Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file_66efd0132ceed.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
initial sample
|
||
C:\Config.Msi\6def8f.rbs
|
data
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\BouncyCastle.Crypto.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\System.ValueTuple.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI2EE0.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
modified
|
||
C:\Windows\Installer\MSI2EE0.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIC7E.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSIC7E.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIEE0.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSIF0D6.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSIF0D6.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIF626.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSIF626.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\System32\InstallUtil.InstallLog
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\~DF49B5C2D0F32FF272.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF7C5DF2A1FD1395B7.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFB427C4F2E911224E.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFBC946715E876F51D.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFC63CC543F8C13A3F.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFD9E785709C7D5F3E.TMP
|
data
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallState
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation.zip
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.ini
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AteraAgent.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\Installer\6def8e.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\6def90.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\MSI10B8.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI2EE0.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSI2EE0.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI2EE0.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI2EE0.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIC7E.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSIC7E.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIC7E.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIC7E.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIEF1.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIF0D6.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSIF0D6.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIF0D6.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIF0D6.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIF5F.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIF626.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSIF626.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIF626.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIF626.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SourceHash{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Logs\SIH\SIH.20241124.051537.161.1.etl
|
data
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
modified
|
||
C:\Windows\SoftwareDistribution\SLS\522D76A4-93E1-47F8-B8CE-07C937AD1A1E\TMP382F.tmp
|
Microsoft Cabinet archive data, single, 462 bytes, 1 file, at 0x44 +Utf "environment.xml", flags 0x4, ID 31944, number 1,
extra bytes 20 in head, 1 datablock, 0x1 compression
|
dropped
|
||
C:\Windows\SoftwareDistribution\SLS\522D76A4-93E1-47F8-B8CE-07C937AD1A1E\sls.cab
|
Microsoft Cabinet archive data, single, 7826 bytes, 1 file, at 0x44 +Utf "environment.cab", flags 0x4, ID 53283, number 1,
extra bytes 20 in head, 1 datablock, 0x1 compression
|
dropped
|
||
C:\Windows\SoftwareDistribution\SLS\E7A50285-D08D-499D-9FF8-180FDC2332BC\TMP4720.tmp
|
Microsoft Cabinet archive data, single, 858 bytes, 1 file, at 0x44 +Utf "environment.xml", flags 0x4, ID 12183, number 1,
extra bytes 20 in head, 1 datablock, 0x1 compression
|
dropped
|
||
C:\Windows\SoftwareDistribution\SLS\E7A50285-D08D-499D-9FF8-180FDC2332BC\sls.cab
|
Microsoft Cabinet archive data, single, 11149 bytes, 1 file, at 0x44 +Utf "environment.cab", flags 0x4, ID 18779, number 1,
extra bytes 20 in head, 1 datablock, 0x1 compression
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
Certificate, Version=3
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
|
Certificate, Version=3
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
modified
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageAgentInformation.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\Temp\~DF153A81F8E5617DA6.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF2E4E1DC579E3B4C5.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF37DBF58920B9BE9D.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF85566ED1D909C207.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF9967FFED004E597F.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFC4B55DEFAAFEE2FC.TMP
|
data
|
dropped
|
||
\Device\ConDrv
|
JSON data
|
dropped
|
There are 75 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSIF0D6.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7205156 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSIF626.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7206484 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSIC7E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7212171 11 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="veronicacc@ilsamexico.com" /CompanyId="1"
/IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000LzG3lIAF" /AgentId="d15def5a-efb4-4303-98c9-cf62501a24d9"
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI2EE0.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7220984 33 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
d15def5a-efb4-4303-98c9-cf62501a24d9 "eac8115e-5d3a-4a50-9055-1d945ab05897" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000LzG3lIAF
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
d15def5a-efb4-4303-98c9-cf62501a24d9 "a6f75002-7e52-4050-bf2e-b05386661724" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000LzG3lIAF
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
d15def5a-efb4-4303-98c9-cf62501a24d9 "832c3a8d-c1ac-4e47-a5dd-e5330b8175f2" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000LzG3lIAF
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\file_66efd0132ceed.msi"
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding 799218A43054AFC7292CF5EAEECA0917
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding 3732F891DB04E80DEAE37B187BFD9D4C E Global\MSI0000
|
||
C:\Windows\SysWOW64\net.exe
|
"NET" STOP AteraAgent
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\net1.exe
|
C:\Windows\system32\net1 STOP AteraAgent
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"TaskKill.exe" /f /im AteraAgent.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\SIHClient.exe
|
C:\Windows\System32\sihclient.exe /cv sXgXgx6V+U2s/Rk0DSIwWw.0.2
|
||
C:\Windows\System32\sc.exe
|
"C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 16 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://schemas.datacontract.org
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/d15def5a-efb4-4303-98c9-cf62501a24d9/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=1b1043f4-4037-4343-9561-1316ef9829bf&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=9e43bce9-1db6-46f2-9171-f572e6753fbc&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://agent-api.atera.com/Production/Agent/track-event
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=28ed73a9-9db5-44d7-acaf-721c9a49ce4c&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
http://dl.google.com/googletalk/googletalk-setup.exe
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetRecurringPackagesscribe
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/Agent
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/
|
unknown
|
||
http://schemas.datacontract.org/2004/07/System.ServiceProcess
|
unknown
|
||
http://wixtoolset.org
|
unknown
|
||
https://agent-api.atera.com/Production
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetCommandsFallback0
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=7ad76688-4452-435a-8518-58b2eaee9c6b&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://ps.atera.com/agentpackageswin/AgentPackageRuntimeInstaller/13.0/AgentPackageRuntimeInstaller
|
unknown
|
||
http://acontrol.atera.com/
|
unknown
|
||
https://ps.pndsn.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=6c6b49c3-4df6-4101-91fb-684d4f16fd73&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageNetworkDiscovery/23.9/AgentPackageNetworkDiscove
|
unknown
|
||
http://agent-api.atera.com
|
unknown
|
||
http://schemas.datacontract.org/2004/07/
|
unknown
|
||
https://github.com/icsharpcode/SharpZipLib
|
unknown
|
||
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageAgentI
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/d15def5a-efb4-4303-98c9-cf62501a24d9/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=2f81232c-ba3d-448d-ad5c-71e3d13e104d&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
|
unknown
|
||
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/d15def5a-efb4-4303-98c9
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=e7ba127d-faea-46b0-8bfc-b1b2fcc38621&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/d15def5a-efb4-4303-98c9-cf62501a24d9/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=958b96e4-e399-41e9-8d58-0d1deb75a616&tr=33&tt=17324434048824613&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/d15def5a
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageTaskScheduler/17.2/AgentPackageTaskScheduler.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/Agent.Package.Availability/0
|
unknown
|
||
https://agent-api.atera.com
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/AgentStarting
|
unknown
|
||
http://www.w3.oh
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=e7ba127d-faea-46b0-8bfc-b1b2fcc38621
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetCommands
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=3baba941-f261-496a-b933-9bd308fa7c86&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=d88a8beb-580c-4eae-be4b-b07e69debebd
|
unknown
|
||
https://agent-api.atera.com/
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/d15def5a-efb4-4303-98c9-cf62501a24d9/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=bbab8eac-80d9-4b85-82f6-9bd41fbab092&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/d15def5a-efb4-4303-98c9-cf62501a24d9/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=04a73581-89d2-414b-b671-e3efd26147f3&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://agent-api.atera.com/Production/Agent/GetRecurringPackages
|
unknown
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.Availability/13.0/Agent.Package.Availability.zip
|
unknown
|
||
https://www.newtonsoft.com/jsonschema
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageAgentInformation/38.0/AgentPackageAgentInformation.zip?ooiAewSNq46iHqMptNhaEhfX2X8bbCxVwRliPM24sW+tjAzbftGD6UpEklYpoosk
|
108.158.75.93
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageRuntimeInstaller/1.5/AgentPackageRuntimeInstaller.
