Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Digital.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
initial sample
|
||
C:\Config.Msi\3ac318.rbs
|
data
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\BouncyCastle.Crypto.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\System.ValueTuple.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI1EC.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
modified
|
||
C:\Windows\Installer\MSI1EC.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIC52A.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSIC52A.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIC932.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSIC932.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIE1CC.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSIE1CC.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIE5D4.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\System32\InstallUtil.InstallLog
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\~DF104FF017AE6A1734.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF355F8EAD7962411B.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF46B34C8187FE8435.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF9363D06770D8B98C.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFC8300526DF6F0731.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFD18BD80E6999656A.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallState
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation.zip
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.ini
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AteraAgent.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\Installer\3ac317.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\3ac319.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\MSI1EC.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSI1EC.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI1EC.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI1EC.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIC52A.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSIC52A.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIC52A.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIC52A.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIC932.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSIC932.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIC932.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIC932.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIE1CC.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSIE1CC.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIE1CC.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIE1CC.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIE5E5.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIE77C.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIE8F4.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SourceHash{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
modified
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1A374813EDB1A6631387E414D3E73232
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
Certificate, Version=3
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
|
Certificate, Version=3
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1A374813EDB1A6631387E414D3E73232
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
data
|
modified
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageAgentInformation.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\Temp\~DF2F5CF61F78B7C72C.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF8B31338E51F5C954.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFA7A5AB13A50B57AB.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFA7BDA1A0996A04C0.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFEB1960233CE81796.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFF9D2FD9DAB3A6013.TMP
|
data
|
dropped
|
||
\Device\ConDrv
|
JSON data
|
dropped
|
There are 72 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k NetworkService -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k UnistackSvcGroup
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSIC52A.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_3851687 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSIC932.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_3852625 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSIE1CC.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_3858921 11 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="Salim.Jami@korektel.com" /CompanyId="1"
/IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000KANvwIAH" /AgentId="1db40f91-941c-4bcb-961d-1fe2982e82b6"
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI1EC.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_3867125 33 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
1db40f91-941c-4bcb-961d-1fe2982e82b6 "ef2508c1-c717-4567-98db-ad739433a027" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000KANvwIAH
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
1db40f91-941c-4bcb-961d-1fe2982e82b6 "4b724461-d5de-45b3-918d-01f1dd7fb803" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000KANvwIAH
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
1db40f91-941c-4bcb-961d-1fe2982e82b6 "bba6296f-630c-4728-badb-dcac66c37446" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000KANvwIAH
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\SgrmBroker.exe
|
C:\Windows\system32\SgrmBroker.exe
|
||
C:\Windows\System32\sppsvc.exe
|
C:\Windows\system32\sppsvc.exe
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Digital.msi"
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding BDCEB15B695F7B18E5D384CA0657056F
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding 698B2CE5FB46AC99A05489DBEDC6273F E Global\MSI0000
|
||
C:\Windows\SysWOW64\net.exe
|
"NET" STOP AteraAgent
|
||
C:\Windows\SysWOW64\net1.exe
|
C:\Windows\system32\net1 STOP AteraAgent
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"TaskKill.exe" /f /im AteraAgent.exe
|
||
C:\Windows\System32\sc.exe
|
"C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
|
There are 21 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://schemas.datacontract.org
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Routes/
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageMarketplace/1.6/AgentPackageMarketplace.zip
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Walking
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=04073794-9b1a-456b-85fe-6eca65797754
|
unknown
|
||
http://crl3.x
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/track-event
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=9912033a-6573-4ca2-b350-37c2bc6e22e9
|
unknown
|
||
http://dl.google.com/googletalk/googletalk-setup.exe
|
unknown
|
||
https://agent-api.PR
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/1db40f91-941c-4bcb-961d-1fe2982e82b6/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=948125fe-e3cf-42ab-ba34-976a3adf5c80&tr=31&tt=17324434434497982&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
|
13.232.67.198
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=b56d0227-452e-4f76-a77a-378f095d9d38
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=c825a3a8-4a36-49ab-b7b0-21c3250f6f58&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/1db40f91-941c-4bcb-961d-1fe2982e82b6/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=307e4b22-ae8f-4dc7-a619-34b637c0b56b&tt=0&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
|
13.232.67.198
|
||
https://ps.atera.com/agentpackageswin/AgentPackageAgentI
