7FFAAB416000
|
trusted library allocation
|
page execute and read and write
|
||
6A0000
|
heap
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
758000
|
heap
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
4F8F000
|
stack
|
page read and write
|
||
4B14000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
7FFAAB343000
|
trusted library allocation
|
page execute and read and write
|
||
4AE0000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
46B9000
|
heap
|
page read and write
|
||
48DE000
|
stack
|
page read and write
|
||
41C9FFE000
|
stack
|
page read and write
|
||
18897F51000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
4400000
|
heap
|
page read and write
|
||
432ACFD000
|
stack
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
7E4000
|
trusted library allocation
|
page read and write
|
||
7FFAAB560000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
CB0CDFE000
|
stack
|
page read and write
|
||
431C000
|
trusted library allocation
|
page execute and read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
7FFAAB510000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
E1D85FF000
|
stack
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
18897FB7000
|
trusted library allocation
|
page read and write
|
||
4BA1000
|
trusted library allocation
|
page read and write
|
||
158EC971000
|
heap
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
7440000
|
heap
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
4873000
|
trusted library allocation
|
page read and write
|
||
7FFAAB510000
|
trusted library allocation
|
page read and write
|
||
E1D88FF000
|
stack
|
page read and write
|
||
4764000
|
trusted library allocation
|
page read and write
|
||
432C7FE000
|
stack
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
7FFAAB536000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
20EC417F000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
7FFAAB426000
|
trusted library allocation
|
page execute and read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
2AC50125000
|
heap
|
page read and write
|
||
2C453085000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
4B9F000
|
trusted library allocation
|
page read and write
|
||
7FFAAB364000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
7FFB23AD0000
|
unkown
|
page readonly
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
188B0340000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
7FFAAB5E0000
|
trusted library allocation
|
page execute and read and write
|
||
1A114565000
|
heap
|
page read and write
|
||
7FFAAB740000
|
trusted library allocation
|
page read and write
|
||
CB0C8FE000
|
stack
|
page read and write
|
||
2CFD000
|
heap
|
page read and write
|
||
2E94000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB426000
|
trusted library allocation
|
page execute and read and write
|
||
7E3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB332000
|
trusted library allocation
|
page read and write
|
||
6B21000
|
trusted library allocation
|
page read and write
|
||
2CDA000
|
heap
|
page read and write
|
||
18897EC6000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
2AC505E0000
|
trusted library allocation
|
page read and write
|
||
6BBE000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
4928000
|
trusted library allocation
|
page read and write
|
||
7FFAAB460000
|
trusted library allocation
|
page execute and read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
18897090000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
2DCC000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
7FFAAB540000
|
trusted library allocation
|
page execute and read and write
|
||
158EEE32000
|
unkown
|
page readonly
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
188AFF72000
|
heap
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB640000
|
trusted library allocation
|
page read and write
|
||
432B4E9000
|
stack
|
page read and write
|
||
49BE000
|
stack
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
7FFAAB34D000
|
trusted library allocation
|
page execute and read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
2D64000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4BB1000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
432B0FD000
|
stack
|
page read and write
|
||
432CAFE000
|
stack
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
2BB467F000
|
stack
|
page read and write
|
||
158EC91B000
|
heap
|
page read and write
|
||
7FFAAB670000
|
trusted library allocation
|
page execute and read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
329E000
|
stack
|
page read and write
|
||
188B0383000
|
heap
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B2E000
|
trusted library allocation
|
page read and write
|
||
4795000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
70C9000
|
heap
|
page read and write
|
||
3FD0000
|
trusted library allocation
|
page read and write
|
||
29DE000
|
stack
|
page read and write
|
||
325E000
|
stack
|
page read and write
|
||
274E000
|
stack
|
page read and write
|
||
188B04EA000
|
heap
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
trusted library allocation
|
page execute and read and write
|
||
2DB5000
|
heap
|
page read and write
|
||
18897ED2000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
188AFF70000
|
heap
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
1A1141E0000
|
heap
|
page read and write
|
||
4797000
|
trusted library allocation
|
page execute and read and write
|
||
158EC959000
|
heap
|
page read and write
|
||
2D03000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
2F04000
|
heap
|
page read and write
|
||
45E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB570000
|
trusted library allocation
|
page execute and read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
48D2000
|
trusted library allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
7FFAAB340000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
462F000
|
stack
|
page read and write
|
||
2350000
|
heap
|
page read and write
|
||
7FFAAB560000
|
trusted library allocation
|
page read and write
|
||
7FFAAB550000
|
trusted library allocation
|
page read and write
|
||
2AC5082C000
|
trusted library allocation
|
page read and write
|
||
188977C8000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
72FD000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
2D09000
|
heap
|
page read and write
|
||
158EEFDA000
|
heap
|
page read and write
|
||
7FFAAB406000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
44B0000
|
trusted library allocation
|
page read and write
|
||
4AAC000
|
trusted library allocation
|
page execute and read and write
|
||
3FD7000
|
trusted library allocation
|
page execute and read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
18897C55000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
trusted library allocation