|
unknown
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.Watchdog/13.0/Agent.Package.Watchdog.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.Availability/0.16/Agent.Package.Availability.z
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/d15def5a-efb4-4303-98c9-cf62501a24d9/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=deedb6f3-d7ab-40dc-bc11-0b1184a6d22a&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=55ef0378-bd34-4bdb-83d2-4cef98847c3b
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=f2b2651c-4fd7-4f48-bd8b-32fdf2d1d2f4&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://ps.atera.com/agentpackagesmac/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
|
unknown
|
||
https://www.newtonsoft.com/json
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/d15def5a-efb4-4303-98c9-cf62501a24d9/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=0b7f434f-4e93-4de1-96e0-b290421338b8&tt=0&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/d15def5a-efb4-4303-98c9-cf62501a24d9/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=be00bfee-7c6d-496b-a7d0-fdd77a8acffb&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
http://wixtoolset.org/news/
|
unknown
|
||
https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageAgentInformation/22.7/AgentPackageAgentInformation
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/d15def5a-efb4-4303-98c9-cf62501a24d9/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=35924d94-0058-4718-9b1f-2ddd57458183&tt=0&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://agent-api.aterD
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageNetworkDiscovery/13.0/AgentPackageNetworkDiscovery
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=75a7f166-9092-405a-aa00-38a9a77e5eae&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.IotPoc/13.0/Agent.Package.IotPoc.zip
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/d15def5a-efb4-4303-98c9-cf62501a24d9/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=85c15caa-37cb-46fd-a6ee-c8729985b9f4&tr=33&tt=17324434200461240&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://agent-api.atera.com/Production/Agent/GetRecurringPackagesseTaskFactory9
|
unknown
|
||
https://agent-api.atera.comx
|
unknown
|
||
https://agent-api.atera.com/Pro
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/AcknowledgeCommands
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageTaskScheduler/13.0/AgentPackageTaskScheduler.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageAgentInformation/38.0/AgentPackageAgentInformation
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=9b2f45ce-12e9-4161-ad72-09f2e15b84d0&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/d15def5a-efb4-4303-98c9-cf62501a24d9/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=ccc99601-6851-4238-90a7-17abb94d8a97&tt=0&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://agent-api.P
|
unknown
|
||
http://www.w3.o
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageAgentInformation/38.0/AgentPackageAgentInformati
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetCommandsFallback
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageRuntimeInstaller/1.6/AgentPackageRuntimeInstalle
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/d15def5a-efb4-4303-98c9-cf62501a24d9/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=da1cc509-7766-41b3-99b4-204f1ef88690&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
http://ps.pndsn.com
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/d15def5a-efb4-4303-98c9-cf62501a24d9/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=30c82597-9c84-4489-895a-c306fe08576d&tr=33&tt=17324433474242351&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=ff2dd1d9-885a-46fe-8e7f-5a540ad227d3&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://github.com/JamesNK/Newtonsoft.Json
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=55ef0378-bd34-4bdb-83d2-4cef98847c3b&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/d15def5a-efb4-4303-98c9-cf62501a24d9/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=a3aed830-4538-4a0c-8880-b4e93ae94626&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/d15def5a-efb4-4303-98c9-cf62501a24d9/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=1043b6b4-24c3-4b2c-8715-05fa1152bb8e&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://ps.atera.com/agentpackagesmac/Agent.Package.Availability/0.16/Agent.Package.Availability.zip
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/d15def5a-efb4-4303-98c9-cf62501a24d9/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=2cd035b5-493b-42ef-8a0c-7668843cdc0d&tr=33&tt=17324433453164358&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/d15def5a-efb4-4303-98c9-cf62501a24d9/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=2d3ae8ae-040f-464c-8cba-7d2785f40888&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=d88a8beb-580c-4eae-be4b-b07e69debebd&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/d15def5a-efb4-4303-98c9-cf62501a24d9/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=392754e5-9d09-4f5e-8c18-73d91936b641&tt=0&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://agent-api.atera.com/Production/Agent/GetRecurringPackagesd
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=1525893c-da1a-47f1-9090-c6703d359f6f&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=f087f5f2-7b58-49f6-808f-3ff0a062bb98&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/d15def5a-efb4-4303-98c9-cf62501a24d9/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=0b5482b4-128a-47b8-9bcd-b0f99b563300&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
|
13.232.67.199
|
||
https://agent-api.atera.com/Production/Agent/CommandResult
|
unknown
|
||
https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf8
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ps.pndsn.com
|
13.232.67.199
|
||
bg.microsoft.map.fastly.net
|
199.232.214.172
|
||
d25btwd9wax8gu.cloudfront.net
|
108.158.75.93
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
||
windowsupdatebg.s.llnwi.net
|
178.79.238.0
|
||
ps.atera.com
|
unknown
|
||
agent-api.atera.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
108.158.75.93
|
d25btwd9wax8gu.cloudfront.net
|
United States
|
||
13.232.67.199
|
ps.pndsn.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\6def8f.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\6def8f.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB9EFD7FDAF9AD115987000E181661F5
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CD868C8CE5A308147ABB306D829266BC
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C32B8CE0327C1E141950B4C9C2AD4DA7
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D9B1B1F0B1FC024D9390FE4B94D97D5
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\007F59F54ACD08842B2D98A10E6D1E3A
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB25C26F7C51D3C4AA2BED5600F46956
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01010F83113E72A4C81AD77422D2F947
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01D9DC4B27DFC0340B543A11D3CEBE07
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\ATERA Networks\AteraAgent\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\ATERA Networks\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\7D0A237E2F2A7564CA141B792446E854
|
INSTALLFOLDER_files_Feature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Features
|
INSTALLFOLDER_files_Feature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
|
LastUsedSource
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
|
AutoBackupLogFiles
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AteraAgent
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
AccountId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
IntegratorLogin
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
CompanyId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
AgentId
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
ServerName
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AlphaAgent
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
FileDirectory
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
FileDirectory
|
There are 145 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
29100073000
|
trusted library allocation
|
page read and write
|
||
258CC663000
|
trusted library allocation
|
page read and write
|
||
2917DF5A000
|
heap
|
page read and write
|
||
43FA000
|
heap
|
page read and write
|
||
258CBDB0000
|
heap
|
page read and write
|
||
1F37F4A9000
|
heap
|
page read and write
|
||
1F37DE50000
|
heap
|
page read and write
|
||
258CC5E1000
|
trusted library allocation
|
page read and write
|
||
2917DED0000
|
heap
|
page read and write
|
||
258CC627000
|
trusted library allocation
|
page read and write
|
||
2D237E20000
|
heap
|
page read and write
|
||
2917DF0D000
|
heap
|
page read and write
|
||
2D239779000
|
trusted library allocation
|
page read and write
|
||
20DDCB50000
|
heap
|
page read and write
|
||
2D2397A2000
|
trusted library allocation
|
page read and write
|
||
4BB4000
|
trusted library allocation
|
page read and write
|
||
291000BF000
|
trusted library allocation
|
page read and write
|
||
20DDD293000
|
trusted library allocation
|
page read and write
|
||
258CBDB9000
|
heap
|
page read and write
|
||
2D237BE3000
|
heap
|
page read and write
|
||
1F37DE58000
|
heap
|
page read and write
|
||
2D23986C000
|
trusted library allocation
|
page read and write
|
||
2D237B50000
|
heap
|
page read and write
|
||
2917DEB0000
|
heap
|
page read and write
|
||
2917DEEB000
|
heap
|
page read and write
|
||
4B11000
|
trusted library allocation
|
page read and write
|
||
1F30006B000
|
trusted library allocation
|
page read and write
|
||
1F37DE6B000
|
heap
|
page read and write
|
||
2917DED9000
|
heap
|
page read and write
|
||
7FFB4AA14000
|
trusted library allocation
|
page read and write
|
||
1F37EF26000
|
heap
|
page read and write
|
||
258CBDF2000
|
heap
|
page read and write
|
||
1F300266000
|
trusted library allocation
|
page read and write
|
||
2D2397A4000
|
trusted library allocation
|
page read and write
|
||
20DDC8A1000
|
heap
|
page read and write
|
||
2D237B72000
|
heap
|
page read and write
|
||
1F37DE8C000
|
heap
|
page read and write
|
||
2D23977C000
|
trusted library allocation
|
page read and write
|
||
1F37DE20000
|
heap
|
page read and write
|
||
258CC653000
|
trusted library allocation
|
page read and write
|
||
258CC0A0000
|
heap
|
page read and write
|
||
1F37DED6000
|
heap
|
page read and write
|
||
2D237902000
|
unkown
|
page readonly
|
||
2D2521C9000
|
heap
|
page read and write
|
||
2D237B93000
|
heap
|
page read and write
|
||
20DDC860000
|
heap
|
page read and write
|
||
258CBE35000
|
heap
|
page read and write
|
||
20DDC8B0000
|
heap
|
page read and write
|
||
2D251DB0000
|
heap
|
page read and write
|
||
52F4000
|
trusted library allocation
|
page read and write
|
||
258CBDCC000
|
heap
|
page read and write
|
||
2D239822000
|
trusted library allocation
|
page read and write
|
||
1F37DDF0000
|
heap
|
page read and write
|
||
258CC69F000
|
trusted library allocation
|
page read and write
|
||
2D237B5C000
|
heap
|
page read and write
|
||
20DDC8EE000
|
heap
|
page read and write
|
||
1F37F310000
|
heap
|
page read and write
|
||
1F37F838000
|
heap
|
page read and write
|
||
2D2396F1000
|
trusted library allocation
|
page read and write
|
||
467A000
|
heap
|
page read and write
|
||
258CBDEC000
|
heap
|
page read and write
|
||
1F37DF0E000
|
heap
|
page read and write
|
||
2D2397AA000
|
trusted library allocation
|
page read and write
|
||
29100001000
|
trusted library allocation
|
page read and write
|
||
20DDD283000
|
trusted library allocation
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4F60000
|
heap
|
page read and write
|
||
1F300001000
|
trusted library allocation
|
page read and write
|
||
20DDD211000
|
trusted library allocation
|
page read and write
|
||
29100047000
|
trusted library allocation
|
page read and write
|
||
B9A8CF5000
|
stack
|
page read and write
|
||
29100083000
|
trusted library allocation
|
page read and write
|
||
2D252140000
|
heap
|
page read and write
|
||
20DDC6C2000
|
unkown
|
page readonly
|
||
20DDCB32000
|
unkown
|
page readonly
|
||
