Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
ReceitaFederal-consulta-yFZMA-45896_v.3_35687.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
initial sample
|
||
C:\Config.Msi\5b113c.rbs
|
data
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\BouncyCastle.Crypto.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\System.ValueTuple.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI1264.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI1264.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI1766.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI1766.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI2D41.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI2D41.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI2FB3.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSI489E.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
modified
|
||
C:\Windows\Installer\MSI489E.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\System32\InstallUtil.InstallLog
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\~DF31BE93D7FB3585D0.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF552422D476BA62BF.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF5892DD4D99EE3C15.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF906A73D282F9BD42.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFBEDEA443DEFE141C.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFD7B20DF7F70954E9.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallState
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation.zip
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.ini
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AteraAgent.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\Installer\5b113b.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\5b113d.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\MSI1264.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSI1264.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI1264.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI1264.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI1766.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSI1766.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI1766.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI1766.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI2D41.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSI2D41.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI2D41.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI2D41.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI2FC4.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI3022.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI30EE.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI489E.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSI489E.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI489E.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI489E.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SourceHash{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BA74182F76F15A9CF514DEF352303C95
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
Certificate, Version=3
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
|
Certificate, Version=3
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
|
data
|
modified
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BA74182F76F15A9CF514DEF352303C95
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageAgentInformation.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\System32\wbem\Performance\WmiApRpl_new.h
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Windows\Temp\~DF01E4E76D878D1653.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF0426518AB89A8377.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF2CA74992EDE38C80.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF5FF21C21BB2C0656.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFA010BDBBBF13E899.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFECD76EAE3C39B413.TMP
|
data
|
dropped
|
||
\Device\ConDrv
|
JSON data
|
dropped
|
There are 74 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI1264.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5968562 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI1766.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5969828 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI2D41.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5975390 11 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="lauraclima92@gmail.com" /CompanyId="1"
/IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000MAUEiIAP" /AgentId="ca4f6eb7-da88-4119-8d72-16266eeb5dd4"
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI489E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5982406 33 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
ca4f6eb7-da88-4119-8d72-16266eeb5dd4 "40d7881e-bac7-4bc1-a310-af4ec03e6c5c" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000MAUEiIAP
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
ca4f6eb7-da88-4119-8d72-16266eeb5dd4 "4d432fbf-e66a-4222-84c5-bc3b68a3273b" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000MAUEiIAP
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
ca4f6eb7-da88-4119-8d72-16266eeb5dd4 "47be830f-d7d7-401a-87fc-8b93e37bf80a" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000MAUEiIAP
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\ReceitaFederal-consulta-yFZMA-45896_v.3_35687.msi"
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding BEDEEE6C5E800683486D45882C70B787
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding F32542BB014FEC02096438D522414E5D E Global\MSI0000
|
||
C:\Windows\SysWOW64\net.exe
|
"NET" STOP AteraAgent
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\net1.exe
|
C:\Windows\system32\net1 STOP AteraAgent
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"TaskKill.exe" /f /im AteraAgent.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
"C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WMIADAP.exe
|
wmiadap.exe /F /T /R
|
There are 14 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://ps.atera.com/agentpackagesmac/AgentPackageWindowsUpdate/24.6/AgentPackageWindowsUpdate.zip
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageSTRemote/16.0/AgentPackageSTRemote.zip
|
unknown
|
||
http://schemas.datacontract.org
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageMonitoring/22.0/AgentPackageMonitoring.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageMarketplace/1.6/AgentPackageMarketplace.zip
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=0f23dd88-0fc7-4a6a-9b6f-a8e42f785442&tt=0&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
|
13.232.67.198
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageInternalPoller/13.0/AgentPackageInternalPoller.zip
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetRecurringPackagesected.
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetRecurringPackagesseTaskFactory/sub-c-a02ceca8-a958-1
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ca4f6eb7-da88-4119-8d72
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageInternalPoller/15.9/AgentPackageInternalPoller.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=c89efe78-d68a-44aa-b962-a0da30029aef&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
|
13.232.67.198
|
||
https://ps.atera.com/agentpackageswin/AgentPackageUpgradeAgent/22.1/AgentPackageUpgradeAgent.zip
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/track-event
|
unknown
|
||
http://dl.google.com/googletalk/googletalk-setup.exe
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageADRemote/6.0/AgentPackageADRemote.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=0b64e705-668e-465a-845d-ea16cbb2791c&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
|
13.232.67.198
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageMarketplace/1.6/AgentPackageMarketplace.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=69f1cfdc-a5c4-4346-9133-ec4ebbe57718&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=a0accb58-72c6-4bcd-b5e6-5bf070d2bbb5&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
|
13.232.67.198
|
||
https://agent-api.atera.com/Production/Agent/
|
unknown
|
||
http://schemas.datacontract.org/2004/07/System.ServiceProcess
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=59dc8d89-7bee-4d36-a28b-270400da27e0&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
|
13.232.67.198
|
||
http://wixtoolset.org
|
unknown
|
||
https://agent-api.atera.com/Production
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageSystemTools/27.8/AgentPackageSystemTools.zip
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageRuntimeInstaller/13.0/AgentPackageRuntimeInstaller
|
unknown
|
||
http://acontrol.atera.com/
|
unknown
|
||
https://ps.pndsn.com
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageADRemote/6.0/AgentPackageADRemote.zip
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ca4f6eb7
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetRecurringPackagesseTaskFactorya02ceca8-a958-11e5-bd8
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageNetworkDiscovery/23.9/AgentPackageNetworkDiscove
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=2d83b3c6-7779-408a-91cc-201421fcc115&tr=31&tt=17324434371950064&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=432189bc-183c-4c40-a56b-6e5a68b3917f&tr=31&tt=17324433983044696&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
|
13.232.67.198
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=83d4ff7e-819b-463d-a1d8-c1180d5bfe08
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageMonitoring/37.8/AgentPackageMonitoring.zip
|
unknown
|
||
http://agent-api.atera.com
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageSystemTools/27.8/AgentPackageSystemTools.zip
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=b092b222-e28c-4cbf-b2ce-1ad35a4da96f&tr=31&tt=17324434136474401&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=87de8078-9f58-41e2-9c51-2e34fbeb83af&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
|
13.232.67.198
|
||
https://agent-api.atera.com/Production/Agent/GetRecurrin
|
unknown
|
||
http://schemas.datacontract.org/2004/07/
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=3eaa9905-10e5-43ca-a5ec-3f04289fa0f4&tt=0&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=7abf71f1-a15a-4c21-a35a-f3e49209c1fb&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
|
13.232.67.198
|
||
https://github.com/icsharpcode/SharpZipLib
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageNetworkDiscovery/15.0/AgentPackageNetworkDiscovery
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=9887171e-f6b2-4985-868a-76f8a9ac9c69&tr=31&tt=17324433983044696&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
|
13.232.67.198
|
||
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageAgentI
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
|
unknown
|
||
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageHeartbeat/17.11/AgentPackageHeartbeat.zip
|
unknown
|
||
http://ciCertTrustedimeStampingCA.cr0$
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageTaskScheduler/17.2/AgentPackageTaskScheduler.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageTicketing/30.1/AgentPackageTicketing.zip
|
unknown
|
||
https://agent-api.atera.com
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/AgentStarting
|
unknown
|
||
http://www.w3.oh
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=8dc1d376-2e7b-4680-b35a-6e4e965362d5&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
|
13.232.67.198
|
||
https://agent-api.atera.com/Production/Agent/GetCommands
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=8d3291ed-c39f-4716-80d8-7d0a2db2f535&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
|
13.232.67.198
|
||
https://ps.atera.com/agentpackageswin/AgentPackageTicketing/18.9/AgentPackageTicketing.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=b90d88ed-90a0-4d85-a3f0-2431379878e6&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
|
13.232.67.198
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=af1c8f78-a8fb-4782-9e02-8522647fac57
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageHeartbeat/16.9/AgentPackageHeartbeat.zip
|
unknown
|
||
https://agent-api.atera.com/
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetRecurringPackages
|
unknown
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.Availability/13.0/Agent.Package.Availability.zip
|
unknown
|
||
https://www.newtonsoft.com/jsonschema
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageRuntimeInstaller/1.5/AgentPackageRuntimeInstaller.
|
unknown
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.Watchdog/13.0/Agent.Package.Watchdog.zip
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetRecurringPackagesiChannelSubscribeRequestk.server.
