Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
e0#U05ea.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
initial sample
|
||
C:\Config.Msi\3f7202.rbs
|
data
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\BouncyCastle.Crypto.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\System.ValueTuple.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI7358.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI7358.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI7984.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI7984.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI9172.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI9172.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI9422.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSIB318.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
modified
|
||
C:\Windows\Installer\MSIB318.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\System32\InstallUtil.InstallLog
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\~DF47766066B75C798D.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF6A4DE52DC2399F9D.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF7B5BC7245F2550A2.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF92B08A0855196A93.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF9D0DB2C030910D25.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFD6287FB4F7B1D804.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallState
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation.zip
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.ini
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AteraAgent.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\Installer\3f7201.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\3f7203.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\MSI7358.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSI7358.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI7358.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI7358.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI7984.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSI7984.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI7984.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI7984.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI9172.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSI9172.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI9172.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI9172.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI9433.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI94B1.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI9638.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIB318.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSIB318.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIB318.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIB318.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SourceHash{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1A374813EDB1A6631387E414D3E73232
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\329B6147266C1E26CD774EA22B79EC2E
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BA74182F76F15A9CF514DEF352303C95
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
Certificate, Version=3
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
|
Certificate, Version=3
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1A374813EDB1A6631387E414D3E73232
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\329B6147266C1E26CD774EA22B79EC2E
|
data
|
modified
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BA74182F76F15A9CF514DEF352303C95
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageAgentInformation.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\Temp\~DF610224CE4F91896E.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFA53762D421BE0DA2.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFAFB3817246595346.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFE0A875DB61BC3BA3.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFED5477949DBBDA3C.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFF36E3B3E3AD7D070.TMP
|
data
|
dropped
|
||
\Device\ConDrv
|
JSON data
|
dropped
|
There are 77 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI7358.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4158531 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI7984.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4159906 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI9172.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4166015 11 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="pjt145.chef@elbayrak.com" /CompanyId="1"
/IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000O3Ui7IAF" /AgentId="883f7d62-963d-4a4e-aadf-4ee8e577d238"
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSIB318.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4174625 33 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
883f7d62-963d-4a4e-aadf-4ee8e577d238 "eb7ae0f0-01c0-4bb5-a03a-e6b63b26697d" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000O3Ui7IAF
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
883f7d62-963d-4a4e-aadf-4ee8e577d238 "bc5dfe9b-e2bb-4515-b3e1-7877603aa96e" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000O3Ui7IAF
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
883f7d62-963d-4a4e-aadf-4ee8e577d238 "16904213-f096-40ec-9bf1-11c4695deea3" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000O3Ui7IAF
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\e0#U05ea.msi"
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding 2C828FCE33DD8E11A4DB652C16749A7F
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding 383888C60FE94E71DA4676E44D32717F E Global\MSI0000
|
||
C:\Windows\SysWOW64\net.exe
|
"NET" STOP AteraAgent
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\net1.exe
|
C:\Windows\system32\net1 STOP AteraAgent
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"TaskKill.exe" /f /im AteraAgent.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
"C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 13 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/883f7d62-963d-4a4e-aadf-4ee8e577d238/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=9b35e03f-9217-47fc-883e-376a0acf1a33&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/883f7d62-963d-4a4e-aadf-4ee8e577d238/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=0fdd6a07-21a5-4251-94a9-7ec5786af820&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
|
13.232.67.198
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=5951d75d-4aae-498f-8cfe-2d2684bcac30&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
|
13.232.67.198
|
||
http://schemas.datacontract.org
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageMonitoring/22.0/AgentPackageMonitoring.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageMarketplace/1.6/AgentPackageMarketplace.zip
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetCommands)
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/track-event
|
unknown
|
||
http://dl.google.com/googletalk/googletalk-setup.exe
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=0c8fe399-28d9-41a3-bf50-c77a672f47cf&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
|
13.232.67.198
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=dc3922f5-35d6-4f94-b311-0484e4bd5995
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/
|
unknown
|
||
http://schemas.datacontract.org/2004/07/System.ServiceProcess
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/883f7d62-963d-4a4e-aadf-4ee8e577d238/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=e5b922ff-1087-45ae-bfaa-92dac2278cbc&tr=31&tt=17324434221501574&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
|
13.232.67.198
|
||
http://wixtoolset.org
|
unknown
|
||
https://agent-api.atera.com/Production
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=dc3922f5-35d6-4f94-b311-0484e4bd5995&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/883f7d62-963d-4a4e-aadf-4ee8e577d238/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=8cf06a91-99a7-45cd-a779-b72be96870d7&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
|
13.232.67.198
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=12f3eadc-4137-4969-a630-9caae86b52c8&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
|
13.232.67.198
|
||
https://ps.atera.com/agentpackageswin/AgentPackageRuntimeInstaller/13.0/AgentPackageRuntimeInstaller
|
unknown
|
||
http://acontrol.atera.com/
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/883f7d62-963d-4a4e-aadf-4ee8e577d238/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=58b95c89-793e-4183-b4ec-622b28949278&tt=0&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
|
13.232.67.198
|
||
https://agent-api.atera.com/Production/Agent/AgentStarting)
|
unknown
|
||
https://ps.pndsn.com
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageADRemote/6.0/AgentPackageADRemote.zip
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageNetworkDiscovery/23.9/AgentPackageNetworkDiscove
|
unknown
|
||
https://agent-api.aterDn
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageMonitoring/37.8/AgentPackageMonitoring.zip
|
unknown
|
||
http://agent-api.atera.com
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageSystemTools/27.8/AgentPackageSystemTools.zip
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/883f7d62-963d-4a4e-aadf-4ee8e577d238/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=828d2fae-bb40-4bf1-b7d4-c9f95f35880c&tt=0&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
|
13.232.67.198
|
||
http://schemas.datacontract.org/2004/07/
|
unknown
|
||
https://github.com/icsharpcode/SharpZipLib
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageNetworkDiscovery/15.0/AgentPackageNetworkDiscovery
|
unknown
|
||
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageAgentI
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
|
unknown
|
||
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/883f7d62-963d-4a4e-aadf-4ee8e577d238/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=de3a19ac-393b-475a-b5ce-07c61aa216d9&tr=31&tt=17324433440133815&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
|
13.232.67.198
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=484b7669-faad-46fb-95da-3f494fe71338&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageTaskScheduler/17.2/AgentPackageTaskScheduler.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageTicketing/30.1/AgentPackageTicketing.zip
|
unknown
|
||
https://agent-api.atera.com
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/AgentStarting
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=2aed862e-2eee-4460-94f8-67ced20c3e98
|
unknown
|
||
http://www.w3.oh
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetCommands
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/883f7d62-963d-4a4e-aadf-4ee8e577d238/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=9dbdf105-b22b-42a8-a293-ef3c50c5b89f&tr=31&tt=17324433466351848&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
|
13.232.67.198
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=4e6de541-ebdf-48b4-adc4-f35ddb9ca4eb&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/883f7d62-963d-4a4e-aadf-4ee8e577d238/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=a714345f-6069-463f-b471-b79c49409a31&tr=31&tt=17324434221501574&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
|
13.232.67.198
|
||
https://agent-api.atera.com/
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=09996451-139e-4d4e-87e9-c03841f30e76&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
|
13.232.67.198
|
||
https://agent-api.atera.com/Production/Agent/GetRecurringPackages
|
unknown
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.Availability/13.0/Agent.Package.Availability.zip
|
unknown
|
||
https://www.newtonsoft.com/jsonschema
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageRuntimeInstaller/1.5/AgentPackageRuntimeInstaller.