2D2397B9000
|
trusted library allocation
|
page read and write
|
||
5251000
|
trusted library allocation
|
page read and write
|
||
7FFB4A89B000
|
trusted library allocation
|
page execute and read and write
|
||
2D2521AA000
|
heap
|
page read and write
|
||
98B000
|
stack
|
page read and write
|
||
28DD20A8000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
6CCDDFE000
|
stack
|
page read and write
|
||
DD921FC000
|
stack
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
B9A90FD000
|
stack
|
page read and write
|
||
3365000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
4F60000
|
heap
|
page readonly
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
C76000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AB60000
|
trusted library allocation
|
page read and write
|
||
2D237B7E000
|
heap
|
page read and write
|
||
DD91AFE000
|
stack
|
page read and write
|
||
B9A983E000
|
stack
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
7FFB4AA80000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
20DDD070000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
7FFB4A880000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
heap
|
page read and write
|
||
1F37F710000
|
unkown
|
page readonly
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
28DD1DD0000
|
heap
|
page read and write
|
||
4910000
|
trusted library allocation
|
page read and write
|
||
28DD2080000
|
heap
|
page read and write
|
||
945797D000
|
stack
|
page read and write
|
||
6CCCF11000
|
stack
|
page read and write
|
||
4930000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
28DD14C1000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
trusted library allocation
|
page read and write
|
||
E7C000
|
heap
|
page read and write
|
||
45B0000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
1F37F400000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
49D0000
|
heap
|
page readonly
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
798E000
|
stack
|
page read and write
|
||
2D252150000
|
heap
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
28DD1507000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
1F3000A3000
|
trusted library allocation
|
page read and write
|
||
4430000
|
trusted library allocation
|
page execute and read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F10000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA90000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
2D237B99000
|
heap
|
page read and write
|
||
1F3001EA000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
46AB000
|
heap
|
page read and write
|
||
BDAEFFE000
|
stack
|
page read and write
|
||
5B11000
|
trusted library allocation
|
page read and write
|
||
51D4000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
2D237B95000
|
heap
|
page read and write
|
||
20DED221000
|
trusted library allocation
|
page read and write
|
||
28DD150A000
|
heap
|
page read and write
|
||
753B000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
29100151000
|
trusted library allocation
|
page read and write
|
||
28DD1DEC000
|
heap
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA8E000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
794D000
|
stack
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
DD914FE000
|
stack
|
page read and write
|
||
28DD209C000
|
heap
|
page read and write
|
||
258CBD90000
|
heap
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
28DD1DCD000
|
heap
|
page read and write
|
||
455E000
|
stack
|
page read and write
|
||
29110001000
|
trusted library allocation
|
page read and write
|
||
CB7D1FE000
|
stack
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA70000
|
trusted library allocation
|
page execute and read and write
|
||
32A0000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
DD91BFB000
|
stack
|
page read and write
|
||
7FFB4A8EC000
|
trusted library allocation
|
page execute and read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
7FFB4A87D000
|
trusted library allocation
|
page execute and read and write
|
||
2D251E38000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6CCD6FE000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
28DD14C2000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
7FFB4A88D000
|
trusted library allocation
|
page execute and read and write
|
||
45B000
|
stack
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
529F000
|
trusted library allocation
|
page read and write
|
||
2D239650000
|
heap
|
page read and write
|
||
7FFB4AB90000
|
trusted library allocation
|
page read and write
|
||
28DD2087000
|
heap
|
page read and write
|
||
7FF44D2B0000
|
trusted library allocation
|
page execute and read and write
|
||
4F78000
|
trusted library allocation
|
page read and write
|
||
2910012C000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
28DD12F0000
|
heap
|
page read and write
|
||
CB7CDFE000
|
stack
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
28DD1DEC000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
351B000
|
heap
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
28DD14C6000
|
heap
|
page read and write
|
||
BDAFAFE000
|
stack
|
page read and write
|
||
B9AB97E000
|
stack
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
2D239653000
|
heap
|
page read and write
|
||
7FFB4AA40000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
20DED211000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA2D000
|
trusted library allocation
|
page read and write
|
||
51D3000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA70000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AB70000
|
trusted library allocation
|
page read and write
|
||
1F300560000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA4A000
|
trusted library allocation
|
page read and write
|
||
2910012F000
|
trusted library allocation
|
page read and write
|
||
94575B7000
|
stack
|
page read and write
|
||
17B974E8000
|
heap
|
page read and write
|
||
1F37F509000
|
heap
|
page read and write
|
||
7FFB4AA60000
|
trusted library allocation
|
page read and write
|
||
7010000
|
heap
|
page read and write
|
||
B9ABA7E000
|
stack
|
page read and write
|
||
1F37EF23000
|
heap
|
page read and write
|
||
35B0000
|
heap
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
||
1F37F712000
|
unkown
|
page readonly
|
||
47DD000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
CBD000
|
stack
|
page read and write
|
||
258CC5D0000
|
heap
|
page execute and read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
B9AAA78000
|
stack
|
page read and write
|
||
7FFB4AB16000
|
trusted library allocation
|
page read and write
|
||
7FFB4AAC0000
|
trusted library allocation
|
page read and write
|
||
1F300210000
|
trusted library allocation
|
page read and write
|
||
1F3008D5000
|
trusted library allocation
|
page read and write
|
||
7FFB4AB10000
|
trusted library allocation
|
page read and write
|
||
5050000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
1F3008AF000
|
trusted library allocation
|
page read and write
|
||
1F30051B000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
1F30055A000
|
trusted library allocation
|
page read and write
|
||
1F3008DF000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
31AB000
|
heap
|
page read and write
|
||
305D000
|
stack
|
page read and write
|
||
7FFB4A990000
|
trusted library allocation
|
page execute and read and write
|
||
1F3001B0000
|
trusted library allocation
|
page read and write
|
||
DAB000
|
trusted library allocation
|
page execute and read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
31AA000
|
heap
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
1F300756000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
2D2396E0000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
1F3001B8000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
28DD152D000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
4820000
|
trusted library allocation
|
page execute and read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
9457B7E000
|
stack
|
page read and write
|
||
4BE4000
|
trusted library allocation
|
page read and write
|
||
258CBEA9000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
4560000
|
heap
|
page execute and read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
1F30077C000
|
trusted library allocation
|
page read and write
|
||
6CCD8FE000
|
stack
|
page read and write
|
||
319A000
|
heap
|
page read and write
|
||
1F3008B3000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
34E0000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA40000
|
trusted library allocation
|
page execute and read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
28DD1DFE000
|
heap
|
page read and write
|
||
28DD2087000
|
heap
|
page read and write
|
||
28DD1507000
|
heap
|
page read and write
|
||
34FA000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
28DD14C1000
|
heap
|
page read and write
|
||
1F300754000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
34F0000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
28DD208E000
|
heap
|
page read and write
|
||
7FFB4A8A0000
|
trusted library allocation
|
page read and write
|
||
1F37F3ED000
|
heap
|
page read and write
|
||
DD915FE000
|
stack
|
page read and write
|
||
7FFB4AC80000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
752C000
|
heap
|
page read and write
|
||
1F37F3C1000
|
heap
|
page read and write
|
||
5324000
|
trusted library allocation
|
page read and write
|
||
DD925FA000
|
stack
|
page read and write
|
||
20DDC9A0000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F74000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
4B5F000
|
trusted library allocation
|
page read and write
|
||
2D239690000
|
heap
|
page execute and read and write
|
||
DD920FD000
|
stack
|
page read and write
|
||
7FFB4AA90000
|
trusted library allocation
|
page execute and read and write
|
||
2D237BB4000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
1F37F85F000
|
heap
|
page read and write
|
||
1F3000D4000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
DD926FD000
|
stack
|
page read and write
|
||
5B15000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
7F2A8000
|
trusted library allocation
|
page execute and read and write
|
||
CC5000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
2D2521E8000
|
heap
|
page read and write
|
||
F0D000
|
stack
|
page read and write
|
||
258CC731000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
4680000
|
trusted library allocation
|
page read and write
|
||
B9ABC7C000
|
stack
|
page read and write
|
||
58B5000
|
trusted library allocation
|
page read and write
|
||
1F37DE25000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
700E000
|
stack
|
page read and write
|
||
28DD1E0A000
|
heap
|
page read and write
|
||
7FFB4A8AB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4A883000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
trusted library allocation
|
page read and write
|
||
28DD1476000
|
heap
|
page read and write
|
||
7FFB4AAB0000
|
trusted library allocation
|
page read and write
|
||
F10000
|
trusted library allocation
|
page execute and read and write
|
||
28DD1441000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA68000
|
trusted library allocation
|
page read and write
|
||
4880000
|
trusted library allocation
|
page read and write
|
||
28DD148E000
|
heap
|
page read and write
|
||
519C000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
7539000
|
heap
|
page read and write
|
||
B9AB47C000
|
stack
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
7FFB4ABB0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
1F37F84B000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
258CBE0C000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA99000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC40000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
7FFB4AAA2000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
481E000
|
stack
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
5195000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
46A0000
|
trusted library allocation
|
page read and write
|
||
4BA3000
|
trusted library allocation
|
page read and write
|
||
28DD1507000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
28DD14AA000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