|
page read and write
|
||
41C9BFF000
|
stack
|
page read and write
|
||
4C15000
|
trusted library allocation
|
page read and write
|
||
4840000
|
heap
|
page readonly
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6BC0000
|
remote allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
42FE000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
7FFAAB505000
|
trusted library allocation
|
page read and write
|
||
6BC0000
|
heap
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
2AC68ED2000
|
unkown
|
page readonly
|
||
158EEFC0000
|
heap
|
page read and write
|
||
4BEB000
|
trusted library allocation
|
page read and write
|
||
460D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB37C000
|
trusted library allocation
|
page execute and read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
432CBFD000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
18897690000
|
trusted library allocation
|
page read and write
|
||
18897F4F000
|
trusted library allocation
|
page read and write
|
||
188977D0000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4F0000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6B60000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
5CF000
|
stack
|
page read and write
|
||
2AC4FEED000
|
heap
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
483F000
|
stack
|
page read and write
|
||
CB0CEFE000
|
stack
|
page read and write
|
||
7FFAAB436000
|
trusted library allocation
|
page execute and read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
E1D89FE000
|
stack
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
2AC50640000
|
unkown
|
page readonly
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
158EC931000
|
heap
|
page read and write
|
||
4730000
|
heap
|
page execute and read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
2D17000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3FC000
|
trusted library allocation
|
page execute and read and write
|
||
E1D86FD000
|
stack
|
page read and write
|
||
7FFAAB36B000
|
trusted library allocation
|
page execute and read and write
|
||
432A7FF000
|
stack
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
158EC8FC000
|
heap
|
page read and write
|
||
313B000
|
heap
|
page read and write
|
||
2C463601000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4F0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB6F0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
2EA4000
|
trusted library allocation
|
page read and write
|
||
432ABFD000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
4E7000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
45BE000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
7FFAAB460000
|
trusted library allocation
|
page execute and read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
7F280000
|
trusted library allocation
|
page execute and read and write
|
||
29C0000
|
heap
|
page read and write
|
||
70BE000
|
stack
|
page read and write
|
||
2C452D03000
|
heap
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
44B7000
|
trusted library allocation
|
page execute and read and write
|
||
2E9D000
|
trusted library allocation
|
page execute and read and write
|
||
2E56000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
4795000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4329D3E000
|
stack
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
4520000
|
heap
|
page readonly
|
||
18897AF9000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
18896E8B000
|
heap
|
page read and write
|
||
2B65000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
20EC37F4000
|
heap
|
page read and write
|
||
7FFAAB4DD000
|
trusted library allocation
|
page read and write
|
||
4200000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
4A80000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
20EC37AF000
|
heap
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
E1D84FE000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
20EC4193000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
432C9FC000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
2EC7000
|
trusted library allocation
|
page execute and read and write
|
||
7F148000
|
trusted library allocation
|
page execute and read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
2AC69032000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6ED000
|
stack
|
page read and write
|
||
4884000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
7FFAAB550000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
7FFAAB340000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
7FFAAB364000
|
trusted library allocation
|
page read and write
|
||
42AE000
|
stack
|
page read and write
|
||
6D9D000
|
stack
|
page read and write
|
||
432C6FE000
|
stack
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
CB0CBFE000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
CB0C2F1000
|
stack
|
page read and write
|
||
188B051E000
|
heap
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
7FFAAB530000
|
trusted library allocation
|
page read and write
|
||
188978C7000
|
trusted library allocation
|
page read and write
|
||
43F02F4000
|
stack
|
page read and write
|
||
6B24000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
7FFAAB530000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6F20000
|
trusted library allocation
|
page read and write
|
||
2C46BDBC000
|
heap
|
page read and write
|
||
2C45371C000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
158EED5F000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
2AC502F5000
|
heap
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
713E000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
42B0000
|
heap
|
page execute and read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
4770000
|
trusted library allocation
|
page read and write
|
||
2C452F15000
|
heap
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
2D74000
|
trusted library allocation
|
page read and write
|
||
2AC68FD8000
|
heap
|
page read and write
|
||
20ED4061000
|
trusted library allocation
|
page read and write
|
||
2AC68F80000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
4B30000
|
trusted library allocation
|
page read and write
|
||
18897FBF000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
188AFFC2000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
7FFAAB510000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
4AA0000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB5B0000
|
trusted library allocation
|
page execute and read and write
|
||
18897ECE000
|
trusted library allocation
|
page read and write
|
||
4B98000
|
trusted library allocation
|
page read and write
|
||
2C45362F000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6EE4000
|
trusted library allocation
|
page read and write
|
||
18897ECA000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
CB0C6FD000