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=ab4cb35d-22c9-4fd4-8e1d-46a28fd23be0&tr=31&tt=17324433393200501&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
|
13.232.67.198
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.Availability/0.16/Agent.Package.Availability.z
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=49524d65-4fb1-4bb1-9c7b-f5d3e2dbe3f7&tr=31&tt=17324433418622730&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
|
13.232.67.198
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=af1c8f78-a8fb-4782-9e02-8522647fac57&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
|
13.232.67.198
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageAgentInformation/38.0/AgentPackageAgentInformation.zip?yFk+9uu9aja3RXZs7wXkvbKodLamRoX+E2lNjbQETmCf6sqL8+70SxX20aW8U680
|
108.158.75.12
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageUpgradeAgent/27.6/AgentPackageUpgradeAgent.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageSTRemote/24.2/AgentPackageSTRemote.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=c89efe78-d68a-44aa-b962-a0da30029aef
|
unknown
|
||
https://www.newtonsoft.com/json
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageHeartbeat/16.9
|
unknown
|
||
http://wixtoolset.org/news/
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=e628df81-96dc-46ed-9afe-0cd2a51d1679&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
|
13.232.67.198
|
||
https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=0162374f-2552-479f-be18-4b11df053a72&tt=0&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
|
13.232.67.198
|
||
https://ps.atera.com/agentpackageswin/AgentPackageAgentInformation/22.7/AgentPackageAgentInformation
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageOsUpdates/20.9/AgentPackageOsUpdates.zip
|
unknown
|
||
https://agent-api.aterD
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageNetworkDiscovery/13.0/AgentPackageNetworkDiscovery
|
unknown
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.IotPoc/13.0/Agent.Package.IotPoc.zip
|
unknown
|
||
https://agent-api.atera.com/Pro
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/AcknowledgeCommands
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageTaskScheduler/13.0/AgentPackageTaskScheduler.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=65e5bee7-d50d-4689-beb6-7331ad74953a&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
|
13.232.67.198
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ps.pndsn.com
|
13.232.67.198
|
||
bg.microsoft.map.fastly.net
|
199.232.214.172
|
||
d25btwd9wax8gu.cloudfront.net
|
108.158.75.12
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
||
windowsupdatebg.s.llnwi.net
|
178.79.238.0
|
||
ps.atera.com
|
unknown
|
||
agent-api.atera.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
13.232.67.198
|
ps.pndsn.com
|
United States
|
||
108.158.75.12
|
d25btwd9wax8gu.cloudfront.net
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\5b113c.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\5b113c.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB9EFD7FDAF9AD115987000E181661F5
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CD868C8CE5A308147ABB306D829266BC
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C32B8CE0327C1E141950B4C9C2AD4DA7
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D9B1B1F0B1FC024D9390FE4B94D97D5
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\007F59F54ACD08842B2D98A10E6D1E3A
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB25C26F7C51D3C4AA2BED5600F46956
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01010F83113E72A4C81AD77422D2F947
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01D9DC4B27DFC0340B543A11D3CEBE07
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\ATERA Networks\AteraAgent\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\ATERA Networks\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\7D0A237E2F2A7564CA141B792446E854
|
INSTALLFOLDER_files_Feature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Features
|
INSTALLFOLDER_files_Feature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
|
LastUsedSource
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
|
AutoBackupLogFiles
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AteraAgent
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
AccountId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
IntegratorLogin
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
CompanyId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
AgentId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
ServerName
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AlphaAgent
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
FileDirectory
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
FileDirectory
|
There are 135 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4431000
|
trusted library allocation
|
page read and write
|
||
1DA9D403000
|
trusted library allocation
|
page read and write
|
||
1CAEF92B000
|
heap
|
page read and write
|
||
14C228FB000
|
heap
|
page read and write
|
||
4374000
|
trusted library allocation
|
page read and write
|
||
17748910000
|
heap
|
page read and write
|
||
1CAEF8E0000
|
heap
|
page read and write
|
||
294806F6000
|
trusted library allocation
|
page read and write
|
||
1CAF0860000
|
heap
|
page read and write
|
||
14C08440000
|
heap
|
page read and write
|
||
294806B5000
|
trusted library allocation
|
page read and write
|
||
1DA9D3D7000
|
trusted library allocation
|
page read and write
|
||
14C09F29000
|
trusted library allocation
|
page read and write
|
||
40CE000
|
heap
|
page read and write
|
||
1CAEF8A0000
|
heap
|
page read and write
|
||
2948006E000
|
trusted library allocation
|
page read and write
|
||
14C080CC000
|
heap
|
page read and write
|
||
1DA9CBD9000
|
heap
|
page read and write
|
||
29480702000
|
trusted library allocation
|
page read and write
|
||
14C09F52000
|
trusted library allocation
|
page read and write
|
||
14C0A01C000
|
trusted library allocation
|
page read and write
|
||
14C22890000
|
heap
|
page read and write
|
||
17749143000
|
trusted library allocation
|
page read and write
|
||
294E9A78000
|
heap
|
page read and write
|
||
294EAA7C000
|
heap
|
page read and write
|
||
14C09FD2000
|
trusted library allocation
|
page read and write
|
||
294EAEAF000
|
heap
|
page read and write
|
||
1DA9CBF0000
|
heap
|
page read and write
|
||
1DA9CC0C000
|
heap
|
page read and write
|
||
4D48000
|
heap
|
page read and write
|
||
29480001000
|
trusted library allocation
|
page read and write
|
||
14C09F5A000
|
trusted library allocation
|
page read and write
|
||
17748BC0000
|
heap
|
page read and write
|
||
1DA9CBD0000
|
heap
|
page read and write
|
||
1DA9CC10000
|
heap
|
page read and write
|
||
14C08130000
|
heap
|
page read and write
|
||
42D1000
|
trusted library allocation
|
page read and write
|
||
1CA80047000
|
trusted library allocation
|
page read and write
|
||
294801DF000
|
trusted library allocation
|
page read and write
|
||
17748CC2000
|
unkown
|
page readonly
|
||
14C07FF2000
|
unkown
|
page readonly
|
||
14C080E3000
|
heap
|
page read and write
|
||
1CAEFB70000
|
heap
|
page read and write
|
||
1DA9D391000
|
trusted library allocation
|
page read and write
|
||
1DA9CB60000
|
heap
|
page read and write
|
||
17748963000
|
heap
|
page read and write
|
||
14C09F54000
|
trusted library allocation
|
page read and write
|
||
14C09BF0000
|
heap
|
page read and write
|
||
2948013F000
|
trusted library allocation
|
page read and write
|
||
1DA9D44F000
|
trusted library allocation
|
page read and write
|
||
294E9AAC000
|
heap
|
page read and write
|
||
17748FF0000
|
heap
|
page read and write
|
||
294806C7000
|
trusted library allocation
|
page read and write
|
||
14C080A0000
|
heap
|
page read and write
|
||
14C09CE1000
|
heap
|
page read and write
|
||
29480684000
|
trusted library allocation
|
page read and write
|
||
177486B2000
|
unkown
|
page readonly
|
||
1CAEF8A9000
|
heap
|
page read and write
|
||
14C080A6000
|
heap
|
page read and write
|
||
44D4000
|
trusted library allocation
|
page read and write
|
||
177490C1000
|
trusted library allocation
|
page read and write
|
||
1DA9D413000
|
trusted library allocation
|
page read and write
|
||
294E9AF6000
|
heap
|
page read and write
|
||
2948029A000
|
trusted library allocation
|
page read and write
|
||
17748955000
|
heap
|
page read and write
|
||
177489A0000
|
heap
|
page read and write
|
||
1CA800BF000
|
trusted library allocation
|
page read and write
|
||
1CA80073000
|
trusted library allocation
|
page read and write
|
||
294E98B0000
|
heap
|
page read and write
|
||
1CA80083000
|
trusted library allocation
|
page read and write
|
||
4AA0000
|
heap
|
page read and write
|
||
294EADC0000
|
heap
|
page read and write
|
||
C589D95000
|
stack
|
page read and write
|
||
1DA9CC55000
|
heap
|
page read and write
|
||
294E9A10000
|
heap
|
page read and write
|
||
294E9A70000
|
heap
|
page read and write
|
||
7FF886A94000
|
trusted library allocation
|
page read and write
|
||
14C09EA1000
|
trusted library allocation
|
page read and write
|
||
1CAEF8DE000
|
heap
|
page read and write
|
||
4240000
|
heap
|
page read and write
|
||
17749133000
|
trusted library allocation
|
page read and write
|
||
14C09F2C000
|
trusted library allocation
|
page read and write
|
||
29480538000
|
trusted library allocation
|
page read and write
|
||
1CA80001000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
294EB2EA000
|
heap
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
7310000
|
trusted library allocation
|
page read and write
|
||
7FF886AA0000
|
trusted library allocation
|
page read and write
|
||
6844000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
67D4000
|
trusted library allocation
|
page read and write
|
||
29480647000
|
trusted library allocation
|
page read and write
|
||
1774895B000
|
heap
|
page read and write
|
||
294800DE000
|
trusted library allocation
|
page read and write
|
||
14C083C0000
|
heap
|
page read and write
|
||
7FF886AE0000
|
trusted library allocation
|
page read and write
|
||
14C09C79000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
C58A9E9000
|
stack
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
294807A8000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
C58A128000
|
stack
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
7FF886920000
|
trusted library allocation
|
page read and write
|
||
32A5000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
4CD4000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
4ACB000
|
trusted library allocation
|
page execute and read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
29480135000
|
trusted library allocation
|
page read and write
|
||
1CAF091B000
|
heap
|
page read and write
|
||
29480848000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
5F8000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
4340000
|
trusted library allocation