28DD208A000
|
heap
|
page read and write
|
||
4AE0000
|
heap
|
page read and write
|
||
7FFB4A940000
|
trusted library allocation
|
page execute and read and write
|
||
20DDD1DC000
|
unkown
|
page readonly
|
||
7FFB4A9B0000
|
trusted library allocation
|
page execute and read and write
|
||
B9A8FFE000
|
stack
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4A86D000
|
trusted library allocation
|
page execute and read and write
|
||
28DD16F5000
|
heap
|
page read and write
|
||
7FC48000
|
trusted library allocation
|
page execute and read and write
|
||
BDAF8FE000
|
stack
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51D1000
|
trusted library allocation
|
page read and write
|
||
31C8000
|
heap
|
page read and write
|
||
B5E000
|
stack
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
28DD1DCA000
|
heap
|
page read and write
|
||
6F39000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
510C000
|
trusted library allocation
|
page execute and read and write
|
||
1F3008EC000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
258CBDD7000
|
heap
|
page read and write
|
||
BDAF3FF000
|
stack
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
7FFB4A8BB000
|
trusted library allocation
|
page execute and read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
1F37F3FD000
|
heap
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
1F3000A8000
|
trusted library allocation
|
page read and write
|
||
44D0000
|
heap
|
page execute and read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
441C000
|
trusted library allocation
|
page execute and read and write
|
||
4DB7000
|
trusted library allocation
|
page execute and read and write
|
||
2D237BA3000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
7FFB4AAA0000
|
trusted library allocation
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page execute and read and write
|
||
DD923FE000
|
stack
|
page read and write
|
||
28DD1434000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
327D000
|
stack
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
2D251E6B000
|
heap
|
page read and write
|
||
31C8000
|
heap
|
page read and write
|
||
28DD1DFE000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
1F3007F8000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
1F37F3D3000
|
heap
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
1F30077E000
|
trusted library allocation
|
page read and write
|
||
7FFB4A8BC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AA36000
|
trusted library allocation
|
page read and write
|
||
2917EF24000
|
heap
|
page read and write
|
||
28DD1DFF000
|
heap
|
page read and write
|
||
B9A94FE000
|
stack
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
1F300903000
|
trusted library allocation
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
1F300058000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
4BF2000
|
trusted library allocation
|
page read and write
|
||
4E5E000
|
stack
|
page read and write
|
||
DD917FE000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
509E000
|
stack
|
page read and write
|
||
20DDC8EB000
|
heap
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
28DD152D000
|
heap
|
page read and write
|
||
2D237E25000
|
heap
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
DA7000
|
trusted library allocation
|
page execute and read and write
|
||
6FB0000
|
trusted library allocation
|
page read and write
|
||
7FFB4A926000
|
trusted library allocation
|
page read and write
|
||
7FFB4A950000
|
trusted library allocation
|
page execute and read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
1F300809000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
258CBEB0000
|
heap
|
page read and write
|
||
DD911FE000
|
stack
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
1F3000DC000
|
trusted library allocation
|
page read and write
|
||
1F300263000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
20DDD200000
|
heap
|
page execute and read and write
|
||
1F37E140000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
50DE000
|
stack
|
page read and write
|
||
43F3000
|
trusted library allocation
|
page read and write
|
||
28DD1E07000
|
heap
|
page read and write
|
||
B9A9F2B000
|
stack
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
28DD144D000
|
heap
|
page read and write
|
||
1F300750000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
B9A8E2D000
|
stack
|
page read and write
|
||
7FFB4A883000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
28DD14AA000
|
heap
|
page read and write
|
||
20DDD33C000
|
trusted library allocation
|
page read and write
|
||
B9AB57C000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
50F0000
|
heap
|
page execute and read and write
|
||
28DD1DAF000
|
heap
|
page read and write
|
||
7FFB4A89D000
|
trusted library allocation
|
page execute and read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA61000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
1F37E790000
|
trusted library allocation
|
page read and write
|
||
B9A9C3C000
|
stack
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
778E000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
C55000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
B9A9D3D000
|
stack
|
page read and write
|
||
36E0000
|
heap
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
28DD1476000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
DD910FE000
|
stack
|
page read and write
|
||
B9A9729000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
1F310021000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
55C1000
|
trusted library allocation
|
page read and write
|
||
28DD1DC1000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
2D237CA0000
|
heap
|
page execute and read and write
|
||
28DD1DC1000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC50000
|
trusted library allocation
|
page read and write
|
||
7FFB4AAF0000
|
trusted library allocation
|
page execute and read and write
|
||
2917DF17000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
1F30074C000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AAE0000
|
trusted library allocation
|
page execute and read and write
|
||
1F37DEAC000
|
heap
|
page read and write
|
||
2D237CE0000
|
heap
|
page execute and read and write
|
||
2917DF11000
|
heap
|
page read and write
|
||
258CBFF0000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
28DD1DB2000
|
heap
|
page read and write
|
||
2917EF8B000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
B9AB677000
|
stack
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
28DD1DCA000
|
heap
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
1F37EE50000
|
heap
|
page read and write
|
||
7FFB4AA35000
|
trusted library allocation
|
page read and write
|
||
2D251F52000
|
unkown
|
page readonly
|
||
7FFB4A894000
|
trusted library allocation
|
page read and write
|
||
20DDCAC0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
5109000
|
trusted library allocation
|
page execute and read and write
|
||
4DB5000
|
trusted library allocation
|
page execute and read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
1F31000E000
|
trusted library allocation
|
page read and write
|
||
20DF59EA000
|
heap
|
page read and write
|
||
7EE28000
|
trusted library allocation
|
page execute and read and write
|
||
B9A93FF000
|
stack
|
page read and write
|
||
258E4F0E000
|
heap
|
page read and write
|
||
4BAB000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA4C000
|
trusted library allocation
|
page read and write
|
||
3514000
|
heap
|
page read and write
|
||
491B000
|
trusted library allocation
|
page execute and read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
trusted library allocation
|
page read and write
|
||
50CE000
|
stack
|
page read and write
|
||
47E4000
|
trusted library allocation
|
page read and write
|
||
1F37F3F1000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
2D23986A000
|
trusted library allocation
|
page read and write
|
||
1F3008D7000
|
trusted library allocation
|
page read and write
|
||
7FFB4A916000
|
trusted library allocation
|
page read and write
|
||
1F37E1B5000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4A936000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
30CE000
|
unkown
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
5130000
|
trusted library allocation
|
page read and write
|
||
7AA6000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
1F37F3B5000
|
heap
|
page read and write
|
||
20DDC8A6000
|
heap
|
page read and write
|
||
D73000
|
trusted library allocation
|
page execute and read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
1F37F3E1000
|
heap
|
page read and write
|
||
DD913FB000
|
stack
|
page read and write
|
||
2917EF29000
|
heap
|
page read and write
|
||
7FFB4A864000
|
trusted library allocation
|
page read and write
|
||
1F3008DB000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
503E000
|
stack
|
page read and write
|
||
1F3001A0000
|
trusted library allocation
|
page read and write
|
||
31BA000
|
heap
|
page read and write
|
||
20DDC94F000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F73000
|
trusted library allocation
|
page read and write
|
||
17B97775000
|
heap
|
page read and write
|
||
7FFB4AA50000
|
trusted library allocation
|
page read and write
|
||
6EC000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
5298000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA64000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA80000
|
trusted library allocation
|
page execute and read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
D7D000
|
trusted library allocation
|
page execute and read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
477E000
|
stack
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
E89000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA77000
|
trusted library allocation
|
page read and write
|
||
48B1000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
5230000
|
heap
|
page read and write
|
||
55C5000
|
trusted library allocation
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
2F9D000
|
stack
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
2D251FE4000
|
unkown
|
page readonly
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
2D237B40000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
28DD14AA000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
20DDC960000
|
heap
|
page read and write
|
||
510F000
|
stack
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
1F300544000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
74FE000
|
stack
|
page read and write
|
||
44B0000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
28DD144A000
|
heap
|
page read and write
|
||
28DD14AA000
|
heap
|
page read and write
|
||
28DD20A2000
|
heap
|
page read and write
|
||
20DDD130000
|
unkown
|
page readonly
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F10000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
7AC7000
|
heap
|
page read and write
|
||
CB2000
|
heap
|
page read and write
|
||
673000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
2917E6B0000
|
heap
|
page execute and read and write
|
||
B9ABD7C000
|
stack
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA40000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
7FFB4ABA0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
1F300178000
|
trusted library allocation
|
page read and write
|
||
1F3000E0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
1F30077A000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
28DD1DC5000
|
heap
|
page read and write
|
||
5336000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AAC0000
|
trusted library allocation
|
page execute and read and write
|
||
2D237BDB000
|
heap
|
page read and write
|
||
683000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
34D0000
|
trusted library allocation
|
page read and write
|
||
28DD14B0000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
258CC61D000
|
trusted library allocation
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AAA0000
|
trusted library allocation
|
page execute and read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
B9AA87F000
|
stack
|
page read and write
|
||
713E000
|
stack
|
page read and write
|
||
28DD14C6000
|
heap
|
page read and write