|
stack
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
4831000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
43F03FE000
|
stack
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
188B011E000
|
unkown
|
page readonly
|
||
158EC7A0000
|
unkown
|
page readonly
|
||
CB0C7FE000
|
stack
|
page read and write
|
||
4841000
|
trusted library allocation
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
7FFAAB344000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
188A7721000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
2C453080000
|
heap
|
page read and write
|
||
7FFAAB343000
|
trusted library allocation
|
page execute and read and write
|
||
2D70000
|
trusted library allocation
|
page read and write
|
||
2C453733000
|
trusted library allocation
|
page read and write
|
||
18897B41000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6B70000
|
trusted library allocation
|
page read and write
|
||
7ED000
|
trusted library allocation
|
page execute and read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
158ECBE0000
|
heap
|
page read and write
|
||
18897FEA000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
18897EC2000
|
trusted library allocation
|
page read and write
|
||
188A7782000
|
trusted library allocation
|
page read and write
|
||
7FFAAB40C000
|
trusted library allocation
|
page execute and read and write
|
||
2C453060000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFAAB630000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
756000
|
heap
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
2AC4FF21000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
188971A3000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4431000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
58E000
|
stack
|
page read and write
|
||
23E0000
|
heap
|
page read and write
|
||
7FFAAB4C3000
|
trusted library allocation
|
page read and write
|
||
188AFA84000
|
heap
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB360000
|
trusted library allocation
|
page read and write
|
||
7FFAAB5C6000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
2D57000
|
heap
|
page read and write
|
||
E1D8BFE000
|
stack
|
page read and write
|
||
188B0072000
|
unkown
|
page readonly
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
18897FB9000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
7FFAAB516000
|
trusted library allocation
|
page read and write
|
||
2ECB000
|
trusted library allocation
|
page execute and read and write
|
||
92E000
|
stack
|
page read and write
|
||
188B0407000
|
heap
|
page read and write
|
||
43F10FC000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB38C000
|
trusted library allocation
|
page execute and read and write
|
||
2D90000
|
heap
|
page read and write
|
||
158EC8A0000
|
heap
|
page read and write
|
||
432A1FF000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
44D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB450000
|
trusted library allocation
|
page execute and read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
18897FBB000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6DA000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
7FFAAB500000
|
trusted library allocation
|
page read and write
|
||
6EEC000
|
trusted library allocation
|
page read and write
|
||
23DE000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
20EC408D000
|
trusted library allocation
|
page read and write
|
||
4880000
|
trusted library allocation
|
page read and write
|
||
188970C5000
|
heap
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4763000
|
trusted library allocation
|
page execute and read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
7FFAAB540000
|
trusted library allocation
|
page execute and read and write
|
||
432B1E9000
|
stack
|
page read and write
|
||
7FFAAB340000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page execute and read and write
|
||
2F83000
|
heap
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
7FFAAB500000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4420000
|
heap
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
1889800E000
|
trusted library allocation
|
page read and write
|
||
188B04D5000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
188B0B80000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB570000
|
trusted library allocation
|
page execute and read and write
|
||
44B2000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
188B07FE000
|
heap
|
page read and write
|
||
2AC50658000
|
unkown
|
page readonly
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
158EF00A000
|
heap
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
188B078E000
|
heap
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB35B000
|
trusted library allocation
|
page execute and read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
49E1000
|
trusted library allocation
|
page read and write
|
||
187000
|
stack
|
page read and write
|
||
4876000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
2C4535E0000
|
heap
|
page execute and read and write
|
||
45F0000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
188B0454000
|
heap
|
page read and write
|
||
188978CB000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
E1D8DFD000
|
stack
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6D5E000
|
stack
|
page read and write
|
||
7FFAAB5D0000
|
trusted library allocation
|
page read and write
|
||
20EC41A1000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
7FFAAB334000
|
trusted library allocation
|
page read and write
|
||
2918000
|
heap
|
page read and write
|
||
73D0D000
|
unkown
|
page read and write
|
||
7FFAAB33D000
|
trusted library allocation
|
page execute and read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
59E5000
|
trusted library allocation
|
page read and write
|
||
7FFB23AE6000
|
unkown
|
page readonly
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB344000
|
trusted library allocation
|
page read and write
|
||
1889775B000
|
trusted library allocation
|
page read and write
|
||
2C46BE80000
|
heap
|
page execute and read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
2C45371F000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
18897F63000
|
trusted library allocation
|
page read and write
|
||
49D0000
|
trusted library allocation
|
page execute and read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
3170000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
43F14FC000
|
stack
|
page read and write
|
||
7F618000
|
trusted library allocation
|
page execute and read and write
|
||
18897FEE000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
3156000
|
heap
|
page read and write
|
||
41C9EFD000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
188B0784000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
18897ECC000
|
trusted library allocation
|