|
page execute and read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
C58AFFD000
|
stack
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
4266000
|
trusted library allocation
|
page execute and read and write
|
||
294805A4000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6720000
|
remote allocation
|
page read and write
|
||
6670000
|
trusted library allocation
|
page read and write
|
||
7FF886CA0000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
7FF886AD0000
|
trusted library allocation
|
page read and write
|
||
17748880000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
54A000
|
heap
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
7FF886980000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
7FF8868FD000
|
trusted library allocation
|
page execute and read and write
|
||
55F000
|
heap
|
page read and write
|
||
2B98000
|
stack
|
page read and write
|
||
684E000
|
stack
|
page read and write
|
||
C58B6F1000
|
stack
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
436D000
|
trusted library allocation
|
page execute and read and write
|
||
4010000
|
trusted library allocation
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
4271000
|
heap
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
4D07000
|
trusted library allocation
|
page execute and read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
1DAAD391000
|
trusted library allocation
|
page read and write
|
||
4990000
|
trusted library allocation
|
page read and write
|
||
4CF000
|
unkown
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
598A331000
|
stack
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
2EC7B7F000
|
stack
|
page read and write
|
||
1FF5EFE000
|
stack
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
294E9ABA000
|
heap
|
page read and write
|
||
29480654000
|
trusted library allocation
|
page read and write
|
||
413C000
|
stack
|
page read and write
|
||
6A8E000
|
stack
|
page read and write
|
||
4994000
|
trusted library allocation
|
page read and write
|
||
294807AE000
|
trusted library allocation
|
page read and write
|
||
14C080E5000
|
heap
|
page read and write
|
||
17748D95000
|
heap
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
294EAE48000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
51B000
|
heap
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
EDD9FE000
|
stack
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
294805C6000
|
trusted library allocation
|
page read and write
|
||
41CB000
|
trusted library allocation
|
page execute and read and write
|
||
1CAEF720000
|
heap
|
page read and write
|
||
1DA9D4E5000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
C58C1FB000
|
stack
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
1DA9D3CF000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
1CAEF982000
|
heap
|
page read and write
|
||
1CA90011000
|
trusted library allocation
|
page read and write
|
||
29480392000
|
trusted library allocation
|
page read and write
|
||
7FF886AB7000
|
trusted library allocation
|
page read and write
|
||
68A0000
|
heap
|
page read and write
|
||
622000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
42A8000
|
trusted library allocation
|
page read and write
|
||
8CE000
|
stack
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
1FF64FC000
|
stack
|
page read and write
|
||
671E000
|
stack
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
7FF886914000
|
trusted library allocation
|
page read and write
|
||
7290000
|
trusted library allocation
|
page read and write
|
||
294EB600000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
C58C6FA000
|
stack
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
1DA9CC12000
|
heap
|
page read and write
|
||
7FF886AD5000
|
trusted library allocation
|
page read and write
|
||
599000
|
heap
|
page read and write
|
||
4017000
|
trusted library allocation
|
page execute and read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
441E000
|
stack
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
43A4000
|
trusted library allocation
|
page read and write
|
||
29480508000
|
trusted library allocation
|
page read and write
|
||
4270000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
4269000
|
trusted library allocation
|
page execute and read and write
|
||
4366000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
29480406000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
4D7E000
|
stack
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
7FF886A9E000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
72C0000
|
trusted library allocation
|
page execute and read and write
|
||
C58C9FD000
|
stack
|
page read and write
|
||
7FF886904000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
4CD0000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
7FF886B50000
|
trusted library allocation
|
page execute and read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6645000
|
trusted library allocation
|
page read and write
|
||
67AE000
|
stack
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
BB9B8FD000
|
stack
|
page read and write
|
||
6A0E000
|
stack
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
67D5000
|
trusted library allocation
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
294EAFA2000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
4D50000
|
trusted library allocation
|
page read and write
|
||
1DAB5BFF000
|
heap
|
page read and write
|
||
2948065A000
|
trusted library allocation
|
page read and write
|
||
7FF886AA0000
|
trusted library allocation
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
14C082A0000
|
heap
|
page read and write
|
||
4263000
|
trusted library allocation
|
page read and write
|
||
14C07FF0000
|
unkown
|
page readonly
|
||
294EB28F000
|
heap
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
294800AA000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
7FF886AC6000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
7FF88693C000
|
trusted library allocation
|
page execute and read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
C58AEFD000
|
stack
|
page read and write
|
||
1DA9D4BF000
|
trusted library allocation
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
1FF63FE000
|
stack
|
page read and write
|
||
7F998000
|
trusted library allocation
|
page execute and read and write
|
||
2948069B000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
7FF886AB0000
|
trusted library allocation
|
page read and write
|
||
7FF886AAD000
|
trusted library allocation
|
page read and write
|
||
6644000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
294800DA000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
1FF62FB000
|
stack
|
page read and write
|
||
7FF43FA20000
|
trusted library allocation
|
page execute and read and write
|
||
6C1D000
|
heap
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
7FF8869A6000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
7FF8868E0000
|
trusted library allocation
|
page read and write
|
||
29480852000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
294801BD000
|
trusted library allocation
|
page read and write
|
||
7FF886AD0000
|
trusted library allocation
|
page read and write
|
||
2F89000
|
heap
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
heap
|
page readonly
|
||
4160000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
294EB23F000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
4ABE000
|
stack
|
page read and write
|
||
1DA9CB90000
|
heap
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
7FF886AE0000
|
trusted library allocation
|
page read and write
|
||
3066000
|
heap
|
page read and write
|
||
4A7D000
|
stack
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
1CC000
|
stack
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
54C000
|
heap
|
page read and write
|
||
177590CD000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
4420000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6670000
|
trusted library allocation
|
page read and write
|
||
66C0000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
4516000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
29490081000
|
trusted library allocation
|
page read and write
|
||
C58B9FF000
|
stack
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
7FF886AC0000
|
trusted library allocation
|
page read and write
|
||
29480344000
|
trusted library allocation
|
page read and write
|
||
4D30000
|
heap
|
page read and write
|
||
294E99B0000
|
heap
|
page read and write
|
||
6844000
|
trusted library allocation
|
page read and write
|
||
598B0FD000
|
stack
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
40FF000
|
heap
|
page read and write
|
||
7FF886902000
|
trusted library allocation
|
page read and write
|
||
1DAB5BE9000
|
heap
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
294EA180000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
4290000
|
heap
|
page execute and read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
C58C3F3000
|
stack
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
7FF886BF0000
|
trusted library allocation
|
page read and write
|
||
40FF000
|
stack
|
page read and write
|
||
69E000
|
stack
|
page read and write
|
||
6670000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6880000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
72AC000
|
trusted library allocation
|
page execute and read and write
|
||
2EC7A7C000
|
stack
|
page read and write
|
||
6691000
|
trusted library allocation
|
page read and write
|
||
7FF886904000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
5A3000
|
heap
|
page read and write
|
||
3088000
|
heap
|
page read and write
|
||
7FF8868FB000
|
trusted library allocation
|
page execute and read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
668E000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
74AF000
|
stack
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
4194000
|
trusted library allocation
|
page read and write
|
||
710000
|
trusted library allocation
|
page read and write
|
||
2948028A000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
C58BBFF000
|
stack
|
page read and write
|
||
58C000
|
heap
|
page read and write
|
||
7FF886B20000
|
trusted library allocation
|
page read and write
|
||
598B1FE000
|
stack
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
17748CD8000
|
unkown
|
page readonly
|
||
4B80000
|
heap
|
page readonly
|
||
C58AAFF000
|
stack
|
page read and write
|
||
1CAEFE90000
|
heap
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
48CE000
|
stack
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
2948066E000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
7FF8869D6000
|
trusted library allocation
|
page execute and read and write
|
||
66C0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
294800A5000
|
trusted library allocation
|
page read and write
|
||
14C08310000
|
trusted library allocation
|
page read and write
|
||
1EE000
|
stack
|
page read and write
|
||