|
||
7FFB4A920000
|
trusted library allocation
|
page read and write
|
||
20DF5A86000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
28DD1DD0000
|
heap
|
page read and write
|
||
7FFB4AAD0000
|
trusted library allocation
|
page execute and read and write
|
||
2D2521B1000
|
heap
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
5110000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
5100000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
258CBDF8000
|
heap
|
page read and write
|
||
69BE000
|
stack
|
page read and write
|
||
4480000
|
trusted library allocation
|
page read and write
|
||
7FFB4A910000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page read and write
|
||
B9A91FE000
|
stack
|
page read and write
|
||
7FFB4AAC0000
|
trusted library allocation
|
page execute and read and write
|
||
1F37F560000
|
heap
|
page read and write
|
||
7FFB4AB00000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
1F3000A1000
|
trusted library allocation
|
page read and write
|
||
487A000
|
heap
|
page read and write
|
||
7FFB4A890000
|
trusted library allocation
|
page read and write
|
||
7FFB4ABC0000
|
trusted library allocation
|
page execute and read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
1F37E5D7000
|
heap
|
page read and write
|
||
1F37E7C0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA59000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
2D2521BA000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
5240000
|
heap
|
page execute and read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6CCD7FE000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
28DD1492000
|
heap
|
page read and write
|
||
30DE000
|
stack
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
B9AAB68000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA13000
|
trusted library allocation
|
page read and write
|
||
764D000
|
stack
|
page read and write
|
||
46A7000
|
trusted library allocation
|
page execute and read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
28DD14C6000
|
heap
|
page read and write
|
||
1F37E170000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
28DD14AA000
|
heap
|
page read and write
|
||
7FFB4AA13000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
2D237900000
|
unkown
|
page readonly
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
B9AB37E000
|
stack
|
page read and write
|
||
258DC5F1000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
1F300780000
|
trusted library allocation
|
page read and write
|
||
6C70000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
7FFB4A8A4000
|
trusted library allocation
|
page read and write
|
||
DD916FE000
|
stack
|
page read and write
|
||
7500000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
7FFB4A882000
|
trusted library allocation
|
page read and write
|
||
28DD1507000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
28DD1DCE000
|
heap
|
page read and write
|
||
7FFB4AAD0000
|
trusted library allocation
|
page execute and read and write
|
||
319A000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
34E4000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
20DDC6C0000
|
unkown
|
page readonly
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
67C000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
28DD1DC9000
|
heap
|
page read and write
|
||
28DD1DFE000
|
heap
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
2D251E4F000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
28DD14C6000
|
heap
|
page read and write
|
||
1F3008E1000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
1F37F110000
|
unkown
|
page readonly
|
||
1F37E780000
|
heap
|
page execute and read and write
|
||
B9F000
|
stack
|
page read and write
|
||
1F37F112000
|
unkown
|
page readonly
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA20000
|
trusted library allocation
|
page read and write
|
||
2D2521BE000
|
heap
|
page read and write
|
||
B9AAC7B000
|
stack
|
page read and write
|
||
7FFB4A990000
|
trusted library allocation
|
page execute and read and write
|
||
258CC735000
|
trusted library allocation
|
page read and write
|
||
258E4F20000
|
heap
|
page read and write
|
||
6C50000
|
trusted library allocation
|
page execute and read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
6251000
|
trusted library allocation
|
page read and write
|
||
20DDC88B000
|
heap
|
page read and write
|
||
7FFB4AA40000
|
trusted library allocation
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
52AD000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
31BA000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
7FFB4A88B000
|
trusted library allocation
|
page execute and read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA30000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA10000
|
trusted library allocation
|
page read and write
|
||
51A0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AAB4000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
7FFB4A956000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4A87D000
|
trusted library allocation
|
page execute and read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
BDAF4FE000
|
stack
|
page read and write
|
||
6C40000
|
trusted library allocation
|
page read and write
|
||
1F30074E000
|
trusted library allocation
|
page read and write
|
||
B9AA57E000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
258CBE9A000
|
heap
|
page read and write
|
||
29110011000
|
trusted library allocation
|
page read and write
|
||
4720000
|
heap
|
page readonly
|
||
4E1E000
|
stack
|
page read and write
|
||
28DD14C2000
|
heap
|
page read and write
|
||
1F3001EE000
|
trusted library allocation
|
page read and write
|
||
F7E000
|
stack
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
28DD1DFF000
|
heap
|
page read and write
|
||
1F37DE30000
|
heap
|
page read and write
|
||
28DD13F0000
|
heap
|
page read and write
|
||
D74000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
28DD1464000
|
heap
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
7FFB4AAA7000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
3487000
|
heap
|
page read and write
|
||
6CCDBFE000
|
stack
|
page read and write
|
||
48A0000
|
heap
|
page execute and read and write
|
||
7FFB4A946000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
7FFB4A862000
|
trusted library allocation
|
page read and write
|
||
258DC5E1000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA53000
|
trusted library allocation
|
page read and write
|
||
2917DF2D000
|
heap
|
page read and write
|
||
7FFB4AC60000
|
trusted library allocation
|
page read and write
|
||
6F74000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
7FFB4A930000
|
trusted library allocation
|
page execute and read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
28DD14C6000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
20DDD132000
|
unkown
|
page readonly
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
B9A8D3E000
|
stack
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
1F3001AC000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
4B61000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
2D2521A7000
|
heap
|
page read and write
|
||
7FFB4A8CC000
|
trusted library allocation
|
page execute and read and write
|
||
498E000
|
stack
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
258E4E70000
|
heap
|
page read and write
|
||
1F37DE9A000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
7FFB4AA2D000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
258E4E60000
|
heap
|
page execute and read and write
|
||
28DD1507000
|
heap
|
page read and write
|
||
B9AA13D000
|
stack
|
page read and write
|
||
20DDC8E9000
|
heap
|
page read and write
|
||
28DD1493000
|
heap
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
1F300219000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
20DDC88E000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA60000
|
trusted library allocation
|
page read and write
|
||
4C02000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
5195000
|
trusted library allocation
|
page read and write
|
||
DD91EFC000
|
stack
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
7FFB4AAE0000
|
trusted library allocation
|
page execute and read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
28DD14C1000
|
heap
|
page read and write
|
||
694000
|
heap
|
page read and write
|
||
3535000
|
heap
|
page read and write
|
||
28DD1437000
|
heap
|
page read and write
|
||
61E000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6EA9000
|
trusted library allocation
|
page execute and read and write
|
||
4810000
|
heap
|
page read and write
|
||
CB7C9FE000
|
stack
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
17B97490000
|
heap
|
page read and write
|
||
28DD14C1000
|
heap
|
page read and write
|
||
258CC4F0000
|
heap
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
trusted library allocation
|
page read and write
|
||
17B974E0000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51DC000
|
trusted library allocation
|
page read and write
|
||
28DD1DB6000
|
heap
|
page read and write
|
||
DD91FFC000
|
stack
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
28DD152D000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
F15000
|
heap
|
page read and write
|
||
CB7CBFE000
|
stack
|
page read and write
|
||
6F34000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
2917DF55000
|
heap
|
page read and write
|
||
CB7CCFD000
|
stack
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
7FFB4A940000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA52000
|
trusted library allocation
|
page read and write
|
||
28DD2098000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
7FFB4A872000
|
trusted library allocation
|
page read and write
|
||
28DD1476000
|
heap
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA46000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
6CCD4FE000
|
stack
|
page read and write
|
||
7FFB4A946000
|
trusted library allocation
|
page execute and read and write
|
||
4670000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
B9A993D000
|
stack
|
page read and write
|
||
2D2521A3000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA15000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
2917DF57000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA3E000
|
trusted library allocation
|
page read and write
|
||
498000
|
stack
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
5195000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
4480000
|
trusted library allocation
|
page read and write
|
||
753F000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
351D000
|
heap
|
page read and write
|
||
487E000
|
stack
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
B9AC07D000
|
stack
|
page read and write
|
||
73BD000
|
stack
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
5332000
|
trusted library allocation
|
page read and write
|
||
B9AAD7B000
|
stack
|
page read and write
|
||
335E000
|
stack
|
page read and write
|
||
7FFB4AA30000
|
trusted library allocation
|
page read and write
|
||
359E000
|
stack
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
17B97470000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
4912000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
B9AA275000
|
stack
|
page read and write
|
||
6F7E000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
471E000
|
stack
|
page read and write
|
||
4DBB000
|
trusted library allocation
|
page execute and read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
5315000
|
trusted library allocation
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
6C70000
|
trusted library allocation
|
page read and write
|
||
46AB000
|
trusted library allocation
|
page execute and read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
CB7CFFE000
|
stack
|
page read and write
|
||
BDAF2FD000
|
stack
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
1F300784000
|
trusted library allocation
|
page read and write
|
||
2D251F50000
|
unkown
|
page readonly
|
||
31C8000
|
heap
|
page read and write
|
||
20DDD361000
|
trusted library allocation
|
page read and write
|
||
B9ABB7D000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
3685000
|
heap
|
page read and write
|
||
7010000
|