page read and write
|
||
20EC3720000
|
heap
|
page read and write
|
||
49C0000
|
heap
|
page execute and read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
432BCFD000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB354000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6B24000
|
trusted library allocation
|
page read and write
|
||
158EF001000
|
heap
|
page read and write
|
||
6EE1000
|
trusted library allocation
|
page read and write
|
||
4B15000
|
trusted library allocation
|
page read and write
|
||
6A5000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
70FE000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
20EC37B1000
|
heap
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
290B000
|
stack
|
page read and write
|
||
7FFAAB530000
|
trusted library allocation
|
page read and write
|
||
7FFAAB700000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
20EC3B40000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
7FFAAB560000
|
trusted library allocation
|
page execute and read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4A83000
|
trusted library allocation
|
page read and write
|
||
20EDC88E000
|
heap
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB340000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4C0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
432BBE9000
|
stack
|
page read and write
|
||
20EC36D0000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page execute and read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
188B0070000
|
unkown
|
page readonly
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
2C452EB0000
|
heap
|
page read and write
|
||
20EDC91B000
|
heap
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3D6000
|
trusted library allocation
|
page read and write
|
||
4890000
|
heap
|
page read and write
|
||
18897F12000
|
trusted library allocation
|
page read and write
|
||
2AC6901F000
|
heap
|
page read and write
|
||
20EDC887000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
686E000
|
stack
|
page read and write
|
||
2AC50851000
|
trusted library allocation
|
page read and write
|
||
7FFAAB580000
|
trusted library allocation
|
page execute and read and write
|
||
4B1C000
|
trusted library allocation
|
page read and write
|
||
7FFAAB525000
|
trusted library allocation
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
188B0508000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
46E0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
188977A8000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4E0000
|
trusted library allocation
|
page read and write
|
||
482F000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3F0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
188971D0000
|
heap
|
page read and write
|
||
2D6D000
|
trusted library allocation
|
page execute and read and write
|
||
4970000
|
heap
|
page execute and read and write
|
||
43F0DFD000
|
stack
|
page read and write
|
||
188B0363000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
7FFAAB34B000
|
trusted library allocation
|
page execute and read and write
|
||
3FDB000
|
trusted library allocation
|
page execute and read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
7FFAAB350000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
2E72000
|
heap
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB353000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB520000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
18897FE8000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
43F0EFB000
|
stack
|
page read and write
|
||
158EC7A0000
|
unkown
|
page readonly
|
||
2AC69130000
|
heap
|
page execute and read and write
|
||
7FFAAB590000
|
trusted library allocation
|
page execute and read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
2AC4FFD0000
|
heap
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
15890001000
|
trusted library allocation
|
page read and write
|
||
2C452D09000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
68AE000
|
stack
|
page read and write
|
||
43F09FE000
|
stack
|
page read and write
|
||
20EC41A5000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
158ECB63000
|
heap
|
page read and write
|
||
70D2000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
7FFAAB4FF000
|
trusted library allocation
|
page read and write
|
||
41C96FE000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
7F130000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB520000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
418F000
|
stack
|
page read and write
|
||
7FFAAB710000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
188976F0000
|
heap
|
page read and write
|
||
CB0CAFE000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
188971A0000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB52D000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
20EDC9C0000
|
heap
|
page execute and read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
64F000
|
stack
|
page read and write
|
||
188971D5000
|
heap
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3EC000
|
trusted library allocation
|
page execute and read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
158ECB20000
|
heap
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
7FFAAB323000
|
trusted library allocation
|
page execute and read and write
|
||
2E93000
|
trusted library allocation
|
page execute and read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4600000
|
trusted library allocation
|
page read and write
|
||
2DAA000
|
heap
|
page read and write
|
||
73CF0000
|
unkown
|
page readonly
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
476D000
|
trusted library allocation
|
page execute and read and write
|
||
6BC0000
|
remote allocation
|
page read and write
|
||
1588017A000
|
trusted library allocation
|
page read and write
|
||
7FFAAB35D000
|
trusted library allocation
|
page execute and read and write
|
||
158EED8C000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
2F7E000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
2C46BE11000
|
heap
|
page read and write
|
||
500F000
|
stack
|
page read and write
|
||
7FFB23AF2000
|
unkown
|
page readonly
|
||
158ECB60000
|
heap
|
page read and write
|
||
158EEFEF000
|
heap
|
page read and write
|
||
2DC3000
|
heap
|
page read and write
|
||
7FFAAB39C000
|
trusted library allocation
|
page execute and read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
7FFAAB539000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
4770000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
188B0888000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
2AC6070D000
|
trusted library allocation
|
page read and write
|
||
7FFAAB3E6000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7FFAAB560000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
There are 2065 hidden memdumps, click here to show them.