|
unknown
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.Watchdog/13.0/Agent.Package.Watchdog.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=0c8fe399-28d9-41a3-bf50-c77a672f47cf
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=d7638603-5a9e-4a0e-a726-ea2723946dc6&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
|
13.232.67.198
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.Availability/0.16/Agent.Package.Availability.z
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageAgentInformation/38.0/AgentPackageAgentInformation.zip?MXEuqxTtBtfd+dFjSfn8PupuPxKD+CNuASOYt6ySpA3SYMBPBbjiPgfcFSHiAA/v
|
108.158.75.93
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/883f7d62-963d-4a4e-aadf-4ee8e577d238/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=ae447775-3f27-4878-8dac-a944634d4b04&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
|
13.232.67.198
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageUpgradeAgent/27.6/AgentPackageUpgradeAgent.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=5951d75d-4aae-498f-8cfe-2d2684bcac30
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=12f3eadc-4137-4969-a630-9caae86b52c8
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=459bf948-52b5-4158-a1ed-7acb5a150d74&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
|
13.232.67.198
|
||
https://www.newtonsoft.com/json
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageHeartbeat/16.9
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=d7638603-5a9e-4a0e-a726-ea2723946dc6
|
unknown
|
||
http://wixtoolset.org/news/
|
unknown
|
||
https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageAgentInformation/22.7/AgentPackageAgentInformation
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageOsUpdates/20.9/AgentPackageOsUpdates.zip
|
unknown
|
||
https://agent-api.aterD
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageNetworkDiscovery/13.0/AgentPackageNetworkDiscovery
|
unknown
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.IotPoc/13.0/Agent.Package.IotPoc.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=2aed862e-2eee-4460-94f8-67ced20c3e98&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
|
13.232.67.198
|
||
https://agent-api.atera.com/Production/Agent/AcknowledgeCommands
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageTaskScheduler/13.0/AgentPackageTaskScheduler.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageAgentInformation/38.0/AgentPackageAgentInformation
|
unknown
|
||
http://www.w3.o
|
unknown
|
||
https://ps.atera.com
|
unknown
|
||
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageA
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageAgentInformation/38.0/AgentPackageAgentInformati
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetCommandsFallback
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/883f7d62-963d-4a4e-aadf
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/883f7d62-963d-4a4e-aadf-4ee8e577d238/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=53a672d4-64e8-41a4-b6a2-cf6f70a93e3a&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
|
13.232.67.198
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageRuntimeInstaller/1.6/AgentPackageRuntimeInstalle
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageHeartbeat/17.14/AgentPackageHeartbeat.zip
|
unknown
|
||
http://ps.pndsn.com
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/883f7d62-963d-4a4e-aadf-4ee8e577d238/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=c81cc1d6-c362-4d28-bb00-1ffac3b99a1b&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
|
13.232.67.198
|
||
https://github.com/JamesNK/Newtonsoft.Json
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/883f7d62-963d-4a4e-aadf-4ee8e577d238/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=be904d3c-4208-46ed-ab86-e69008a35a81&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
|
13.232.67.198
|
||
https://ps.atera.com/agentpackagesmac/Agent.Package.Availability/0.16/Agent.Package.Availability.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/Agent.Package.Watchdog/1.7/A
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ps.pndsn.com
|
13.232.67.198
|
||
bg.microsoft.map.fastly.net
|
199.232.214.172
|
||
d25btwd9wax8gu.cloudfront.net
|
108.158.75.93
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
||
windowsupdatebg.s.llnwi.net
|
178.79.238.0
|
||
ps.atera.com
|
unknown
|
||
agent-api.atera.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
108.158.75.93
|
d25btwd9wax8gu.cloudfront.net
|
United States
|
||
13.232.67.198
|
ps.pndsn.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\3f7202.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\3f7202.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB9EFD7FDAF9AD115987000E181661F5
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CD868C8CE5A308147ABB306D829266BC
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C32B8CE0327C1E141950B4C9C2AD4DA7
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D9B1B1F0B1FC024D9390FE4B94D97D5
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\007F59F54ACD08842B2D98A10E6D1E3A
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB25C26F7C51D3C4AA2BED5600F46956
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01010F83113E72A4C81AD77422D2F947
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01D9DC4B27DFC0340B543A11D3CEBE07
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\ATERA Networks\AteraAgent\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\ATERA Networks\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\7D0A237E2F2A7564CA141B792446E854
|
INSTALLFOLDER_files_Feature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Features
|
INSTALLFOLDER_files_Feature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
|
LastUsedSource
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
|
AutoBackupLogFiles
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AteraAgent
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
AccountId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
IntegratorLogin
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
CompanyId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
AgentId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
ServerName
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AlphaAgent
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
FileDirectory
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
FileDirectory
|
There are 135 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
17A800B4000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD24000
|
trusted library allocation
|
page read and write
|
||
4884000
|
trusted library allocation
|
page read and write
|
||
2917AA98000
|
heap
|
page read and write
|
||
19F996FA000
|
trusted library allocation
|
page read and write
|
||
20BD2632000
|
heap
|
page read and write
|
||
19F997CA000
|
trusted library allocation
|
page read and write
|
||
20BD2558000
|
heap
|
page read and write
|
||
17A80001000
|
trusted library allocation
|
page read and write
|
||
19FB20D0000
|
heap
|
page read and write
|
||
19F99511000
|
trusted library allocation
|
page read and write
|
||
19FB2120000
|
heap
|
page read and write
|
||
171C13A0000
|
heap
|
page read and write
|
||
171C1B73000
|
trusted library allocation
|
page read and write
|
||
20BD256B000
|
heap
|
page read and write
|
||
17AE9BD6000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
19F9957D000
|
trusted library allocation
|
page read and write
|
||
19FB2232000
|
heap
|
page read and write
|
||
20BD25D1000
|
heap
|
page read and write
|
||
291619C9000
|
heap
|
page read and write
|
||
291619FB000
|
heap
|
page read and write
|
||
291619C0000
|
heap
|
page read and write
|
||
20BD258B000
|
heap
|
page read and write
|
||
20BD2E57000
|
trusted library allocation
|
page read and write
|
||
29161A4B000
|
heap
|
page read and write
|
||
4255000
|
heap
|
page read and write
|
||
171C13EE000
|
heap
|
page read and write
|
||
20BD258D000
|
heap
|
page read and write
|
||
17A8008C000
|
trusted library allocation
|
page read and write
|
||
17AE76E6000
|
heap
|
page read and write
|
||
29162111000
|
trusted library allocation
|
page read and write
|
||
171C1AF1000
|
trusted library allocation
|
page read and write
|
||
44C4000
|
heap
|
page read and write
|
||
29162183000
|
trusted library allocation
|
page read and write
|
||
47E1000
|
trusted library allocation
|
page read and write
|
||
5081000
|
trusted library allocation
|
page read and write
|
||
17AE9DC0000
|
heap
|
page read and write
|
||
19FB22CC000
|
heap
|
page read and write
|
||
8AB22F5000
|
stack
|
page read and write
|
||
19F98C2D000
|
heap
|
page read and write
|
||
17AE76A0000
|
heap
|
page read and write
|
||
5127000
|
trusted library allocation
|
page read and write
|
||
171DA1B2000
|
unkown
|
page readonly
|
||
29161980000
|
heap
|
page read and write
|
||
17AE776E000
|
heap
|
page read and write
|
||
19F98CC3000
|
heap
|
page read and write
|
||
19F98CF0000
|
heap
|
page read and write
|
||
29162193000
|
trusted library allocation
|
page read and write
|
||
291621CF000
|
trusted library allocation
|
page read and write
|
||
20BD2E83000
|
trusted library allocation
|
page read and write
|
||
17A80132000
|
trusted library allocation
|
page read and write
|
||
19F99BF5000
|
trusted library allocation
|
page read and write
|
||
17A800BA000
|
trusted library allocation
|
page read and write
|
||
19F99AFB000
|
trusted library allocation
|
page read and write
|
||
17A80089000
|
trusted library allocation
|
page read and write
|
||
17A800B2000
|
trusted library allocation
|
page read and write
|
||
171C14D0000
|
heap
|
page read and write
|
||
19F98BF0000
|
heap
|
page read and write
|
||
4FB9000
|
heap
|
page read and write
|
||
17AE7572000
|
unkown
|
page readonly
|
||
19F98F80000
|
heap
|
page read and write
|
||
29162157000
|
trusted library allocation
|
page read and write
|
||
17AE9DF8000
|
heap
|
page read and write
|
||
17A8017C000
|
trusted library allocation
|
page read and write
|
||
20BD2830000
|
heap
|
page read and write
|
||
20BD2ECF000
|
trusted library allocation
|
page read and write
|
||
19F98C0C000
|
heap
|
page read and write
|
||
171C1B63000
|
trusted library allocation
|
page read and write
|
||
19FB1C27000
|
heap
|
page read and write
|
||
20BD2E93000
|
trusted library allocation
|
page read and write
|
||
171C11B2000
|
unkown
|
page readonly
|
||
17AE9B5B000
|
heap
|
page read and write
|
||
17AE7720000
|
heap
|
page read and write
|
||
F3860F1000
|
stack
|
page read and write
|
||
17AE76E0000
|
heap
|
page read and write
|
||
171C1360000
|
heap
|
page read and write
|
||
17AE9E0F000
|
heap
|
page read and write
|
||
19F98C77000
|
heap
|
page read and write
|
||
20BD2550000
|
heap
|
page read and write
|
||
20BD2E11000
|
trusted library allocation
|
page read and write
|
||
29161A82000
|
heap
|
page read and write