remote allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
6EA6000
|
trusted library allocation
|
page execute and read and write
|
||
2D2521D8000
|
heap
|
page read and write
|
||
7FFB4A920000
|
trusted library allocation
|
page execute and read and write
|
||
4420000
|
trusted library allocation
|
page read and write
|
||
331F000
|
stack
|
page read and write
|
||
1F30088D000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
4BF6000
|
trusted library allocation
|
page read and write
|
||
3528000
|
heap
|
page read and write
|
||
5103000
|
trusted library allocation
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
2D239862000
|
trusted library allocation
|
page read and write
|
||
518F000
|
stack
|
page read and write
|
||
C6A000
|
heap
|
page read and write
|
||
7FFB4A93C000
|
trusted library allocation
|
page execute and read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA50000
|
trusted library allocation
|
page read and write
|
||
7FFB4A87D000
|
trusted library allocation
|
page execute and read and write
|
||
47ED000
|
trusted library allocation
|
page execute and read and write
|
||
1F3000F8000
|
trusted library allocation
|
page read and write
|
||
7FFB4A976000
|
trusted library allocation
|
page execute and read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
28DD152D000
|
heap
|
page read and write
|
||
B9A9AB7000
|
stack
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
1F3000CC000
|
trusted library allocation
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
7AAC000
|
heap
|
page read and write
|
||
1F37E5C0000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4A884000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
1F3001B4000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
1F3000AD000
|
trusted library allocation
|
page read and write
|
||
28DD14AD000
|
heap
|
page read and write
|
||
2917E070000
|
heap
|
page read and write
|
||
2D2496F1000
|
trusted library allocation
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
2D237D05000
|
heap
|
page read and write
|
||
28DD14C6000
|
heap
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
BDAF1FE000
|
stack
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
7AA0000
|
heap
|
page read and write
|
||
66CDC7E000
|
stack
|
page read and write
|
||
C5D000
|
heap
|
page read and write
|
||
1F37E020000
|
heap
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
31C6000
|
heap
|
page read and write
|
||
7F6A0000
|
trusted library allocation
|
page execute and read and write
|
||
75CE000
|
stack
|
page read and write
|
||
2D237924000
|
unkown
|
page readonly
|
||
28DD2090000
|
heap
|
page read and write
|
||
1F3008AD000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA50000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
E1E000
|
stack
|
page read and write
|
||
442B000
|
heap
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
3145000
|
heap
|
page read and write
|
||
7FFB4A860000
|
trusted library allocation
|
page read and write
|
||
7FFB4A92C000
|
trusted library allocation
|
page execute and read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6CCD3FE000
|
stack
|
page read and write
|
||
20DDCAE0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
E5A000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
1F37F846000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
77CE000
|
stack
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
5170000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
20DF5AB4000
|
heap
|
page read and write
|
||
4884000
|
trusted library allocation
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
688000
|
heap
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
DD90DB5000
|
stack
|
page read and write
|
||
7FFB4A883000
|
trusted library allocation
|
page execute and read and write
|
||
5342000
|
trusted library allocation
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
28DD1492000
|
heap
|
page read and write
|
||
1F37EF70000
|
heap
|
page execute and read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
2D237A90000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
29100155000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
1F30089D000
|
trusted library allocation
|
page read and write
|
||
1F37E1B0000
|
heap
|
page read and write
|
||
20DDCAB0000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
28DD14D8000
|
heap
|
page read and write
|
||
1F300562000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
1F37E173000
|
trusted library allocation
|
page read and write
|
||
2910003B000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
1F300513000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
7010000
|
remote allocation
|
page read and write
|
||
7FFB4AA50000
|
trusted library allocation
|
page read and write
|
||
4D94000
|
trusted library allocation
|
page read and write
|
||
4673000
|
trusted library allocation
|
page execute and read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
2917E020000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
45FA000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
E6F000
|
heap
|
page read and write
|
||
7A8F000
|
stack
|
page read and write
|
||
50E0000
|
trusted library allocation
|
page read and write
|
||
BDAF5FE000
|
stack
|
page read and write
|
||
7FFB4A873000
|
trusted library allocation
|
page execute and read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
7FFB4A894000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
33B7000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
319C000
|
heap
|
page read and write
|
||
6CCDAFE000
|
stack
|
page read and write
|
||
6C60000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
4B58000
|
trusted library allocation
|
page read and write
|
||
28DD1DEC000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
28DD1507000
|
heap
|
page read and write
|
||
1F37DE00000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
1F300557000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
33B0000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
B9AA03D000
|
stack
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
1F3000E4000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA89000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC70000
|
trusted library allocation
|
page read and write
|
||
94578FE000
|
stack
|
page read and write
|
||
4940000
|
heap
|
page execute and read and write
|
||
2D251E13000
|
heap
|
page read and write
|
||
5230000
|
remote allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
28DD1DA7000
|
heap
|
page read and write
|
||
17B97770000
|
heap
|
page read and write
|
||
7FFB4AA1D000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
1F37F1BE000
|
unkown
|
page readonly
|
||
28DD148C000
|
heap
|
page read and write
|
||
20DDC770000
|
heap
|
page read and write
|
||
4917000
|
trusted library allocation
|
page execute and read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
E73000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
B9A963E000
|
stack
|
page read and write
|
||
6CCD5FD000
|
stack
|
page read and write
|
||
1F37EFA0000
|
heap
|
page execute and read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
E5F000
|
stack
|
page read and write
|
||
258CC010000
|
trusted library allocation
|
page read and write
|
||
28DD1DBB000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
47D0000
|
trusted library allocation
|
page read and write
|
||
1F300801000
|
trusted library allocation
|
page read and write
|
||
28DD208E000
|
heap
|
page read and write
|
||
258CC085000
|
heap
|
page read and write
|
||
28DD14C6000
|
heap
|
page read and write
|
||
7FFB4AB30000
|
trusted library allocation
|
page execute and read and write
|
||
1F3008E8000
|
trusted library allocation
|
page read and write
|
||
66CDD7E000
|
stack
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
7FFB4A878000
|
trusted library allocation
|
page read and write
|
||
7FFB4A88D000
|
trusted library allocation
|
page execute and read and write
|
||
28DD152D000
|
heap
|
page read and write
|
||
28DD14C6000
|
heap
|
page read and write
|
||
1F3006E8000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
28DD14C6000
|
heap
|
page read and write
|
||
28DD1DD6000
|
heap
|
page read and write
|
||
B9AAE78000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
47E0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
4480000
|
trusted library allocation
|
page read and write
|
||
4DB2000
|
trusted library allocation
|
page read and write
|
||
7FFB4AB50000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
2D251E8D000
|
heap
|
page read and write
|
||
7FFB4AA40000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
28DD2190000
|
heap
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
4890000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
1F300782000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
1F300063000
|
trusted library allocation
|
page read and write
|
||
4A7E000
|
stack
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6F35000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6DD000
|
heap
|
page read and write
|
||
4AF3000
|
trusted library allocation
|
page read and write
|
||
2917DE80000
|
heap
|
page read and write
|
||
28DD209F000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
71FD000
|
stack
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
7508000
|
heap
|
page read and write
|
||
7FFB4AA23000
|
trusted library allocation
|
page read and write
|
||
6F10000
|
trusted library allocation
|
page read and write
|
||
5DE000
|
stack
|
page read and write
|
||
28DD1507000
|
heap
|
page read and write
|
||
7FFB4AA60000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
1F37EF4B000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4A8A0000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
2D237B20000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
CB7D4FE000
|
stack
|
page read and write
|
||
28DD1310000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
7AD4000
|
heap
|
page read and write
|
||
28DD1452000
|
heap
|
page read and write
|
||
1F37F502000
|
heap
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
1F3002A1000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
2917DEB5000
|
heap
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
B9AA679000
|
stack
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4A966000
|
trusted library allocation
|
page execute and read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
28DD152D000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
28DD1492000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
758000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA8D000
|
trusted library allocation
|
page read and write
|
||
7FFB4A863000
|
trusted library allocation
|
page execute and read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
20DDD33F000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
1F3000FA000
|
trusted library allocation
|
page read and write
|
||
B9AB877000
|
stack
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
7FFB4AA90000
|
trusted library allocation
|
page read and write
|
||
28DD208A000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
B9AA47B000
|
stack
|
page read and write
|
||
2917DF15000
|
heap
|
page read and write
|
||
5230000
|
remote allocation
|
page read and write
|
||
6EAC000
|
trusted library allocation
|
page execute and read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
1F300638000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
B9A9E27000
|
stack
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
1F3008E3000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
28DD1DEC000
|
heap
|
page read and write
|
||
28DD2083000
|
heap
|
page read and write
|
||
1F37DED4000
|
heap
|
page read and write
|
||
B9AB77D000
|
stack
|
page read and write
|
||
2D237D00000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
CAE000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
2917DD80000
|
heap
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
1F30008F000
|
trusted library allocation
|
page read and write
|
||
28DD1DB4000
|
heap
|
page read and write
|
||
3490000
|
heap
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
4674000
|
trusted library allocation
|
page read and write
|
||
4AFD000
|
trusted library allocation
|