7FF886B80000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
2C2F000
|
stack
|
page read and write
|
||
41C7000
|
trusted library allocation
|
page execute and read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
4180000
|
trusted library allocation
|
page read and write
|
||
C58C7F7000
|
stack
|
page read and write
|
||
4395000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
14C07FF0000
|
unkown
|
page readonly
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
7FF886AF0000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
75E000
|
stack
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
14C228CC000
|
heap
|
page read and write
|
||
2EC7C7E000
|
stack
|
page read and write
|
||
4290000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
59D000
|
stack
|
page read and write
|
||
4EB0000
|
heap
|
page read and write
|
||
7FF8868D4000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
4D50000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
508000
|
heap
|
page read and write
|
||
1CAEF8EA000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
4098000
|
trusted library allocation
|
page read and write
|
||
401B000
|
trusted library allocation
|
page execute and read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6720000
|
remote allocation
|
page read and write
|
||
497000
|
stack
|
page read and write
|
||
C58D8FC000
|
stack
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
1DAB5BB0000
|
heap
|
page read and write
|
||
7FF886AB6000
|
trusted library allocation
|
page read and write
|
||
7FF8869A0000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
7FF886A76000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
4B2E000
|
stack
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
C58A3FD000
|
stack
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
7FF8869E6000
|
trusted library allocation
|
page execute and read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
7FF886913000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
3FF4000
|
trusted library allocation
|
page read and write
|
||
4363000
|
trusted library allocation
|
page read and write
|
||
7FF886AC6000
|
trusted library allocation
|
page read and write
|
||
431F000
|
trusted library allocation
|
page read and write
|
||
7FDE0000
|
trusted library allocation
|
page execute and read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
294EA020000
|
heap
|
page execute and read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
4410000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
276E000
|
stack
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
2948084E000
|
trusted library allocation
|
page read and write
|
||
7FF886900000
|
trusted library allocation
|
page read and write
|
||
7FF886A8C000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
BB9BFFD000
|
stack
|
page read and write
|
||
C58A8E9000
|
stack
|
page read and write
|
||
294806A3000
|
trusted library allocation
|
page read and write
|
||
7FF886B10000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
294800E2000
|
trusted library allocation
|
page read and write
|
||
2948005C000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
44D0000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
14C09CE5000
|
heap
|
page read and write
|
||
7FF886B60000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
heap
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
8CD000
|
trusted library allocation
|
page execute and read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
14C228C8000
|
heap
|
page read and write
|
||
7FF88698C000
|
trusted library allocation
|
page execute and read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
72B0000
|
trusted library allocation
|
page read and write
|
||
C58AD7E000
|
stack
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
294808F6000
|
trusted library allocation
|
page read and write
|
||
EDDAFE000
|
stack
|
page read and write
|
||
4AA0000
|
trusted library allocation
|
page read and write
|
||
C58CCFC000
|
stack
|
page read and write
|
||
C58BCFA000
|
stack
|
page read and write
|
||
7FF886B20000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
29480712000
|
trusted library allocation
|
page read and write
|
||
306F000
|
heap
|
page read and write
|
||
304A000
|
heap
|
page read and write
|
||
BB9C0FE000
|
stack
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
87D000
|
stack
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
7FF886B10000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
294806A1000
|
trusted library allocation
|
page read and write
|
||
C58D9FE000
|
stack
|
page read and write
|
||
2948040C000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
7FF8868E2000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
heap
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
1DAAD3A1000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
43C2000
|
trusted library allocation
|
page read and write
|
||
177486B0000
|
unkown
|
page readonly
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
294EAF5C000
|
heap
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
1CAF08D5000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6C4A000
|
heap
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
177488F0000
|
trusted library allocation
|
page read and write
|
||
17748BC5000
|
heap
|
page read and write
|
||
50F000
|
stack
|
page read and write
|
||
2948006A000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
7FF886A10000
|
trusted library allocation
|
page execute and read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
2E75000
|
heap
|
page read and write
|
||
2948084C000
|
trusted library allocation
|
page read and write
|
||
294800EE000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
1FF61FD000
|
stack
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
1CAEF825000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
BB9B4F1000
|
stack
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
742E000
|
stack
|
page read and write
|
||
177486DC000
|
unkown
|
page readonly
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
7FF886A8A000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
1CAEF820000
|
heap
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
66C0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
1CAEF800000
|
heap
|
page read and write
|
||
7FF88695C000
|
trusted library allocation
|
page execute and read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
7FF886990000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
14C0A01A000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
63E000
|
stack
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6880000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
7FF886990000
|
trusted library allocation
|
page execute and read and write
|
||
14C081A0000
|
heap
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6645000
|
trusted library allocation
|
page read and write
|
||
177590C1000
|
trusted library allocation
|
page read and write
|
||
BB9B7FE000
|
stack
|
page read and write
|
||
294EB319000
|
heap
|
page read and write
|
||
7FF8869AC000
|
trusted library allocation
|
page execute and read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
C58A03E000
|
stack
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
294807B4000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
14C08445000
|
heap
|
page read and write
|
||
14C226A3000
|
heap
|
page read and write
|
||
7FF886A90000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
7FF886A93000
|
trusted library allocation
|
page read and write
|
||
598A6FE000
|
stack
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
294808F1000
|
trusted library allocation
|
page read and write
|
||
54F000
|
heap
|
page read and write
|
||
583000
|
heap
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
42CE000
|
heap
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
425E000
|
stack
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
7FF886B00000
|
trusted library allocation
|
page read and write
|
||
29480658000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
29490001000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
14C226B2000
|
unkown
|
page readonly
|
||
294EAEE1000
|
heap
|
page read and write
|
||
6684000
|
trusted library allocation
|
page read and write
|
||
C58D3FC000
|
stack
|
page read and write
|
||
294EAFA0000
|
heap
|
page read and write
|
||
2948040E000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
29480408000
|
trusted library allocation
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
6681000
|
trusted library allocation
|
page read and write
|
||
1FF68FB000
|
stack
|
page read and write
|
||
6C33000
|
heap
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
7FF8868F4000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
60F000
|
heap
|
page read and write
|
||
1FF65FC000
|
stack
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
4CA0000
|
heap
|
page read and write
|
||
432D000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
177618A0000
|
unkown
|
page readonly
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
1DA9CE55000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
C58D7FE000
|
stack
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6DE4000
|
heap
|
page read and write
|
||
2949000E000
|
trusted library allocation
|
page read and write
|
||
294801D5000
|
trusted library allocation
|
page read and write
|
||
4478000
|
trusted library allocation
|
page read and write
|
||
2F7C000
|
heap
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
7FF8869B6000
|
trusted library allocation
|
page execute and read and write
|
||
4960000
|
trusted library section
|
page read and write
|
||
6890000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
7FF8868ED000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886903000
|
trusted library allocation
|
page read and write
|
||
1DA9CBB0000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
EDDFFE000
|
stack
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
2948051C000
|
trusted library allocation
|
page read and write
|
||
4CA0000
|
heap
|
page read and write
|
||
1CAEF8E8000
|
heap
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
7FF886CD0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
C58BAE9000
|
stack
|
page read and write
|
||
7FF8868D0000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
67DC000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
C58CDF8000
|
stack
|
page read and write
|
||
294800D2000
|
trusted library allocation
|
page read and write
|
||
4C50000
|
trusted library allocation
|
page read and write
|
||
7FF886B30000
|
trusted library allocation
|
page execute and read and write
|
||
447F000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
2948084A000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
heap
|
page execute and read and write
|
||
1DA9D4D3000
|
trusted library allocation
|
page read and write
|
||
7FF886BD0000
|
trusted library allocation