|
||
17AE772F000
|
heap
|
page read and write
|
||
19FB2146000
|
heap
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
46CC000
|
trusted library allocation
|
page execute and read and write
|
||
462FEFC000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
2727000
|
heap
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
17AE7741000
|
heap
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
8AB453A000
|
stack
|
page read and write
|
||
19F996EE000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD79000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
35D0000
|
heap
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
25E5000
|
heap
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD65000
|
trusted library allocation
|
page read and write
|
||
28D7000
|
heap
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
19FB216D000
|
heap
|
page read and write
|
||
19F999A7000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD40000
|
trusted library allocation
|
page read and write
|
||
19F995D6000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
483D000
|
trusted library allocation
|
page read and write
|
||
749E000
|
stack
|
page read and write
|
||
291620E0000
|
heap
|
page execute and read and write
|
||
7FF7BFD13000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
19F99596000
|
trusted library allocation
|
page read and write
|
||
17B9ACC8000
|
heap
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
5154000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
2BA3000
|
trusted library allocation
|
page execute and read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD80000
|
trusted library allocation
|
page read and write
|
||
385B000
|
trusted library allocation
|
page execute and read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
2A46000
|
heap
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
19FB2590000
|
heap
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
28E9000
|
heap
|
page read and write
|
||
4730000
|
trusted library allocation
|
page read and write
|
||
7B63000
|
heap
|
page read and write
|
||
2BA4000
|
trusted library allocation
|
page read and write
|
||
6790000
|
trusted library allocation
|
page read and write
|
||
20BD2835000
|
heap
|
page read and write
|
||
7610000
|
heap
|
page execute and read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD33000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD4E000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
56563FE000
|
stack
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
6D5D000
|
stack
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB94000
|
trusted library allocation
|
page read and write
|
||
29FE000
|
stack
|
page read and write
|
||
19FB215D000
|
heap
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFC30000
|
trusted library allocation
|
page execute and read and write
|
||
6B00000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
4530000
|
heap
|
page readonly
|
||
7FF7BFC50000
|
trusted library allocation
|
page execute and read and write
|
||
45CC000
|
stack
|
page read and write
|
||
3608000
|
heap
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
7FF7BFB92000
|
trusted library allocation
|
page read and write
|
||
5048000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB7D000
|
trusted library allocation
|
page execute and read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD80000
|
trusted library allocation
|
page execute and read and write
|
||
452F000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
2A03000
|
heap
|
page read and write
|
||
7FF7BFD32000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
171C138D000
|
heap
|
page read and write
|
||
19F98F70000
|
trusted library allocation
|
page read and write
|
||
8AB423A000
|
stack
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
4660000
|
trusted library allocation
|
page read and write
|
||
7450000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
7A5E000
|
stack
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
2A85000
|
heap
|
page read and write
|
||
F386BFD000
|
stack
|
page read and write
|
||
3614000
|
heap
|
page read and write
|
||
35DA000
|
heap
|
page read and write
|
||
8AB2D35000
|
stack
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
29161BE5000
|
heap
|
page read and write
|
||
20BEB790000
|
heap
|
page execute and read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
19F9981F000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7F808000
|
trusted library allocation
|
page execute and read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7595000
|
trusted library allocation
|
page read and write
|
||
7FF7BFEA0000
|
trusted library allocation
|
page execute and read and write
|
||
369C000
|
heap
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
3405000
|
heap
|
page read and write
|
||
7FF7BFDA0000
|
trusted library allocation
|
page read and write
|
||
368A000
|
heap
|
page read and write
|
||
171DA3A9000
|
heap
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
8AB323C000
|
stack
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
19FA9523000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD80000
|
trusted library allocation
|
page read and write
|
||
75E1000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
44E4000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB70000
|
trusted library allocation
|
page read and write
|
||
46303FD000
|
stack
|
page read and write
|
||
6083FFE000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
6BD0000
|
remote allocation
|
page read and write
|
||
171C13AB000
|
heap
|
page read and write
|
||
8AB343E000
|
stack
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
3823000
|
trusted library allocation
|
page execute and read and write
|
||
20BD2E4D000
|
trusted library allocation
|
page read and write
|
||
19F995E6000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7F008000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7BFC4C000
|
trusted library allocation
|
page execute and read and write
|
||
4873000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
293D000
|
heap
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
46C6000
|
trusted library allocation
|
page execute and read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
171DA360000
|
heap
|
page read and write
|
||
19F99E2A000
|
trusted library allocation
|
page read and write
|
||
20FC000
|
stack
|
page read and write
|
||
2C4E000
|
stack
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
464E000
|
stack
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
11247E000
|
stack
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
171C16C5000
|
heap
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
7FF7BFDD0000
|
trusted library allocation
|
page execute and read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
6A8E000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFC9B000
|
trusted library allocation
|
page execute and read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB75000
|
trusted library allocation
|
page read and write
|
||
8AB3627000
|
stack
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
8AB3D29000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
2735000
|
heap
|
page read and write
|
||
6880000
|
heap
|
page execute and read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD90000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD35000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD10000
|
trusted library allocation
|
page read and write
|
||
7FF7BFDD0000
|
trusted library allocation
|
page execute and read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
4700000
|
heap
|
page execute and read and write
|
||
7FF7BFD30000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
19F995B7000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
20BD2740000
|
heap
|
page read and write
|
||
23BD000
|
stack
|
page read and write
|
||
2557000
|
stack
|
page read and write
|
||
19F99340000
|
heap
|
page execute and read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
2A7B000
|
heap
|
page read and write
|
||
4560000
|
trusted library allocation
|
page execute and read and write
|
||
432E000
|
stack
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
5655FFE000
|
stack
|
page read and write
|
||
2A5F000
|
heap
|
page read and write
|
||
46306FC000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
17A90001000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
29161AA6000
|
heap
|
page read and write
|
||
19FB218B000
|
heap
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB9D000
|
trusted library allocation
|
page execute and read and write
|
||
19F99629000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
F3864FD000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
19F99DF8000
|
trusted library allocation
|
page read and write
|
||
3850000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
19FB1ED2000
|
unkown
|
page readonly
|
||
47A3000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
6BCE000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFBCC000
|
trusted library allocation
|
page execute and read and write
|
||
17AE9E0B000
|
heap
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB73000
|
trusted library allocation
|
page execute and read and write
|
||
56566FE000
|
stack
|
page read and write
|
||
50E1000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
17AE9E07000
|
heap
|
page read and write
|
||
171C14D5000
|
heap
|
page read and write
|
||
5172000
|
trusted library allocation
|
page read and write
|
||
8AB30BE000
|
stack
|
page read and write
|
||
4380000
|
trusted library allocation
|
page execute and read and write
|
||
17AE9333000
|
heap
|
page read and write
|
||
19F99DF2000
|
trusted library allocation
|
page read and write
|
||
5124000
|
trusted library allocation
|
page read and write
|
||
3857000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7BFB80000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
2A19000
|
heap
|
page read and write
|
||
19FB21A3000
|
heap
|
page read and write
|
||
6083DFF000
|
stack
|
page read and write
|
||
29172121000
|
trusted library allocation
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
19F99AEF000
|
trusted library allocation
|
page read and write
|
||
11210D000
|
stack
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
19F98C4D000
|
heap
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
4711000
|
trusted library allocation
|
page read and write
|
||
6AA0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
3810000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
26AF000
|
stack
|
page read and write
|
||
19F99975000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFDE0000
|
trusted library allocation
|
page execute and read and write
|
||
2B30000
|
heap
|
page readonly
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
46309FB000
|
stack