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=b56d0227-452e-4f76-a77a-378f095d9d38&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/1db40f91-941c-4bcb-961d-1fe2982e82b6/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=8bd2666e-deba-4537-9847-826117c775e9&tr=31&tt=17324434870174992&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
|
13.232.67.198
|
||
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=2babaf61-1d7c-4750-9d20-d0f3040d8dce
|
unknown
|
||
http://schemas.datacontract.org/2004/07/System.ServiceProcess
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetCommandsFallback)
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/1db40f91-941c-4bcb-961d-1fe2982e82b6/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=2f5b9f56-7551-421b-9316-301f6079e99e&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/1db40f91-941c-4bcb-961d-1fe2982e82b6/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=0b567b7d-02ab-4d8f-b457-87226ecdada3&tt=0&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
|
13.232.67.198
|
||
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
|
unknown
|
||
http://wixtoolset.org
|
unknown
|
||
https://agent-api.atera.com/Production
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=1549cfbe-4797-4e9b-87ba-b39ddfdb0c6e
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=2babaf61-1d7c-4750-9d20-d0f3040d8dce&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/1db40f91-941c-4bcb-961d-1fe2982e82b6/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=d2f98d58-ae77-41cb-bf75-a12c39413b70&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
|
13.232.67.198
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=cead9e07-0918-4110-bf73-0cde7886e764&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
|
13.232.67.198
|
||
https://agent-api.atera.com/Production/Agent/GetCommandsFallback0
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageRuntimeInstaller/13.0/AgentPackageRuntimeInstaller
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=f0169ba0-1470-42de-a8c0-d3acdded414b&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
|
13.232.67.198
|
||
http://acontrol.atera.com/
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/Agent
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/AgentStarting)
|
unknown
|
||
https://ps.pndsn.com
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/1db40f91-941c-4bcb-961d-1fe2982e82b6/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=d7610938-0dca-439e-ac79-774f3c321e97&tr=31&tt=17324433839841529&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
|
13.232.67.198
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageADRemote/6.0/AgentPackageADRemote.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=9debe3d6-bd60-48d8-8f32-cac259735cf3
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=1549cfbe-4797-4e9b-87ba-b39ddfdb0c6e&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
|
13.232.67.198
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://agent-api.aterDj
|
unknown
|
||
http://www.bingmapsportal.com
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageNetworkDiscovery/23.9/AgentPackageNetworkDiscove
|
unknown
|
||
http://agent-api.atera.com
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageSystemTools/27.8/AgentPackageSystemTools.zip
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetRecurrin
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
|
unknown
|
||
http://schemas.datacontract.org/2004/07/
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/1db40f91-941c-4bcb-961d-1fe2982e82b6/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=0f2fcab0-36f7-497d-80c2-ed154ce143d7&tr=31&tt=17324434434497982&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
|
13.232.67.198
|
||
https://github.com/icsharpcode/SharpZipLib
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageNetworkDiscovery/15.0/AgentPackageNetworkDiscovery
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/
|
unknown
|
||
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageAgentI
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
|
unknown
|
||
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/1db40f91-941c-4bcb-961d-1fe2982e82b6/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=81ad481d-fe32-40f1-a575-ff3213b02a54&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
|
13.232.67.198
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/Acknowl
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
|
unknown
|
||
https://ecn.dev.virtualearth.net/REST/V1/MapControlConfiguration/native/
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageTaskScheduler/17.2/AgentPackageTaskScheduler.zip
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Locations
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageTicketing/30.1/AgentPackageTicketing.zip
|
unknown
|
||
https://agent-api.atera.com
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/1db40f91-941c-4bcb-961d-1fe2982e82b6/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=21b3579c-1a7e-42af-89a3-d62561119c3f&tr=31&tt=17324433862201175&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
|
13.232.67.198
|
||
https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
|
unknown
|
||
https://ps.pndsn.com/v22
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/AgentStarting
|
unknown
|
||
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageA3RuZ
|
unknown
|
||
http://www.w3.oh
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetCommands
|
unknown
|
||
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageA3
|
unknown
|
||
https://dynamic.t
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/1db40f91-941c-4bcb-961d-1fe2982e82b6/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=262560da-847d-4155-9198-8e4ffcd1509c&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
|
13.232.67.198
|
||
https://agent-api.atera.com/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Transit
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/1db40f91-941c-4bcb-961d-1fe2982e82b6/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=a9364c7f-76bc-44d5-9e4a-9e20b519e5f6&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/1db40f91-941c-4bcb-961d-1fe2982e82b6/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=de127575-77e7-4719-a128-017012d14d11&tt=0&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
|
13.232.67.198
|
||
https://agent-api.atera.com/Production/Agent/GetRecurringPackages
|
unknown
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.Availability/13.0/Agent.Package.Availability.zip
|
unknown
|
||
https://www.newtonsoft.com/jsonschema
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=6c5142d1-8eb7-4c24-9754-9b429320ed0d
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=86b5c6de-7733-4db5-b81f-7d902ad87fa7&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/1db40f91-941c-4bcb-961d-1fe2982e82b6/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=c1164d1e-bc30-4eb8-888a-782a294ae896&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
|
13.232.67.198
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/1db40f91-941c-4bcb-961d-1fe2982e82b6/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=95a8cc07-d7ac-4863-aa59-e133b0947fc6&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
|
13.232.67.198
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=cead9e07-0918-4110-bf73-0cde7886e764
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=86b5c6de-7733-4db5-b81f-7d902ad87fa7
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=6c5142d1-8eb7-4c24-9754-9b429320ed0d&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
|
13.232.67.198
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageRuntimeInstaller/1.5/AgentPackageRuntimeInstaller.