|
page read and write
|
||
C58B4F5000
|
stack
|
page read and write
|
||
4481000
|
trusted library allocation
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
4440000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
14C226A0000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
294E99E5000
|
heap
|
page read and write
|
||
14C228A0000
|
heap
|
page read and write
|
||
2948065C000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
7FF88693C000
|
trusted library allocation
|
page execute and read and write
|
||
14C228DC000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
421E000
|
stack
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
7F4A8000
|
trusted library allocation
|
page execute and read and write
|
||
598AAFE000
|
stack
|
page read and write
|
||
7FF886AD0000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
4940000
|
heap
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
66C0000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
694E000
|
stack
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
4321000
|
trusted library allocation
|
page read and write
|
||
1FF5CFE000
|
stack
|
page read and write
|
||
151C56E5000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
4190000
|
trusted library allocation
|
page read and write
|
||
6870000
|
trusted library allocation
|
page execute and read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
4280000
|
heap
|
page readonly
|
||
6DCE000
|
stack
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
EDDEFE000
|
stack
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
598ACFE000
|
stack
|
page read and write
|
||
7FF8868ED000
|
trusted library allocation
|
page execute and read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
307C000
|
heap
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
C58D2F7000
|
stack
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
2948028E000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
14C082C0000
|
heap
|
page read and write
|
||
4190000
|
heap
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
433E000
|
stack
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
419D000
|
trusted library allocation
|
page execute and read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
1DA9D380000
|
heap
|
page execute and read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
C58BDF7000
|
stack
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
294801C5000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
598AFFE000
|
stack
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
7FF886B70000
|
trusted library allocation
|
page execute and read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
7FF886CB0000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
29490021000
|
trusted library allocation
|
page read and write
|
||
4012000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
1DA9CC53000
|
heap
|
page read and write
|
||
7F7A0000
|
trusted library allocation
|
page execute and read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
7FF886900000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
294806F4000
|
trusted library allocation
|
page read and write
|
||
7FF8868E4000
|
trusted library allocation
|
page read and write
|
||
7FF88699C000
|
trusted library allocation
|
page execute and read and write
|
||
1DA9CBEC000
|
heap
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
14C228C1000
|
heap
|
page read and write
|
||
BB9BCFE000
|
stack
|
page read and write
|
||
1CAEF99B000
|
heap
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
4CDD000
|
trusted library allocation
|
page execute and read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
14C08280000
|
heap
|
page read and write
|
||
7FF886B10000
|
trusted library allocation
|
page read and write
|
||
6ACD000
|
stack
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
4E6D000
|
stack
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page execute and read and write
|
||
4360000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
14C09CF0000
|
heap
|
page read and write
|
||
294800E6000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
7FF886A80000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
7FF886B50000
|
trusted library allocation
|
page execute and read and write
|
||
407E000
|
stack
|
page read and write
|
||
6683000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
151C5440000
|
heap
|
page read and write
|
||
EDDBFD000
|
stack
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
73EE000
|
stack
|
page read and write
|
||
1FF60FE000
|
stack
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
140000
|
heap
|
page read and write
|
||
44C3000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
7FF886AF0000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
294EB1C2000
|
unkown
|
page readonly
|
||
6843000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
C58BFFD000
|
stack
|
page read and write
|
||
294805DE000
|
trusted library allocation
|
page read and write
|
||
4170000
|
heap
|
page execute and read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
C58B2FA000
|
stack
|
page read and write
|
||
4C40000
|
trusted library allocation
|
page read and write
|
||
BB9BDFE000
|
stack
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
294EAEF6000
|
heap
|
page read and write
|
||
7FF8868E3000
|
trusted library allocation
|
page execute and read and write
|
||
2E10000
|
heap
|
page read and write
|
||
14C0A012000
|
trusted library allocation
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
6720000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
42A0000
|
trusted library allocation
|
page read and write
|
||
7FF8869B6000
|
trusted library allocation
|
page read and write
|
||
66A4000
|
trusted library allocation
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
1DA9CA80000
|
heap
|
page read and write
|
||
7310000
|
trusted library allocation
|
page read and write
|
||
4400000
|
trusted library allocation
|
page execute and read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
294E9AF4000
|
heap
|
page read and write
|
||
17748D90000
|
heap
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6880000
|
trusted library allocation
|
page read and write
|
||
151C5540000
|
heap
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
7FF8868ED000
|
trusted library allocation
|
page execute and read and write
|
||
45B000
|
stack
|
page read and write
|
||
2A78000
|
heap
|
page read and write
|
||
6864000
|
trusted library allocation
|
page read and write
|
||
4331000
|
trusted library allocation
|
page read and write
|
||
1CAF0919000
|
heap
|
page read and write
|
||
72A0000
|
trusted library allocation
|
page read and write
|
||
7F7B8000
|
trusted library allocation
|
page execute and read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
C58ABFD000
|
stack
|
page read and write
|
||
D7000
|
stack
|
page read and write
|
||
17748940000
|
heap
|
page read and write
|
||
294E99F0000
|
heap
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
4386000
|
trusted library allocation
|
page execute and read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
7FF886B56000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
7FF886AF0000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
7FF8869B0000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
3027000
|
heap
|
page read and write
|
||
41E0000
|
trusted library allocation
|
page read and write
|
||
294EAADF000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
60E000
|
heap
|
page read and write
|
||
7FF886A9D000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
4180000
|
trusted library allocation
|
page read and write
|
||
1774904B000
|
heap
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
C58D0FA000
|
stack
|
page read and write
|
||
5A5000
|
heap
|
page read and write
|
||
4318000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
4C30000
|
trusted library allocation
|
page execute and read and write
|
||
14C22690000
|
heap
|
page execute and read and write
|
||
499D000
|
trusted library allocation
|
page execute and read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
7FF886B19000
|
trusted library allocation
|
page read and write
|
||
1DA9CB65000
|
heap
|
page read and write
|
||
68A0000
|
remote allocation
|
page read and write
|
||
6841000
|
trusted library allocation
|
page read and write
|
||
4522000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
1FF56F4000
|
stack
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
29480652000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
294EABC0000
|
unkown
|
page readonly
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
EDDCFE000
|
stack
|
page read and write
|
||
BB9BAFE000
|
stack
|
page read and write
|
||
455F000
|
stack
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
7FF886910000
|
trusted library allocation
|
page read and write
|
||
1CAF0780000
|
heap
|
page execute and read and write
|
||
30DF000
|
heap
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
294805D8000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
1FF5BFE000
|
stack
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
C58C4FC000
|
stack
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
587000
|
heap
|
page read and write
|
||
14C228A7000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
449E000
|
stack
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
7FF886996000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
56C000
|
heap
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
151C5568000
|
heap
|
page read and write
|
||
4C60000
|
trusted library allocation
|
page read and write
|
||
4D20000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
C58C2FE000
|
stack
|
page read and write
|
||
7FF8868D3000
|
trusted library allocation
|
page execute and read and write
|
||
690D000
|
stack
|
page read and write
|
||
7FF886924000
|
trusted library allocation
|
page read and write
|
||
7FF886B30000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
heap
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
4D0B000
|
trusted library allocation
|
page execute and read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
1774904D000
|
heap
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
7FF886C00000
|
trusted library allocation
|
page execute and read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
4150000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
1CAEF928000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
72D0000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
294EAE00000
|
heap
|
page read and write
|
||
7FF886AF0000
|
trusted library allocation
|
page read and write
|
||
4193000
|
trusted library allocation
|
page execute and read and write
|
||
294EAE46000
|
heap
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
294EA170000
|
heap
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
4363000
|
trusted library allocation
|
page read and write
|
||