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
2885000
|
heap
|
page read and write
|
||
6A90000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFC20000
|
trusted library allocation
|
page read and write
|
||
17AE92F0000
|
heap
|
page execute and read and write
|
||
2BDB000
|
trusted library allocation
|
page execute and read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
17AE9E6A000
|
heap
|
page read and write
|
||
F3869FE000
|
stack
|
page read and write
|
||
7620000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
26A0000
|
heap
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD56000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD55000
|
trusted library allocation
|
page read and write
|
||
2BAD000
|
trusted library allocation
|
page execute and read and write
|
||
2BD2000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFF30000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
19F98F65000
|
heap
|
page read and write
|
||
171C13EB000
|
heap
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
323B000
|
stack
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
56565FD000
|
stack
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
46304FC000
|
stack
|
page read and write
|
||
7FF7BFD2A000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB83000
|
trusted library allocation
|
page read and write
|
||
19F999A3000
|
trusted library allocation
|
page read and write
|
||
21EF000
|
unkown
|
page read and write
|
||
20BD27B0000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
8AB4337000
|
stack
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
19F99BF1000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFBB0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
7FF7BFC2C000
|
trusted library allocation
|
page execute and read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
171DA260000
|
unkown
|
page readonly
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFC56000
|
trusted library allocation
|
page execute and read and write
|
||
29EA000
|
heap
|
page read and write
|
||
19F996E6000
|
trusted library allocation
|
page read and write
|
||
3824000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
2930000
|
heap
|
page read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
8AB26FD000
|
stack
|
page read and write
|
||
70BC000
|
stack
|
page read and write
|
||
7FF7BFD76000
|
trusted library allocation
|
page read and write
|
||
19F995D2000
|
trusted library allocation
|
page read and write
|
||
4680000
|
trusted library allocation
|
page execute and read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7620000
|
trusted library allocation
|
page read and write
|
||
7FF7BFC40000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
56562FE000
|
stack
|
page read and write
|
||
46301FC000
|
stack
|
page read and write
|
||
6D1E000
|
stack
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD89000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
462FDFB000
|
stack
|
page read and write
|
||
7FF7BFC20000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
171DA310000
|
heap
|
page read and write
|
||
7FF7BFD20000
|
trusted library allocation
|
page read and write
|
||
7075000
|
heap
|
page read and write
|
||
47AE000
|
trusted library allocation
|
page read and write
|
||
297D000
|
stack
|
page read and write
|
||
171C1460000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
4755000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
2850000
|
heap
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
4FF0000
|
heap
|
page execute and read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
2AC0000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
6CDE000
|
stack
|
page read and write
|
||
43A0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD10000
|
trusted library allocation
|
page read and write
|
||
3663000
|
heap
|
page read and write
|
||
171DA420000
|
heap
|
page execute and read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
19F99D18000
|
trusted library allocation
|
page read and write
|
||
8AB4737000
|
stack
|
page read and write
|
||
20BEB6AA000
|
heap
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
8AB4937000
|
stack
|
page read and write
|
||
171C13A9000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD4A000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
2A88000
|
heap
|
page read and write
|
||
171DA31A000
|
heap
|
page read and write
|
||
6081000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7620000
|
trusted library allocation
|
page read and write
|
||
29161A09000
|
heap
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD80000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
19F9959C000
|
trusted library allocation
|
page read and write
|
||
8AB233E000
|
stack
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFDC0000
|
trusted library allocation
|
page execute and read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
19F99D16000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
42FF000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
48B4000
|
trusted library allocation
|
page read and write
|
||
6BD0000
|
remote allocation
|
page read and write
|
||
2917AACF000
|
heap
|
page read and write
|
||
26F5000
|
heap
|
page read and write
|
||
171C13E9000
|
heap
|
page read and write
|
||
7FF41B700000
|
trusted library allocation
|
page execute and read and write
|
||
53D1000
|
trusted library allocation
|
page read and write
|
||
8AB353F000
|
stack
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
19FB1540000
|
trusted library allocation
|
page read and write
|
||
48D2000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
171DA30C000
|
unkown
|
page readonly
|
||
7FF7BFD50000
|
trusted library allocation
|
page execute and read and write
|
||
6870000
|
heap
|
page read and write
|
||
29162240000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
17AE9DEB000
|
heap
|
page read and write
|
||
7B9D000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
19F996F6000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
37D0000
|
heap
|
page read and write
|
||
19F999F9000
|
trusted library allocation
|
page read and write
|
||
17AE772D000
|
heap
|
page read and write
|
||
5145000
|
trusted library allocation
|
page read and write
|
||
267D000
|
stack
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
19F98C17000
|
heap
|
page read and write
|
||
251B000
|
stack
|
page read and write
|
||
29161A07000
|
heap
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFDC0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
19FB217E000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
2CA5000
|
heap
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
19F996D0000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD8E000
|
trusted library allocation
|
page read and write
|
||
465D000
|
trusted library allocation
|
page execute and read and write
|
||
19FB219F000
|
heap
|
page read and write
|
||
171DA37D000
|
heap
|
page read and write
|
||
5113000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
171C1C1F000
|
trusted library allocation
|
page read and write
|
||
19F98CB8000
|
heap
|
page read and write
|
||
26F0000
|
heap
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
28AA000
|
heap
|
page read and write
|
||
289D000
|
stack
|
page read and write
|
||
F386AFE000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
7510000
|
trusted library allocation
|
page read and write
|
||
47AC000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
19F99E18000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
19F997C4000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
19F98DD0000
|
heap
|
page read and write
|
||
3820000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
20BEB657000
|
heap
|
page read and write
|
||
46C0000
|
trusted library allocation
|
page read and write
|
||
3689000
|
heap
|
page read and write
|
||
19F996EA000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
2A0C000
|
heap
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD52000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
19F993C0000
|
heap
|
page read and write
|
||
3612000
|
heap
|
page read and write
|
||
7FF7BFB74000
|
trusted library allocation
|
page read and write
|
||
171D1AF1000
|
trusted library allocation
|
page read and write
|
||
462FCFE000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
7594000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
48A5000
|
trusted library allocation
|
page read and write
|
||
7FF7BFDF0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD70000
|
trusted library allocation
|
page read and write
|
||
19F98F73000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
5060000
|
heap
|
page read and write
|
||
69CE000
|
stack
|
page read and write
|
||
19F99DF0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
382D000
|
trusted library allocation
|
page execute and read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
17B9AC30000
|
heap
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFDA0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
29161BC0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB94000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
28B7000
|
heap
|
page read and write
|
||
7FF7BFD70000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7FF7BFBBB000
|
trusted library allocation
|
page execute and read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
6083CFD000
|
stack
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
6083AFE000
|
stack
|
page read and write
|
||
4455000
|
heap
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7B60000
|
heap
|
page read and write
|
||
448F000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
17AE7769000
|
heap
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
7FF7BFD10000
|
trusted library allocation
|
page read and write
|
||
47C4000
|
trusted library allocation
|
page read and write
|
||
17AE7723000
|
heap
|
page read and write
|
||
20BD2638000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
171C11B0000
|
unkown
|
page readonly
|
||
7FF7BFDC0000
|
trusted library allocation
|
page execute and read and write
|
||
701E000
|
stack
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
19FB2195000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
27B000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page execute and read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
6B8E000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
428E000
|
stack
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
75C0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
F3868FE000
|
stack
|
page read and write
|
||
35FC000
|
heap
|
page read and write
|
||
171DA1C8000
|
unkown
|
page readonly
|
||
2B3E000
|
stack
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB8D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7BFD3D000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
17AE93D4000
|