page execute and read and write
|
||
6F3C000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
3170000
|
heap
|
page read and write
|
||
73FF000
|
stack
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
B9A997F000
|
unkown
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA6B000
|
trusted library allocation
|
page read and write
|
||
2917DFB6000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
1F30055C000
|
trusted library allocation
|
page read and write
|
||
7EE10000
|
trusted library allocation
|
page execute and read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
28DD1DA0000
|
heap
|
page read and write
|
||
1F3008EA000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
5170000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC90000
|
trusted library allocation
|
page read and write
|
||
6CCD9FE000
|
stack
|
page read and write
|
||
317E000
|
stack
|
page read and write
|
||
7FFB4A8B0000
|
trusted library allocation
|
page read and write
|
||
20DDC6EC000
|
unkown
|
page readonly
|
||
28DD20A6000
|
heap
|
page read and write
|
||
2910003F000
|
trusted library allocation
|
page read and write
|
||
20DF5A84000
|
heap
|
page read and write
|
||
B9A92FE000
|
stack
|
page read and write
|
||
7FFB4AAB0000
|
trusted library allocation
|
page read and write
|
||
258CC70C000
|
trusted library allocation
|
page read and write
|
||
51D1000
|
trusted library allocation
|
page read and write
|
||
1F30055E000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
1F3001A8000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
66CD93D000
|
stack
|
page read and write
|
||
9457A7B000
|
stack
|
page read and write
|
||
4A3C000
|
stack
|
page read and write
|
||
3187000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
5120000
|
trusted library allocation
|
page execute and read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
693E000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
28DD1DA5000
|
heap
|
page read and write
|
||
28DD1DC2000
|
heap
|
page read and write
|
||
DC0000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
2917E000000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
DD91DFD000
|
stack
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
258CC0A5000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
1F300180000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
20DDCB55000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
7FFB4A956000
|
trusted library allocation
|
page execute and read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
28DD1E0D000
|
heap
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
5230000
|
remote allocation
|
page read and write
|
||
7FFB4A890000
|
trusted library allocation
|
page read and write
|
||
20DDCB48000
|
unkown
|
page readonly
|
||
2DDC000
|
stack
|
page read and write
|
||
4B00000
|
heap
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
2D251E84000
|
heap
|
page read and write
|
||
B9ABE7D000
|
stack
|
page read and write
|
||
2D237AD0000
|
heap
|
page read and write
|
||
7F6B8000
|
trusted library allocation
|
page execute and read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
28DD1E1D000
|
heap
|
page read and write
|
||
ECC000
|
stack
|
page read and write
|
||
1F3000D0000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
52E3000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
4B6D000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
4A80000
|
trusted library allocation
|
page execute and read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
17B97460000
|
heap
|
page read and write
|
||
7FFB4AAC0000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
20DF59C0000
|
heap
|
page execute and read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
20DED21D000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA70000
|
trusted library allocation
|
page read and write
|
||
5199000
|
trusted library allocation
|
page read and write
|
||
52E6000
|
trusted library allocation
|
page read and write
|
||
28DD1507000
|
heap
|
page read and write
|
||
258CC723000
|
trusted library allocation
|
page read and write
|
||
258CBDF0000
|
heap
|
page read and write
|
||
2D251EAE000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
5200000
|
trusted library allocation
|
page execute and read and write
|
||
1F300803000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
49E8000
|
trusted library allocation
|
page read and write
|
||
52B1000
|
trusted library allocation
|
page read and write
|
||
28DD152D000
|
heap
|
page read and write
|
||
7030000
|
heap
|
page execute and read and write
|
||
6F7C000
|
trusted library allocation
|
page read and write
|
||
28DD1439000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4A875000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
303C000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
BDAF6FE000
|
stack
|
page read and write
|
||
1F300519000
|
trusted library allocation
|
page read and write
|
||
28DD1463000
|
heap
|
page read and write
|
||
4915000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AA80000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
28DD14AD000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
20DDCAB5000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6C2E000
|
stack
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA55000
|
trusted library allocation
|
page read and write
|
||
E60000
|
heap
|
page readonly
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
4BD5000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA36000
|
trusted library allocation
|
page read and write
|
||
28DD1DFE000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
28DD2000000
|
heap
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
363E000
|
stack
|
page read and write
|
||
7FFB4AA20000
|
trusted library allocation
|
page read and write
|
||
717E000
|
stack
|
page read and write
|
||
7FFB4AA90000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA80000
|
trusted library allocation
|
page read and write
|
||
D70000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
6C30000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
DD924FB000
|
stack
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
1F3007FF000
|
trusted library allocation
|
page read and write
|
||
2917E570000
|
heap
|
page read and write
|
||
28DD1DD2000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
7FFB4A870000
|
trusted library allocation
|
page read and write
|
||
774E000
|
stack
|
page read and write
|
||
F30000
|
trusted library allocation
|
page read and write
|
||
1F30051D000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
2917DFD0000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
7A4E000
|
stack
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
5040000
|
trusted library allocation
|
page read and write
|
||
B9AA369000
|
stack
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
1F300547000
|
trusted library allocation
|
page read and write
|
||
7FFB4A89D000
|
trusted library allocation
|
page execute and read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
47F4000
|
trusted library allocation
|
page read and write
|
||
7FFB4AB20000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
1F3000C8000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
1F3008DD000
|
trusted library allocation
|
page read and write
|
||
467D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AA70000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA80000
|
trusted library allocation
|
page read and write
|
||
2D2379B0000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
508F000
|
stack
|
page read and write
|
||
5170000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
28DD2082000
|
heap
|
page read and write
|
||
28DD1E15000
|
heap
|
page read and write
|
||
4FCC000
|
stack
|
page read and write
|
||
33DE000
|
stack
|
page read and write
|
||
1F310001000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
319E000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
9457AFE000
|
stack
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6CCDCFD000
|
stack
|
page read and write
|
||
28DD1DB4000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
36E5000
|
heap
|
page read and write
|
||
28DD1492000
|
heap
|
page read and write
|
||
1F30024D000
|
trusted library allocation
|
page read and write
|
||
258DC5ED000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA89000
|
trusted library allocation
|
page read and write
|
||
7FFB4A893000
|
trusted library allocation
|
page read and write
|
||
31BA000
|
heap
|
page read and write
|
||
28DD1DCA000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
1F300805000
|
trusted library allocation
|
page read and write
|
||
7FFB4A930000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
31CF000
|
heap
|
page read and write
|
||
34E3000
|
trusted library allocation
|
page execute and read and write
|
||
CB7D3FD000
|
stack
|
page read and write
|
||
7FFB4A893000
|
trusted library allocation
|
page execute and read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
2D251E74000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
28DD2097000
|
heap
|
page read and write
|
||
6C90000
|
heap
|
page execute and read and write
|
||
2D252237000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
4ADE000
|
stack
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
7ADF000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
4480000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
65A000
|
heap
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
CB7C8F1000
|
stack
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
C3A000
|
heap
|
page read and write
|
||
28DD150A000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
71B000
|
stack
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
29100143000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA55000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
F8E000
|
stack
|
page read and write
|
||
2D2521C5000
|
heap
|
page read and write
|
||
2D251E20000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
6F71000
|
trusted library allocation
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
28DD1430000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
28DD14D8000
|
heap
|
page read and write
|
||
2D239868000
|
trusted library allocation
|
page read and write
|
||
28DD152D000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page execute and read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
1F37F50B000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
1F300517000
|
trusted library allocation
|
page read and write
|
||
DD91CFC000
|
stack
|
page read and write
|
||
1F37F38C000
|
heap
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
9457BFD000
|
stack
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
28DD2084000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
7AC0000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA30000
|
trusted library allocation
|
page read and write
|
||
6F71000
|
trusted library allocation
|
page read and write
|
||
7FFB4A980000
|
trusted library allocation
|
page execute and read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
B9A95E9000
|
stack
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
46C0000
|
heap
|
page read and write
|
||
28DD2085000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
BED000
|
stack
|
page read and write
|
||
7FFB4A91C000
|
trusted library allocation
|
page execute and read and write
|
||
9C7000
|
stack
|
page read and write
|
||
34ED000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4A88D000
|
trusted library allocation
|
page execute and read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
4419000
|
trusted library allocation
|
page execute and read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
28DD1DA2000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
2D2521F1000
|
heap
|
page read and write
|
||
697E000
|
stack
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
6E8E000
|
stack
|
page read and write
|
||
20DDD353000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA96000
|
trusted library allocation
|
page read and write
|
||
7FFB4AB40000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
20DDC980000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
1F300807000
|