1DA9CCB8000
|
heap
|
page read and write
|
||
41A4000
|
trusted library allocation
|
page read and write
|
||
1CAEF8C7000
|
heap
|
page read and write
|
||
1CA8003D000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
14C08103000
|
heap
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
294806C1000
|
trusted library allocation
|
page read and write
|
||
7FF8868E0000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
4D79000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
294EAADD000
|
heap
|
page read and write
|
||
4B6E000
|
stack
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
294E9A8B000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
294EABC2000
|
unkown
|
page readonly
|
||
41A0000
|
trusted library allocation
|
page read and write
|
||
2B5B000
|
stack
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
294EAC6E000
|
unkown
|
page readonly
|
||
4C70000
|
heap
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6684000
|
trusted library allocation
|
page read and write
|
||
17761A70000
|
heap
|
page execute and read and write
|
||
8D0000
|
heap
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
7FF8868F2000
|
trusted library allocation
|
page read and write
|
||
4D30000
|
heap
|
page execute and read and write
|
||
598A8FE000
|
stack
|
page read and write
|
||
7FDF8000
|
trusted library allocation
|
page execute and read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
294EAA99000
|
heap
|
page read and write
|
||
14C19EAF000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
294800CA000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6E10000
|
heap
|
page read and write
|
||
7FF8869A0000
|
trusted library allocation
|
page execute and read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
EDE1FE000
|
stack
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
4D40000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
177486B0000
|
unkown
|
page readonly
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
7FF886AD0000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
4CD3000
|
trusted library allocation
|
page execute and read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
29480656000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
52D1000
|
trusted library allocation
|
page read and write
|
||
587000
|
heap
|
page read and write
|
||
1DA9CE50000
|
heap
|
page read and write
|
||
6880000
|
trusted library allocation
|
page read and write
|
||
294EB010000
|
heap
|
page read and write
|
||
7FF886A93000
|
trusted library allocation
|
page read and write
|
||
4CBE000
|
stack
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
7FF886AB5000
|
trusted library allocation
|
page read and write
|
||
68A0000
|
remote allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
294EB2D2000
|
heap
|
page read and write
|
||
4BED000
|
stack
|
page read and write
|
||
7FF886AB0000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
547000
|
heap
|
page read and write
|
||
7FF886AF9000
|
trusted library allocation
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
1A5000
|
heap
|
page read and write
|
||
68A0000
|
remote allocation
|
page read and write
|
||
1FF59FE000
|
stack
|
page read and write
|
||
17748760000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
294EAEEC000
|
heap
|
page read and write
|
||
2D9B000
|
stack
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
29480534000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
7FF88691B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886B09000
|
trusted library allocation
|
page read and write
|
||
4CE0000
|
trusted library allocation
|
page read and write
|
||
7FF8869A0000
|
trusted library allocation
|
page execute and read and write
|
||
C589DDF000
|
stack
|
page read and write
|
||
427F000
|
stack
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
7280000
|
trusted library allocation
|
page read and write
|
||
1774895F000
|
heap
|
page read and write
|
||
BB9B9FE000
|
stack
|
page read and write
|
||
17748CF0000
|
heap
|
page read and write
|
||
C58B3F2000
|
stack
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
67D5000
|
trusted library allocation
|
page read and write
|
||
1CAEF850000
|
heap
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
51B000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
C58A4FE000
|
stack
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
7FF886ABD000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
43B6000
|
trusted library allocation
|
page read and write
|
||
7310000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
294E9A40000
|
trusted library allocation
|
page read and write
|
||
17748860000
|
heap
|
page read and write
|
||
1776194C000
|
unkown
|
page readonly
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
4E50000
|
heap
|
page execute and read and write
|
||
BB9BEFE000
|
stack
|
page read and write
|
||
4CC0000
|
trusted library allocation
|
page read and write
|
||
7FF8868F0000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
6681000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
7FF886B10000
|
trusted library allocation
|
page execute and read and write
|
||
294EB2D8000
|
heap
|
page read and write
|
||
150000
|
heap
|
page read and write
|
||
1CA80155000
|
trusted library allocation
|
page read and write
|
||
4E61000
|
trusted library allocation
|
page read and write
|
||
6851000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
4C2E000
|
stack
|
page read and write
|
||
6649000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
151C56E0000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
1CA8003B000
|
trusted library allocation
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
6CCE000
|
stack
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
17748FA0000
|
heap
|
page read and write
|
||
29480412000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
17748840000
|
heap
|
page read and write
|
||
294E99E0000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
1CA9000D000
|
trusted library allocation
|
page read and write
|
||
7F490000
|
trusted library allocation
|
page execute and read and write
|
||
664C000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
1DA9D3CB000
|
trusted library allocation
|
page read and write
|
||
7FF886AE0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
426C000
|
trusted library allocation
|
page execute and read and write
|
||
451E000
|
stack
|
page read and write
|
||
8C3000
|
trusted library allocation
|
page execute and read and write
|
||
6841000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
EDE0FE000
|
stack
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
177490B0000
|
heap
|
page execute and read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
14C09CD1000
|
heap
|
page read and write
|
||
2948038E000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
4993000
|
trusted library allocation
|
page execute and read and write
|
||
294EAF66000
|
heap
|
page read and write
|
||
4390000
|
heap
|
page read and write
|
||
C58A5FF000
|
stack
|
page read and write
|
||
1DAB5C6A000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6C8E000
|
stack
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
2F73000
|
heap
|
page read and write
|
||
17748CC0000
|
unkown
|
page readonly
|
||
7FF8868E3000
|
trusted library allocation
|
page execute and read and write
|
||
EDE3FE000
|
stack
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
4C54000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
7FF886AA0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
4383000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
684E000
|
trusted library allocation
|
page read and write
|
||
29480054000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
7FF88690B000
|
trusted library allocation
|
page execute and read and write
|
||
27B0000
|
heap
|
page read and write
|
||
29480378000
|
trusted library allocation
|
page read and write
|
||
29480410000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
490F000
|
stack
|
page read and write
|
||
294EA1B0000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6E1A000
|
heap
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
7FF886AAE000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
85E000
|
stack
|
page read and write
|
||
6670000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
C58CEF7000
|
stack
|
page read and write
|
||
294E9ACC000
|
heap
|
page read and write
|
||
684C000
|
trusted library allocation
|
page read and write
|
||
4D5000
|
heap
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
1FF66FE000
|
stack
|
page read and write
|
||
4260000
|
trusted library allocation
|
page read and write
|
||
1DAAD39D000
|
trusted library allocation
|
page read and write
|
||
1DA9CC16000
|
heap
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
29480066000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
7FF88692B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886903000
|
trusted library allocation
|
page execute and read and write
|
||
4491000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
51F000
|
heap
|
page read and write
|
||
2E1E000
|
stack
|
page read and write
|
||
5F6000
|
heap
|
page read and write
|
||
6720000
|
remote allocation
|
page read and write
|
||
5EC5000
|
trusted library allocation
|
page read and write
|
||
294807A6000
|
trusted library allocation
|
page read and write
|
||
14C09E50000
|
heap
|
page execute and read and write
|
||
436B000
|
trusted library allocation
|
page read and write
|
||
4230000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
C58AD2A000
|
stack
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
EDDDFE000
|
stack
|
page read and write
|
||
6DF000
|
stack
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
C58A7FE000
|
stack
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
7FF886990000
|
trusted library allocation
|
page read and write
|
||
605000
|
heap
|
page read and write
|
||
6C0F000
|
stack
|
page read and write
|
||
14C0812B000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
7FF886ABE000
|
trusted library allocation
|
page read and write
|
||
4389000
|
trusted library allocation
|
page execute and read and write
|
||
29480682000
|
trusted library allocation
|
page read and write
|
||
73AF000
|
stack
|
page read and write
|
||
2948037C000
|
trusted library allocation
|
page read and write
|
||
4080000
|
heap
|
page readonly
|
||
6C10000
|
heap
|
page read and write
|
||
14C09C77000
|
heap
|
page read and write
|
||
5E61000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
5EC1000
|
trusted library allocation
|
page read and write
|
||
41C5000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886B00000
|
trusted library allocation
|
page execute and read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
49A0000
|
heap
|
page read and write
|
||
7FF886B10000
|
trusted library allocation
|
page read and write
|
||
7FF8868F3000
|
trusted library allocation
|
page read and write
|