unkown
|
page readonly
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD90000
|
trusted library allocation
|
page execute and read and write
|
||
19F996A4000
|
trusted library allocation
|
page read and write
|
||
46DE000
|
stack
|
page read and write
|
||
7600000
|
trusted library allocation
|
page execute and read and write
|
||
29172111000
|
trusted library allocation
|
page read and write
|
||
674E000
|
stack
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
171C11DC000
|
unkown
|
page readonly
|
||
4522000
|
heap
|
page read and write
|
||
2935000
|
heap
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
20BD2540000
|
heap
|
page read and write
|
||
5162000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB72000
|
trusted library allocation
|
page read and write
|
||
19F999AB000
|
trusted library allocation
|
page read and write
|
||
50D1000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
4FEA000
|
heap
|
page read and write
|
||
789E000
|
stack
|
page read and write
|
||
7FF7BFB9B000
|
trusted library allocation
|
page execute and read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
17A9000F000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7FF7BFE00000
|
trusted library allocation
|
page read and write
|
||
171C1480000
|
heap
|
page read and write
|
||
25D0000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7A1D000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
4755000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7FF7BFE50000
|
trusted library allocation
|
page read and write
|
||
29161BD3000
|
trusted library allocation
|
page read and write
|
||
5655EFD000
|
stack
|
page read and write
|
||
29162060000
|
heap
|
page execute and read and write
|
||
6D9E000
|
stack
|
page read and write
|
||
8AB28FE000
|
stack
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
29BE000
|
stack
|
page read and write
|
||
8AB3829000
|
stack
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
44ED000
|
trusted library allocation
|
page execute and read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
378E000
|
stack
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
7530000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
19FB24E0000
|
unkown
|
page readonly
|
||
19F996C8000
|
trusted library allocation
|
page read and write
|
||
8AB3F3F000
|
stack
|
page read and write
|
||
20BD2720000
|
heap
|
page read and write
|
||
29162100000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7BA6000
|
heap
|
page read and write
|
||
7FF7BFD40000
|
trusted library allocation
|
page read and write
|
||
7FF7BFDF0000
|
trusted library allocation
|
page execute and read and write
|
||
75DC000
|
trusted library allocation
|
page read and write
|
||
17AE9DE7000
|
heap
|
page read and write
|
||
2A48000
|
heap
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
171DA3AB000
|
heap
|
page read and write
|
||
2A63000
|
heap
|
page read and write
|
||
46300FE000
|
stack
|
page read and write
|
||
369C000
|
heap
|
page read and write
|
||
60839FE000
|
stack
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
25CE000
|
stack
|
page read and write
|
||
29A7000
|
heap
|
page read and write
|
||
19F99575000
|
trusted library allocation
|
page read and write
|
||
F3862FE000
|
stack
|
page read and write
|
||
47B1000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB78000
|
trusted library allocation
|
page read and write
|
||
46C3000
|
trusted library allocation
|
page read and write
|
||
2A7C000
|
heap
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
8AB4D3C000
|
stack
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
70AE000
|
heap
|
page read and write
|
||
462F6FB000
|
stack
|
page read and write
|
||
7FF7BFC2C000
|
trusted library allocation
|
page execute and read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
6BD0000
|
heap
|
page read and write
|
||
2A65000
|
heap
|
page read and write
|
||
7630000
|
trusted library allocation
|
page read and write
|
||
17AE9240000
|
heap
|
page read and write
|
||
19F98E10000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
259B000
|
stack
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
19F999F5000
|
trusted library allocation
|
page read and write
|
||
19F99D14000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD64000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD50000
|
trusted library allocation
|
page execute and read and write
|
||
2C50000
|
heap
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD13000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
7EFE8000
|
trusted library allocation
|
page execute and read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
8AB25FE000
|
stack
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
7FF7BFDA2000
|
trusted library allocation
|
page read and write
|
||
370D000
|
stack
|
page read and write
|
||
7FF7BFC56000
|
trusted library allocation
|
page execute and read and write
|
||
292E000
|
heap
|
page read and write
|
||
46C4000
|
heap
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
37CE000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
42B0000
|
heap
|
page execute and read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD50000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
19F98C37000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
2916214D000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD4E000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD50000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
29161A46000
|
heap
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
17AE7650000
|
heap
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
171DA262000
|
unkown
|
page readonly
|
||
29161930000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7FF7BFE10000
|
trusted library allocation
|
page execute and read and write
|
||
8AB2C3E000
|
stack
|
page read and write
|
||
17AE770B000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
76C0000
|
remote allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
8AB2AFE000
|
stack
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
2AD3000
|
trusted library allocation
|
page execute and read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
3AD000
|
stack
|
page read and write
|
||
7FF7BFD27000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB90000
|
trusted library allocation
|
page read and write
|
||
7FF7BFF50000
|
trusted library allocation
|
page read and write
|
||
20BE2E1D000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
75C0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
5655CFF000
|
stack
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
F3863FE000
|
stack
|
page read and write
|
||
8AB3A2A000
|
stack
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
44F0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
19F99D12000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
17AE78C0000
|
trusted library allocation
|
page read and write
|
||
19F999A5000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7EFF0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7BFC30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7BFD89000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
8AB2BF5000
|
stack
|
page read and write
|
||
750C000
|
trusted library allocation
|
page execute and read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
19F996CC000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB7D000
|
trusted library allocation
|
page execute and read and write
|
||
20BEB6CD000
|
heap
|
page read and write
|
||
171C16C0000
|
heap
|
page read and write
|
||
6F1D000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7509000
|
trusted library allocation
|
page execute and read and write
|
||
5715000
|
trusted library allocation
|
page read and write
|
||
2A88000
|
heap
|
page read and write
|
||
4517000
|
trusted library allocation
|
page execute and read and write
|
||
3852000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
19F9956A000
|
trusted library allocation
|
page read and write
|
||
7FF7BFBCC000
|
trusted library allocation
|
page execute and read and write
|
||
47A1000
|
trusted library allocation
|
page read and write
|
||
75C0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
8AB3B3B000
|
stack
|
page read and write
|
||
19FB22BF000
|
heap
|
page read and write
|
||
2916214B000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB70000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
19FA958F000
|
trusted library allocation
|
page read and write
|
||
46308FC000
|
stack
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
2917AA88000
|
heap
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
7FF7BFDB0000
|
trusted library allocation
|
page read and write
|
||
19FB2370000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
4548000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
74DE000
|
stack
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
17AE9E4C000
|
heap
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
19FB24E2000
|
unkown
|
page readonly
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
19F995DE000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
19F99B8B000
|
trusted library allocation
|
page read and write
|
||
56561FE000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
19F98C3B000
|
heap
|
page read and write
|
||
7FF7BFB9B000
|
trusted library allocation
|
page execute and read and write
|
||
70FD000
|
stack
|
page read and write
|
||
7FF7BFB90000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
29AE000
|
stack
|
page read and write
|
||
7FF7BFD6B000
|
trusted library allocation
|
page read and write
|
||
4286000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
785E000
|
stack
|
page read and write
|
||
2850000
|
heap
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
75D1000
|
trusted library allocation
|
page read and write
|
||
20BD2E4B000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
11257E000
|
stack
|
page read and write
|
||
60842FE000
|
stack
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFDA0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
2B07000
|
trusted library allocation
|
page execute and read and write
|
||
7520000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7BFC46000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7FF7BFC2C000
|
trusted library allocation
|
page execute and read and write
|
||
171C1C33000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD45000
|
trusted library allocation
|
page read and write
|
||
60841FE000
|
stack
|
page read and write
|
||
19F98C75000
|
heap
|
page read and write
|
||
19F99DF6000
|
trusted library allocation
|
page read and write
|
||
462FAFF000
|
stack
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
20BD25AB000
|
heap
|
page read and write
|
||
7FF7BFDB0000
|
trusted library allocation
|
page read and write
|
||
436F000
|
stack
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB93000