trusted library allocation
|
page read and write
|
||
514E000
|
stack
|
page read and write
|
||
28DD14C6000
|
heap
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
6EA3000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
47F0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F35000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
3538000
|
heap
|
page read and write
|
||
6F35000
|
trusted library allocation
|
page read and write
|
||
2D252192000
|
heap
|
page read and write
|
||
CB7CEFF000
|
stack
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
28DD20A6000
|
heap
|
page read and write
|
||
5106000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4A8AD000
|
trusted library allocation
|
page execute and read and write
|
||
DD919FE000
|
stack
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
7FC30000
|
trusted library allocation
|
page execute and read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
1F310081000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
1F3008E6000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
20DDCB30000
|
unkown
|
page readonly
|
||
E97000
|
heap
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
BDAF9FD000
|
stack
|
page read and write
|
||
1F310013000
|
trusted library allocation
|
page read and write
|
||
28DD1DCA000
|
heap
|
page read and write
|
||
7FFB4AA27000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4A94C000
|
trusted library allocation
|
page execute and read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
258CBDEE000
|
heap
|
page read and write
|
||
2917F010000
|
heap
|
page execute and read and write
|
||
51D0000
|
trusted library allocation
|
page execute and read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA79000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
28DD1437000
|
heap
|
page read and write
|
||
28DD1DD0000
|
heap
|
page read and write
|
||
28DD152D000
|
heap
|
page read and write
|
||
28DD143B000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
2D237B56000
|
heap
|
page read and write
|
||
28DD208B000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
3680000
|
heap
|
page read and write
|
||
28DD152D000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
94579FF000
|
stack
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA46000
|
trusted library allocation
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
1F3000D8000
|
trusted library allocation
|
page read and write
|
||
2D2496FF000
|
trusted library allocation
|
page read and write
|
||
4440000
|
trusted library allocation
|
page read and write
|
||
BDAEEF1000
|
stack
|
page read and write
|
||
F6F000
|
stack
|
page read and write
|
||
51F4000
|
trusted library allocation
|
page read and write
|
||
B9AA97F000
|
stack
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA55000
|
trusted library allocation
|
page read and write
|
||
1F3000BF000
|
trusted library allocation
|
page read and write
|
||
7FFB4AAD0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
2D2521DC000
|
heap
|
page read and write
|
||
7FFB4AA2E000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
4BA6000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
35B6000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6255000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
28DD1507000
|
heap
|
page read and write
|
||
7FFB4AA36000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
2917EEE0000
|
heap
|
page read and write
|
||
2917DE60000
|
heap
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
7FFB4A89D000
|
trusted library allocation
|
page execute and read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6CCD2FE000
|
stack
|
page read and write
|
||
DD912FF000
|
stack
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
20DDC8C2000
|
heap
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
1F37E730000
|
unkown
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA00000
|
trusted library allocation
|
page read and write
|
||
1F300081000
|
trusted library allocation
|
page read and write
|
||
7FFB4A873000
|
trusted library allocation
|
page execute and read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA60000
|
trusted library allocation
|
page read and write
|
||
1F3008C5000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
2D237BDD000
|
heap
|
page read and write
|
||
5220000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
CB7D0FE000
|
stack
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
7FFB4A894000
|
trusted library allocation
|
page read and write
|
||
7FFB4A99B000
|
trusted library allocation
|
page execute and read and write
|
||
BDAF0FE000
|
stack
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
7FFB4AAD0000
|
trusted library allocation
|
page execute and read and write
|
||
31CA000
|
heap
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
1F300752000
|
trusted library allocation
|
page read and write
|
||
28DD16F0000
|
heap
|
page read and write
|
||
1F37E160000
|
trusted library allocation
|
page read and write
|
||
7FFB4A884000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
B15000
|
heap
|
page read and write
|
||
1F30054D000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7FFB4AAA0000
|
trusted library allocation
|
page read and write
|
||
7010000
|
remote allocation
|
page read and write
|
||
1F300515000
|
trusted library allocation
|
page read and write
|
||
1F37F362000
|
heap
|
page read and write
|
||
28DD14C6000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
DD918FE000
|
stack
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
71BE000
|
stack
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
2917DEF6000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
20DF59D0000
|
heap
|
page read and write
|
||
2917E075000
|
heap
|
page read and write
|
||
28DD14AD000
|
heap
|
page read and write
|
||
7FFB4A9A0000
|
trusted library allocation
|
page execute and read and write
|
||
1F37F800000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
7FFB4A880000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
7FFB4A8B4000
|
trusted library allocation
|
page read and write
|
||
2D237900000
|
unkown
|
page readonly
|
||
7FFB4A926000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
7FFB4AAB0000
|
trusted library allocation
|
page read and write
|
||
47E3000
|
trusted library allocation
|
page execute and read and write
|
||
28DD1507000
|
heap
|
page read and write
|
||
C2E000
|
stack
|
page read and write
|
||
6F81000
|
trusted library allocation
|
page read and write
|
||
74BE000
|
stack
|
page read and write
|
||
28DD1507000
|
heap
|
page read and write
|
||
28DD1492000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
2D237AB0000
|
heap
|
page read and write
|
||
7F290000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4A8DC000
|
trusted library allocation
|
page execute and read and write
|
||
2D237B9B000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
28DD150A000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
258CC70F000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
D80000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
49CE000
|
stack
|
page read and write
|
||
6F94000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page execute and read and write
|
||
310F000
|
unkown
|
page read and write
|
||
7FFB4A8CC000
|
trusted library allocation
|
page execute and read and write
|
||
28DD1DC4000
|
heap
|
page read and write
|
||
4730000
|
heap
|
page read and write
|
||
258CBCB0000
|
heap
|
page read and write
|
||
4FF0000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
1F3000E8000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
258CC61B000
|
trusted library allocation
|
page read and write
|
||
7FFB4AB80000
|
trusted library allocation
|
page read and write
|
||
CB7CAFE000
|
stack
|
page read and write
|
||
CB7D2FE000
|
stack
|
page read and write
|
||
1F37EE9F000
|
heap
|
page read and write
|
||
7FFB4AA32000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
28DD14C2000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
4942000
|
heap
|
page read and write
|
||
5160000
|
heap
|
page read and write
|
||
2D2521EC000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA10000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
D60000
|
trusted library allocation
|
page read and write
|
||
52EB000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
trusted library allocation
|
page read and write
|
||
1F37F371000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
1F300640000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
258CC61F000
|
trusted library allocation
|
page read and write
|
||
258CC080000
|
heap
|
page read and write
|
||
4480000
|
trusted library allocation
|
page read and write
|
||
BDAF7FE000
|
stack
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
258E4EBE000
|
heap
|
page read and write
|
||
1F300549000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
1F37F3CA000
|
heap
|
page read and write
|
||
7FFB4A88D000
|
trusted library allocation
|
page execute and read and write
|
||
B9AB07C000
|
stack
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
28DD1DD9000
|
heap
|
page read and write
|
||
945787E000
|
stack
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
1F3006EE000
|
trusted library allocation
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
345F000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
5194000
|
trusted library allocation
|
page read and write
|
||
1F37EF60000
|
trusted library allocation
|
page read and write
|
||
DD922FC000
|
stack
|
page read and write
|
||
45AE000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
E89000
|
heap
|
page read and write
|
||
51D4000
|
trusted library allocation
|
page read and write
|
||
2D2395D0000
|
heap
|
page read and write
|
||
51DE000
|
trusted library allocation
|
page read and write
|
||
2D251E86000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
1F300067000
|
trusted library allocation
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
F67000
|
stack
|
page read and write
|
||
1F30054F000
|
trusted library allocation
|
page read and write
|
||
28DD208A000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA4A000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
1F37F347000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
E97000
|
heap
|
page read and write
|
||
6FC0000
|
trusted library allocation
|
page read and write
|
||
504D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4A8AD000
|
trusted library allocation
|
page execute and read and write
|
||
33CE000
|
stack
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
20DDD365000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
20DDC6C0000
|
unkown
|
page readonly
|
||
2917EFA7000
|
heap
|
page read and write
|
||
28DD1DD6000
|
heap
|
page read and write
|
||
7FFB4A870000
|
trusted library allocation
|
page read and write
|
||
F2B000
|
stack
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
1F30054B000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
4A90000
|
trusted library allocation
|
page read and write
|
||
2910003D000
|
trusted library allocation
|
page read and write
|
||
7520000
|
heap
|
page read and write
|
||
4410000
|
trusted library allocation
|
page read and write
|
||
7ACD000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
58B1000
|
trusted library allocation
|
page read and write
|
||
2911000D000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
B9AA77D000
|
stack
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
1F30005B000
|
trusted library allocation
|
page read and write
|
||
1F37FC00000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
1F3001A4000
|
trusted library allocation
|
page read and write
|
||
20DDC8A8000
|
heap
|
page read and write
|
||
28DD152D000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
5043000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
760E000
|
stack
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
7FFB4A874000
|
trusted library allocation
|
page read and write
|
||
4FD0000
|
trusted library allocation
|
page execute and read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
258CBED0000
|
heap
|
page read and write
|
||
723E000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
There are 2229 hidden memdumps, click here to show them.