||
668C000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
29480637000
|
trusted library allocation
|
page read and write
|
||
C58D1FC000
|
stack
|
page read and write
|
||
294801C1000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
7FF886AC0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
79E000
|
stack
|
page read and write
|
||
41C2000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
1CA90001000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
7FF886B30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8869C6000
|
trusted library allocation
|
page execute and read and write
|
||
3077000
|
heap
|
page read and write
|
||
4AC7000
|
trusted library allocation
|
page execute and read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6A4E000
|
stack
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
4AFE000
|
stack
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
14C08014000
|
unkown
|
page readonly
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
EDD5B1000
|
stack
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
7FF886C90000
|
trusted library allocation
|
page read and write
|
||
4140000
|
trusted library allocation
|
page execute and read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
14C09CA1000
|
heap
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
1CA8003F000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
C58CBFC000
|
stack
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
7FF886AC0000
|
trusted library allocation
|
page execute and read and write
|
||
42A0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
EDD8FF000
|
stack
|
page read and write
|
||
1FF67FB000
|
stack
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
7FF886B60000
|
trusted library allocation
|
page execute and read and write
|
||
579000
|
heap
|
page read and write
|
||
7FF886AC0000
|
trusted library allocation
|
page read and write
|
||
2F8F000
|
stack
|
page read and write
|
||
294E9FD0000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
7FF886A00000
|
trusted library allocation
|
page execute and read and write
|
||
294E9AB2000
|
heap
|
page read and write
|
||
1DA9CDF0000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
7FF886986000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
7FF886996000
|
trusted library allocation
|
page read and write
|
||
14C226B0000
|
unkown
|
page readonly
|
||
EDE2FD000
|
stack
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
7FF886B30000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
294EB1C0000
|
unkown
|
page readonly
|
||
7FF8869BC000
|
trusted library allocation
|
page execute and read and write
|
||
177491EC000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
7FF88690D000
|
trusted library allocation
|
page execute and read and write
|
||
29480718000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
7310000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
80E000
|
stack
|
page read and write
|
||
3FF0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
43DE000
|
stack
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
598AEFE000
|
stack
|
page read and write
|
||
7FF886C80000
|
trusted library allocation
|
page read and write
|
||
4512000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
heap
|
page execute and read and write
|
||
7FF886AD0000
|
trusted library allocation
|
page execute and read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
C58B1FE000
|
stack
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
14C0A018000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
7FF886CC0000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
294801DB000
|
trusted library allocation
|
page read and write
|
||
1DA9D250000
|
heap
|
page read and write
|
||
7FF8869B0000
|
trusted library allocation
|
page execute and read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
BB9B6FE000
|
stack
|
page read and write
|
||
7FF886A70000
|
trusted library allocation
|
page read and write
|
||
723E000
|
stack
|
page read and write
|
||
1CAEF8FE000
|
heap
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
177618A2000
|
unkown
|
page readonly
|
||
1DA9D3CD000
|
trusted library allocation
|
page read and write
|
||
294EAE05000
|
heap
|
page read and write
|
||
7FF886AA3000
|
trusted library allocation
|
page read and write
|
||
48D000
|
unkown
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
7FF886A90000
|
trusted library allocation
|
page read and write
|
||
2DD8000
|
stack
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
7FF886904000
|
trusted library allocation
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
BB9B5FE000
|
stack
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6880000
|
trusted library allocation
|
page read and write
|
||
7FF88699C000
|
trusted library allocation
|
page execute and read and write
|
||
14C080ED000
|
heap
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
C58D6FC000
|
stack
|
page read and write
|
||
653000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page execute and read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
1CAEF830000
|
heap
|
page read and write
|
||
2F5A000
|
heap
|
page read and write
|
||
7FF8868F4000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
7FF886A90000
|
trusted library allocation
|
page read and write
|
||
294802E2000
|
trusted library allocation
|
page read and write
|
||
6645000
|
trusted library allocation
|
page read and write
|
||
56A000
|
heap
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
4370000
|
trusted library allocation
|
page read and write
|
||
7FF886BA0000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
44C6000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
7FF88690D000
|
trusted library allocation
|
page execute and read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
7FF886AC0000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
4980000
|
trusted library allocation
|
page read and write
|
||
41DD000
|
stack
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
294801A9000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
4CFD000
|
stack
|
page read and write
|
||
4AE0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
1CAEF99E000
|
heap
|
page read and write
|
||
177491EF000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
7FF8868E4000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
445F000
|
stack
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
1774899C000
|
heap
|
page read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
58C000
|
heap
|
page read and write
|
||
294EAF97000
|
heap
|
page read and write
|
||
7FF886AE0000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
177488D0000
|
trusted library allocation
|
page read and write
|
||
294E9A60000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
C58B7FB000
|
stack
|
page read and write
|
||
14C083D0000
|
heap
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
44F5000
|
trusted library allocation
|
page read and write
|
||
7310000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
C58CAFC000
|
stack
|
page read and write
|
||
7FF886B50000
|
trusted library allocation
|
page read and write
|
||
7FF886A20000
|
trusted library allocation
|
page execute and read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
14C09E90000
|
heap
|
page execute and read and write
|
||
7FF8868E0000
|
trusted library allocation
|
page read and write
|
||
52D5000
|
trusted library allocation
|
page read and write
|
||
2948038A000
|
trusted library allocation
|
page read and write
|
||
7FF88692D000
|
trusted library allocation
|
page execute and read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
7FF8869C6000
|
trusted library allocation
|
page execute and read and write
|
||
294EA150000
|
heap
|
page execute and read and write
|
||
6B0F000
|
stack
|
page read and write
|
||
294804E6000
|
trusted library allocation
|
page read and write
|
||
29480710000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
7FF88694C000
|
trusted library allocation
|
page execute and read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
14C19EA1000
|
trusted library allocation
|
page read and write
|
||
4F48000
|
heap
|
page read and write
|
||
17749215000
|
trusted library allocation
|
page read and write
|
||
6B0E000
|
stack
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
294E9A96000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
416D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF88690D000
|
trusted library allocation
|
page execute and read and write
|
||
29480716000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
7FF886A80000
|
trusted library allocation
|
page read and write
|
||
7FF886BB0000
|
trusted library allocation
|
page read and write
|
||
6740000
|
heap
|
page execute and read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
C58B0EA000
|
stack
|
page read and write
|
||
7FF88692C000
|
trusted library allocation
|
page execute and read and write
|
||
1CAEF926000
|
heap
|
page read and write
|
||
29480626000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
C58B5FA000
|
stack
|
page read and write
|
||
1DA9CC2C000
|
heap
|
page read and write
|
||
1CA8012F000
|
trusted library allocation
|
page read and write
|
||
579000
|
heap
|
page read and write
|
||
294805C2000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
294EAA00000
|
heap
|
page read and write
|
||
7FF8868F0000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
7FF886B40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886A80000
|
trusted library allocation
|
page read and write
|
||
1FF5DFE000
|
stack
|
page read and write
|
||
294E9990000
|
heap
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
294E9FD3000
|
trusted library allocation
|
page read and write
|
||
7FF886AA6000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
14C08330000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
294801C9000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
294EAA1F000
|
heap
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
1CAEFB50000
|
trusted library allocation
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
598ABFE000
|
stack
|
page read and write
|
||
1DA9CBF7000
|
heap
|
page read and write
|
||
7FF886AF0000
|
trusted library allocation
|
page execute and read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
2C3D000
|
stack
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
4030000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
294EAEA4000
|
heap
|
page read and write
|
||
1DAB5C6E000
|
heap
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
67D5000
|
trusted library allocation
|
page read and write
|
||
7FF886900000
|
trusted library allocation
|
page read and write
|
||
7FF886B00000
|
trusted library allocation
|
page execute and read and write
|
||
4B3F000
|
stack
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
4EA0000
|
heap
|
page execute and read and write
|
||
1FF58FE000
|
stack
|
page read and write
|
||
29480850000