|
trusted library allocation
|
page execute and read and write
|
||
17AE7594000
|
unkown
|
page readonly
|
||
2800000
|
heap
|
page read and write
|
||
4754000
|
trusted library allocation
|
page read and write
|
||
2C00000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
17AE76D0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page execute and read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
7FF7BFC26000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB80000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
7570000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
17AE9330000
|
heap
|
page read and write
|
||
70A0000
|
heap
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
2160000
|
heap
|
page read and write
|
||
17B9ACB0000
|
heap
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
7F7F0000
|
trusted library allocation
|
page execute and read and write
|
||
75D4000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
17AE7920000
|
heap
|
page execute and read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
487B000
|
trusted library allocation
|
page read and write
|
||
19FB1BD0000
|
heap
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
8AB443C000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD6D000
|
trusted library allocation
|
page read and write
|
||
171C1260000
|
heap
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
60844FE000
|
stack
|
page read and write
|
||
171C13A3000
|
heap
|
page read and write
|
||
705E000
|
stack
|
page read and write
|
||
7FF7BFE70000
|
trusted library allocation
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
266E000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
293F000
|
stack
|
page read and write
|
||
7FF7BFBEC000
|
trusted library allocation
|
page execute and read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
17AE7670000
|
heap
|
page read and write
|
||
46E0000
|
trusted library allocation
|
page execute and read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
75D4000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
270B000
|
heap
|
page read and write
|
||
19F98F85000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFC30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7BFD2E000
|
trusted library allocation
|
page read and write
|
||
17B9AC40000
|
heap
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD46000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
2BD7000
|
trusted library allocation
|
page execute and read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
26F8000
|
heap
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
7FF7BFBCC000
|
trusted library allocation
|
page execute and read and write
|
||
17A80172000
|
trusted library allocation
|
page read and write
|
||
7B5E000
|
stack
|
page read and write
|
||
43C0000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
20BE2E11000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
17AE9DDF000
|
heap
|
page read and write
|
||
20BEB6A4000
|
heap
|
page read and write
|
||
7FF7BFB9D000
|
trusted library allocation
|
page execute and read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
19F996A0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
330000
|
heap
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
3671000
|
heap
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
511B000
|
trusted library allocation
|
page read and write
|
||
26F0000
|
heap
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
75D1000
|
trusted library allocation
|
page read and write
|
||
19F995EE000
|
trusted library allocation
|
page read and write
|
||
46307FA000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
27BE000
|
stack
|
page read and write
|
||
29DE000
|
stack
|
page read and write
|
||
171D1AFD000
|
trusted library allocation
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
3608000
|
heap
|
page read and write
|
||
17B9ACC0000
|
heap
|
page read and write
|
||
7FF7BFB83000
|
trusted library allocation
|
page read and write
|
||
7B1E000
|
stack
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
20BD2DE0000
|
heap
|
page execute and read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
17AE9B7E000
|
heap
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
2739000
|
heap
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
19FB1F7E000
|
unkown
|
page readonly
|
||
8AB4637000
|
stack
|
page read and write
|
||
29161985000
|
heap
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
678E000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
171C1690000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB8D000
|
trusted library allocation
|
page execute and read and write
|
||
463D000
|
stack
|
page read and write
|
||
7FF7BFB72000
|
trusted library allocation
|
page read and write
|
||
60843FE000
|
stack
|
page read and write
|
||
35F3000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
20BD2E00000
|
heap
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
19F99B09000
|
trusted library allocation
|
page read and write
|
||
2BB0000
|
trusted library allocation
|
page read and write
|
||
26EE000
|
stack
|
page read and write
|
||
7FF7BFD60000
|
trusted library allocation
|
page read and write
|
||
8AB4B29000
|
stack
|
page read and write
|
||
4730000
|
trusted library allocation
|
page read and write
|
||
46BE000
|
stack
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
7FF7BFC20000
|
trusted library allocation
|
page read and write
|
||
19F99564000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB73000
|
trusted library allocation
|
page execute and read and write
|
||
19FB1ED0000
|
unkown
|
page readonly
|
||
270B000
|
heap
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB9D000
|
trusted library allocation
|
page execute and read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
7F148000
|
trusted library allocation
|
page execute and read and write
|
||
20BEB630000
|
heap
|
page read and write
|
||
171D1B01000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
2A26000
|
heap
|
page read and write
|
||
20BD2F65000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD60000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
7FF7BFBAD000
|
trusted library allocation
|
page execute and read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFDF6000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
19F99579000
|
trusted library allocation
|
page read and write
|
||
6083BFE000
|
stack
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
2ADD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7BFDD0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
19F99E20000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB73000
|
trusted library allocation
|
page execute and read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
21F0000
|
heap
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
20BD27D0000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
7B93000
|
heap
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
19F99D2E000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6BD0000
|
remote allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
320000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
20BD2F61000
|
trusted library allocation
|
page read and write
|
||
374D000
|
stack
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
20BD2595000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
2A6C000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
171C1670000
|
trusted library allocation
|
page read and write
|
||
462F9FE000
|
stack
|
page read and write
|
||
171C1C1C000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD16000
|
trusted library allocation
|
page read and write
|
||
19F98F50000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
27FE000
|
stack
|
page read and write
|
||
2BFF000
|
stack
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
5070000
|
heap
|
page read and write
|
||
19F99D1C000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
19F99E1B000
|
trusted library allocation
|
page read and write
|
||
19F99621000
|
trusted library allocation
|
page read and write
|
||
5655BFF000
|
stack
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47D0000
|
heap
|
page execute and read and write
|
||
19FB222B000
|
heap
|
page read and write
|
||
47A1000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
4380000
|
heap
|
page read and write
|
||
4580000
|
heap
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
3671000
|
heap
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
19F9979E000
|
trusted library allocation
|
page read and write
|
||
29161A1D000
|
heap
|
page read and write
|
||
17AE7570000
|
unkown
|
page readonly
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
45D0000
|
heap
|
page readonly
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD80000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
76C0000
|
heap
|
page read and write
|
||
7FF7BFD40000
|
trusted library allocation
|
page read and write
|
||
68CE000
|
stack
|
page read and write
|
||
7FF7BFB90000
|
trusted library allocation
|
page read and write
|
||
25C0000
|
heap
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
3663000
|
heap
|
page read and write
|
||
256D000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
171DA3BE000
|
heap
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
4570000
|
trusted library allocation
|
page read and write
|
||
2917AABA000
|
heap
|
page read and write
|
||
7620000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
171C11B0000
|
unkown
|
page readonly
|
||
36A5000
|
heap
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFC26000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
29161920000
|
heap
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
8AB403A000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
437E000
|
stack
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD60000
|
trusted library allocation
|
page read and write
|
||
F3865FE000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
17B9AC60000
|
heap
|
page read and write
|
||
690E000
|
stack
|
page read and write
|
||
3689000
|
heap
|
page read and write
|
||
20BD2760000
|
heap
|
page read and write
|
||
29161A03000
|
heap
|
page read and write
|
||
20BE2E21000
|
trusted library allocation
|
page read and write
|
||
2737000
|
heap
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
56560FE000
|
stack
|
page read and write
|
||
2AE1000
|
heap
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
25E0000
|
heap
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
4760000
|
trusted library allocation
|
page read and write
|
||
7595000
|
trusted library allocation
|
page read and write
|
||
35F0000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7BAF000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
70AD000
|
heap
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
8AB373C000
|
stack
|
page read and write
|
||