|
trusted library allocation
|
page read and write
|
||
17749030000
|
heap
|
page read and write
|
||
54B000
|
heap
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF88691D000
|
trusted library allocation
|
page execute and read and write
|
||
294808F4000
|
trusted library allocation
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
1DA9D4E1000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
4560000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
294806BB000
|
trusted library allocation
|
page read and write
|
||
8C4000
|
trusted library allocation
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
294EB2F2000
|
heap
|
page read and write
|
||
1CA80151000
|
trusted library allocation
|
page read and write
|
||
69CE000
|
stack
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
3185000
|
heap
|
page read and write
|
||
151C5560000
|
heap
|
page read and write
|
||
1CA8012C000
|
trusted library allocation
|
page read and write
|
||
C58C5FD000
|
stack
|
page read and write
|
||
42FC000
|
stack
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
1774893D000
|
heap
|
page read and write
|
||
294801CD000
|
trusted library allocation
|
page read and write
|
||
7FF8868FD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886A90000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6ACD000
|
stack
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
C58B8E9000
|
stack
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
14C09CBD000
|
heap
|
page read and write
|
||
7FF88691D000
|
trusted library allocation
|
page execute and read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
1DA9CDD0000
|
trusted library allocation
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
7FF886B00000
|
trusted library allocation
|
page read and write
|
||
1FF57FE000
|
stack
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
44DF000
|
stack
|
page read and write
|
||
1CAEFB75000
|
heap
|
page read and write
|
||
1FF5AFC000
|
stack
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
6DD0000
|
heap
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
294800D6000
|
trusted library allocation
|
page read and write
|
||
294EAEF0000
|
heap
|
page read and write
|
||
7283000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
4504000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
1CAF0900000
|
heap
|
page read and write
|
||
598A7FE000
|
stack
|
page read and write
|
||
7FF886AA0000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
C58D5FD000
|
stack
|
page read and write
|
||
1CAF08A8000
|
heap
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
438C000
|
trusted library allocation
|
page execute and read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
C58A6FE000
|
stack
|
page read and write
|
||
294808EE000
|
trusted library allocation
|
page read and write
|
||
7FF886A95000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
7FF886AE0000
|
trusted library allocation
|
page read and write
|
||
294EA0E0000
|
heap
|
page execute and read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
2948036C000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
29490013000
|
trusted library allocation
|
page read and write
|
||
294806A5000
|
trusted library allocation
|
page read and write
|
||
7FF8868FD000
|
trusted library allocation
|
page execute and read and write
|
||
6BCE000
|
stack
|
page read and write
|
||
6840000
|
trusted library allocation
|
page execute and read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
7FF886BC0000
|
trusted library allocation
|
page read and write
|
||
2F83000
|
heap
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
29480374000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
563000
|
heap
|
page read and write
|
||
4163000
|
trusted library allocation
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
17748975000
|
heap
|
page read and write
|
||
6E00000
|
heap
|
page read and write
|
||
294E9A15000
|
heap
|
page read and write
|
||
294EA50F000
|
heap
|
page read and write
|
||
29480414000
|
trusted library allocation
|
page read and write
|
||
2D25000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
72A9000
|
trusted library allocation
|
page execute and read and write
|
||
151C5520000
|
heap
|
page read and write
|
||
BB9BBFE000
|
stack
|
page read and write
|
||
294804EA000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
68CF000
|
stack
|
page read and write
|
||
294800A1000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6880000
|
trusted library allocation
|
page read and write
|
||
1CA80143000
|
trusted library allocation
|
page read and write
|
||
688E000
|
stack
|
page read and write
|
||
14C228AD000
|
heap
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
7FF886B20000
|
trusted library allocation
|
page execute and read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
746E000
|
stack
|
page read and write
|
||
7FF886B40000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
7F980000
|
trusted library allocation
|
page execute and read and write
|
||
7FF88690D000
|
trusted library allocation
|
page execute and read and write
|
||
448D000
|
trusted library allocation
|
page read and write
|
||
1DAB5CC0000
|
heap
|
page execute and read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
598ADFE000
|
stack
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
7FF886B40000
|
trusted library allocation
|
page read and write
|
||
66C0000
|
trusted library allocation
|
page read and write
|
||
2948008E000
|
trusted library allocation
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
1DA9CB70000
|
heap
|
page read and write
|
||
14C083C5000
|
heap
|
page read and write
|
||
405000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
294802E4000
|
trusted library allocation
|
page read and write
|
||
7FF8868E2000
|
trusted library allocation
|
page read and write
|
||
1FF5FFE000
|
stack
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
4E2C000
|
stack
|
page read and write
|
||
29480714000
|
trusted library allocation
|
page read and write
|
||
7FF886A00000
|
trusted library allocation
|
page execute and read and write
|
||
294800CE000
|
trusted library allocation
|
page read and write
|
||
6650000
|
trusted library allocation
|
page read and write
|
||
548000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
7FF886AB0000
|
trusted library allocation
|
page read and write
|
||
294EB200000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
7FF886A83000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
1DAB5C2A000
|
heap
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
2948069D000
|
trusted library allocation
|
page read and write
|
||
51C000
|
heap
|
page read and write
|
||
42C0000
|
heap
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
4280000
|
trusted library allocation
|
page execute and read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
727E000
|
stack
|
page read and write
|
||
17749203000
|
trusted library allocation
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
C58BEE9000
|
stack
|
page read and write
|
||
736E000
|
stack
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
7FF886AB0000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
294800BC000
|
trusted library allocation
|
page read and write
|
||
294806BF000
|
trusted library allocation
|
page read and write
|
||
4D10000
|
trusted library allocation
|
page read and write
|
||
4015000
|
trusted library allocation
|
page execute and read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
294EAFB1000
|
heap
|
page read and write
|
||
7FF8868F0000
|
trusted library allocation
|
page read and write
|
||
7FF886B40000
|
trusted library allocation
|
page execute and read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
7FF8868F3000
|
trusted library allocation
|
page execute and read and write
|
||
14C228A9000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
7FF886ABD000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
67D9000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
294800EA000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
29480368000
|
trusted library allocation
|
page read and write
|
||
41C0000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
14C22744000
|
unkown
|
page readonly
|
||
1CAEFB30000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
C58CFFC000
|
stack
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
14C09CE9000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
1DA9D4BC000
|
trusted library allocation
|
page read and write
|
||
294EAE2D000
|
heap
|
page read and write
|
||
4D20000
|
trusted library allocation
|
page execute and read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
29480680000
|
trusted library allocation
|
page read and write
|
||
6D8E000
|
stack
|
page read and write
|
||
177590D1000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
4DBE000
|
stack
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
7FF8868DD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF88690B000
|
trusted library allocation
|
page execute and read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
40B0000
|
heap
|
page read and write
|
||
2FD7000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
14C228B8000
|
heap
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
4350000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
C58A2FF000
|
stack
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
7FF8869C0000
|
trusted library allocation
|
page execute and read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
294801D1000
|
trusted library allocation
|
page read and write
|
||
2F96000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
177489F9000
|
heap
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
1CAF0030000
|
heap
|
page execute and read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
C58C0FC000
|
stack
|
page read and write
|
||
1CAEF8EE000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
7FF8869F0000
|
trusted library allocation
|
page execute and read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
7FF886B00000
|
trusted library allocation
|
page read and write
|
||
14C080E9000
|
heap
|
page read and write
|
||
C58C8F7000
|
stack
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
294EA130000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
17749211000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
42A0000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
7FF886BE0000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
7FF886B90000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
43B2000
|
trusted library allocation
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
44CB000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
6E1B000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
66C0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
598A9FD000
|
stack
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
There are 2081 hidden memdumps, click here to show them.