7FF7BFD33000
|
trusted library allocation
|
page read and write
|
||
3830000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
368B000
|
heap
|
page read and write
|
||
4FEE000
|
stack
|
page read and write
|
||
17AE9AF0000
|
heap
|
page read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7093000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
19FA951E000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD77000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
7FF7BFC56000
|
trusted library allocation
|
page execute and read and write
|
||
2B20000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
20BD2815000
|
heap
|
page read and write
|
||
7FF7BFD20000
|
trusted library allocation
|
page read and write
|
||
7FF7BFE40000
|
trusted library allocation
|
page read and write
|
||
46E0000
|
trusted library allocation
|
page read and write
|
||
3612000
|
heap
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
457E000
|
stack
|
page read and write
|
||
171C16A0000
|
heap
|
page read and write
|
||
7570000
|
trusted library allocation
|
page read and write
|
||
19F995CD000
|
trusted library allocation
|
page read and write
|
||
4510000
|
trusted library allocation
|
page read and write
|
||
451B000
|
trusted library allocation
|
page execute and read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB74000
|
trusted library allocation
|
page read and write
|
||
44E3000
|
trusted library allocation
|
page execute and read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFC90000
|
trusted library allocation
|
page execute and read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
2AD4000
|
trusted library allocation
|
page read and write
|
||
51B9000
|
heap
|
page read and write
|
||
46302FC000
|
stack
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
50C8000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
8AB3931000
|
stack
|
page read and write
|
||
F3861FE000
|
stack
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
462F2F5000
|
stack
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
7FF7BFF40000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
53D5000
|
trusted library allocation
|
page read and write
|
||
29161BA0000
|
trusted library allocation
|
page read and write
|
||
28DC000
|
heap
|
page read and write
|
||
4580000
|
heap
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
17A8017A000
|
trusted library allocation
|
page read and write
|
||
29161950000
|
heap
|
page read and write
|
||
2916223C000
|
trusted library allocation
|
page read and write
|
||
19F98DF0000
|
heap
|
page read and write
|
||
4831000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB94000
|
trusted library allocation
|
page read and write
|
||
781E000
|
stack
|
page read and write
|
||
8AB29FF000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
17AE9342000
|
unkown
|
page readonly
|
||
2B50000
|
heap
|
page read and write
|
||
28CF000
|
heap
|
page read and write
|
||
19FA9511000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
19FB2920000
|
heap
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
6AC0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
462F4FE000
|
stack
|
page read and write
|
||
7FF7BFB94000
|
trusted library allocation
|
page read and write
|
||
20BD2F3F000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD12000
|
trusted library allocation
|
page read and write
|
||
25ED000
|
stack
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
19F996E1000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page execute and read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
20BD2F3C000
|
trusted library allocation
|
page read and write
|
||
2A5F000
|
heap
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
19FA9531000
|
trusted library allocation
|
page read and write
|
||
8AB4C37000
|
stack
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD2D000
|
trusted library allocation
|
page read and write
|
||
7FF7BFE30000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7506000
|
trusted library allocation
|
page execute and read and write
|
||
171DA3B1000
|
heap
|
page read and write
|
||
43C0000
|
heap
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
7503000
|
trusted library allocation
|
page read and write
|
||
8AB3E3E000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
17A80178000
|
trusted library allocation
|
page read and write
|
||
5655AF1000
|
stack
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
45CE000
|
stack
|
page read and write
|
||
7FF7BFC76000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7BFC26000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
20BD2591000
|
heap
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
7EFD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7BFBA3000
|
trusted library allocation
|
page read and write
|
||
2B05000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
2B0B000
|
trusted library allocation
|
page execute and read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
19F993D5000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
20BD2576000
|
heap
|
page read and write
|
||
7FF7BFB70000
|
trusted library allocation
|
page read and write
|
||
75D3000
|
trusted library allocation
|
page read and write
|
||
171C1C41000
|
trusted library allocation
|
page read and write
|
||
74ED000
|
trusted library allocation
|
page execute and read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFBB4000
|
trusted library allocation
|
page read and write
|
||
7BA6000
|
heap
|
page read and write
|
||
467E000
|
stack
|
page read and write
|
||
7FF7BFCB0000
|
trusted library allocation
|
page execute and read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
6F5E000
|
stack
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
35EF000
|
heap
|
page read and write
|
||
462F3FE000
|
stack
|
page read and write
|
||
19F995F2000
|
trusted library allocation
|
page read and write
|
||
19FB2255000
|
heap
|
page read and write
|
||
8AB27FF000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD36000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD30000
|
trusted library allocation
|
page read and write
|
||
75F4000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB8D000
|
trusted library allocation
|
page execute and read and write
|
||
4841000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
171DA1B0000
|
unkown
|
page readonly
|
||
19FB2576000
|
heap
|
page read and write
|
||
6083EFE000
|
stack
|
page read and write
|
||
28BE000
|
stack
|
page read and write
|
||
7FF7BFD90000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7BFD40000
|
trusted library allocation
|
page read and write
|
||
19F996F2000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB9B000
|
trusted library allocation
|
page execute and read and write
|
||
482F000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
462F5FF000
|
stack
|
page read and write
|
||
8AB2428000
|
stack
|
page read and write
|
||
57E1000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
20BD2810000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7595000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
679C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7BFDB0000
|
trusted library allocation
|
page execute and read and write
|
||
20BD2F53000
|
trusted library allocation
|
page read and write
|
||
19FB1EA0000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFDC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7BFC26000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
19F99500000
|
heap
|
page execute and read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
6B00000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
19F999A9000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
8AB3C3C000
|
stack
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFDA7000
|
trusted library allocation
|
page read and write
|
||
19FB2230000
|
heap
|
page read and write
|
||
7FF7BFBBD000
|
trusted library allocation
|
page execute and read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4876000
|
trusted library allocation
|
page read and write
|
||
5166000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFF70000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
2BD5000
|
trusted library allocation
|
page execute and read and write
|
||
2A78000
|
heap
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
6085000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
46305FD000
|
stack
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
19F995AD000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
20BC000
|
stack
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
29161990000
|
heap
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
43A0000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
43B0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD70000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD60000
|
trusted library allocation
|
page read and write
|
||
2917211D000
|
trusted library allocation
|
page read and write
|
||
7FF7BFE90000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
19F9991F000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
7FF7BFBCC000
|
trusted library allocation
|
page execute and read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
8AB4837000
|
stack
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
5116000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
3277000
|
stack
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
5711000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD68000
|
trusted library allocation
|
page read and write
|
||
20BD2E4F000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB7D000
|
trusted library allocation
|
page execute and read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
29161BE0000
|
heap
|
page read and write
|
||
19F99DED000
|
trusted library allocation
|
page read and write
|
||
60838F1000
|
stack
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
2B00000
|
trusted library allocation
|
page read and write
|
||
17AE76A5000
|
heap
|
page read and write
|
||
759C000
|
trusted library allocation
|
page read and write
|
||
17AE7940000
|
heap
|
page read and write
|
||
76BE000
|
stack
|
page read and write
|
||
2AD0000
|
trusted library allocation
|
page read and write
|
||
19F99D3C000
|
trusted library allocation
|
page read and write
|
||
19F99790000
|
trusted library allocation
|
page read and write
|
||
171DA3D5000
|
heap
|
page read and write
|
||
3834000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
5655DFE000
|
stack
|
page read and write
|
||
7FF7BFB7D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7BFD70000
|
trusted library allocation
|
page read and write
|
||
252E000
|
stack
|
page read and write
|
||
19FB224B000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
2BB4000
|
trusted library allocation
|
page read and write
|
||
171C13C1000
|
heap
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
17AE9DD0000
|
heap
|
page read and write
|
||
19F995DA000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
433C000
|
stack
|
page read and write
|
||
4828000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
462F8FE000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
19F99E1E000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
4755000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
29A0000
|
heap
|
page read and write
|
||
7599000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
8AB333D000
|
stack
|
page read and write
|
||
2A12000
|
heap
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
4630AFE000
|
stack
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
75DE000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFDD0000
|
trusted library allocation
|
page execute and read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
17AE9340000
|
unkown
|
page readonly
|
||
28C6000
|
heap
|
page read and write
|
||
7FF7BFB90000
|
trusted library allocation
|
page read and write
|
||
6C40000
|
heap
|
page execute and read and write
|
||
20BEB648000
|
heap
|
page read and write
|
||
77DE000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
256F000
|
stack
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
6AB0000
|
trusted library allocation
|
page execute and read and write
|
||
19FB2183000
|
heap
|
page read and write
|
||
171DA38F000
|
heap
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFDB4000
|
trusted library allocation
|
page read and write
|
||
19FB2143000
|
heap
|
page read and write
|
||
76C0000
|
remote allocation
|
page read and write
|
||
7FF7BFE80000
|
trusted library allocation
|
page read and write
|
||
3880000
|
trusted library allocation
|
page read and write
|
||
67A0000
|
trusted library allocation
|
page read and write
|
||
19F995E2000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
2BA0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD59000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
19F9990D000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
F3866FE000
|
stack
|
page read and write
|
||
25D7000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
46E4000
|
trusted library allocation
|
page read and write
|
||
4770000
|
heap
|
page execute and read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
7620000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
44D0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
19FB1510000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7B9C000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD20000
|
trusted library allocation
|
page read and write
|
||
7570000
|
trusted library allocation
|
page read and write
|
||
60840FE000
|
stack
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
75C0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFDA9000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
8AB2F3D000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
171C138A000
|
heap
|
page read and write
|
||
291D000
|
stack
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page execute and read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
44E0000
|
trusted library allocation
|
page read and write
|
||
2917AA40000
|
heap
|
page read and write
|
||
698E000
|
stack
|
page read and write
|
||
503E000
|
stack
|
page read and write
|
||
7FF7BFF20000
|
trusted library allocation
|
page read and write
|
||
7FF7BFE20000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
2B90000
|
trusted library allocation
|
page read and write
|
||
76C0000
|
remote allocation
|
page read and write
|
||
7FF7BFC90000
|
trusted library allocation
|
page execute and read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
19FB1EB0000
|
heap
|
page execute and read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
F3867FE000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
475C000
|
trusted library allocation
|
page read and write
|
||
2736000
|
heap
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
19F99DF4000
|
trusted library allocation
|
page read and write
|
||
171C1AE0000
|
heap
|
page execute and read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
19F99797000
|
trusted library allocation
|
page read and write
|
||
17AE9BAF000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7620000
|
trusted library allocation
|
page read and write
|
||
17AE9BEB000
|
heap
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
685E000
|
stack
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
3855000
|
trusted library allocation
|
page execute and read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
42EF000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
17AE9420000
|
heap
|
page execute and read and write
|
||
74E3000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
3890000
|
heap
|
page readonly
|
||
7FF7BFC56000
|
trusted library allocation
|
page execute and read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
70B0000
|
heap
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD2C000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
17AE9BC4000
|
heap
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
7FF7BFF60000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD30000
|
trusted library allocation
|
page read and write
|
||
70AB000
|
heap
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
19F98F30000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
462F7FE000
|
stack
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD36000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFC90000
|
trusted library allocation
|
page execute and read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
460E000
|
stack
|
page read and write
|
||
2727000
|
heap
|
page read and write
|
||
7F130000
|
trusted library allocation
|
page execute and read and write
|
||
8AB2E3E000
|
stack
|
page read and write
|
||
43A3000
|
trusted library allocation
|
page read and write
|
||
17AE7570000
|
unkown
|
page readonly
|
||
7FF7BFD90000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
17B9ACB5000
|
heap
|
page read and write
|
||
19F99996000
|
trusted library allocation
|
page read and write
|
||
2A85000
|
heap
|
page read and write
|
||
19F99D1A000
|
trusted library allocation
|
page read and write
|
||
694E000
|
stack
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
20BEB684000
|
heap
|
page read and write
|
||
4759000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
21AE000
|
unkown
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
767E000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB74000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
19F997C8000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
19F98F60000
|
heap
|
page read and write
|
||
17AE7727000
|
heap
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
273A000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
29161BD0000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
4530000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
17AE7630000
|
heap
|
page read and write
|
||
17AE9DF4000
|
heap
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
2A78000
|
heap
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB8D000
|
trusted library allocation
|
page execute and read and write
|
||
8AB413D000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
47A4000
|
trusted library allocation
|
page read and write
|
||
56564FE000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
20BD2578000
|
heap
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
462FFFB000
|
stack
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
19F995EA000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
17AE9BD2000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFDA0000
|
trusted library allocation
|
page read and write
|
||
19FB2520000
|
heap
|
page read and write
|
||
19F98C10000
|
heap
|
page read and write
|
||
17AE7620000
|
heap
|
page read and write
|
||
171C1C45000
|
trusted library allocation
|
page read and write
|
||
48C6000
|
trusted library allocation
|
page read and write
|
||
50CF000
|
trusted library allocation
|
page read and write
|
||
50DD000
|
trusted library allocation
|
page read and write
|
||
7B79000
|
heap
|
page read and write
|
||
6799000
|
trusted library allocation
|
page execute and read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
2B95000
|
heap
|
page read and write
|
||
7FF7BFDE0000
|
trusted library allocation
|
page read and write
|
||
4670000
|
heap
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
20BD263A000
|
heap
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
2B7000
|
stack
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
19F995B2000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFE60000
|
trusted library allocation
|
page read and write
|
||
4690000
|
trusted library allocation
|
page read and write
|
||
67C0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7070000
|
heap
|
page read and write
|
||
4730000
|
trusted library allocation
|
page read and write
|
||
4880000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB94000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page execute and read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
19F99821000
|
trusted library allocation
|
page read and write
|
||
7FF7BFB73000
|
trusted library allocation
|
page execute and read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD61000
|
trusted library allocation
|
page read and write
|
||
3860000
|
heap
|
page read and write
|
||
262F000
|
stack
|
page read and write
|
||
291619E6000
|
heap
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
48C2000
|
trusted library allocation
|
page read and write
|
||
4653000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD2D000
|
trusted library allocation
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
462FBFF000
|
stack
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
4650000
|
trusted library allocation
|
page read and write
|
||
7FF7BFD15000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
171C1340000
|
heap
|
page read and write
|
||
2916214F000
|
trusted library allocation
|
page read and write
|
||
8AB3075000
|
stack
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
707F000
|
heap
|
page read and write
|
||
46C9000
|
trusted library allocation
|
page execute and read and write
|
||
28A0000
|
heap
|
page read and write
|
||
17AE7945000
|
heap
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
47A4000
|
trusted library allocation
|
page read and write
|
||
19F996DC000
|
trusted library allocation
|
page read and write
|
||
17AE9220000
|
heap
|
page read and write
|
||
3614000
|
heap
|
page read and write
|
||
44F5000
|
heap
|
page read and write
|
||
2A4A000
|
heap
|
page read and write
|
||
7FF7BFC90000
|
trusted library allocation
|
page execute and read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
There are 2057 hidden memdumps, click here to show them.