|
unknown
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.Watchdog/13.0/Agent.Package.Watchdog.zip
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.Availability/0.16/Agent.Package.Availability.z
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ch
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/1db40f91-941c-4bcb-961d-1fe2982e82b6/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=c29a5fd2-a31e-449c-a116-6640bd437f2a&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
|
13.232.67.198
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ps.pndsn.com
|
13.232.67.198
|
||
bg.microsoft.map.fastly.net
|
199.232.214.172
|
||
d25btwd9wax8gu.cloudfront.net
|
108.158.75.4
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
||
windowsupdatebg.s.llnwi.net
|
178.79.238.0
|
||
ps.atera.com
|
unknown
|
||
agent-api.atera.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
108.158.75.4
|
d25btwd9wax8gu.cloudfront.net
|
United States
|
||
13.232.67.198
|
ps.pndsn.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av\{D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
|
STATE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\WMI\Security
|
c688cf83-9945-5ff6-0e1e-1ff1f8a2ec9a
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform
|
ServiceSessionId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\3ac318.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\3ac318.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB9EFD7FDAF9AD115987000E181661F5
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CD868C8CE5A308147ABB306D829266BC
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C32B8CE0327C1E141950B4C9C2AD4DA7
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D9B1B1F0B1FC024D9390FE4B94D97D5
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\007F59F54ACD08842B2D98A10E6D1E3A
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB25C26F7C51D3C4AA2BED5600F46956
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01010F83113E72A4C81AD77422D2F947
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01D9DC4B27DFC0340B543A11D3CEBE07
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\ATERA Networks\AteraAgent\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\ATERA Networks\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\7D0A237E2F2A7564CA141B792446E854
|
INSTALLFOLDER_files_Feature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Features
|
INSTALLFOLDER_files_Feature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
|
LastUsedSource
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
|
AutoBackupLogFiles
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AteraAgent
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
AccountId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
IntegratorLogin
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
CompanyId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
AgentId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
ServerName
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AlphaAgent
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
FileDirectory
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
FileDirectory
|
There are 139 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1E819F5E000
|
trusted library allocation
|
page read and write
|
||
206FF2D0000
|
heap
|
page read and write
|
||
21780073000
|
trusted library allocation
|
page read and write
|
||
217EFE95000
|
heap
|
page read and write
|
||
206FF290000
|
heap
|
page read and write
|
||
1E819804000
|
trusted library allocation
|
page read and write
|
||
1E81976F000
|
trusted library allocation
|
page read and write
|
||
1E819F76000
|
trusted library allocation
|
page read and write
|
||
2078017C000
|
trusted library allocation
|
page read and write
|
||
207E71B2000
|
heap
|
page read and write
|
||
29FBE59D000
|
heap
|
page read and write
|
||
1E819027000
|
heap
|
page read and write
|
||
1E831ED0000
|
heap
|
page read and write
|
||
217EFE18000
|
heap
|
page read and write
|
||
29FBE63B000
|
heap
|
page read and write
|
||
1E819FBB000
|
trusted library allocation
|
page read and write
|
||
206FF31C000
|
heap
|
page read and write
|
||
217800BF000
|
trusted library allocation
|
page read and write
|
||
207E7092000
|
unkown
|
page readonly
|
||
1E832370000
|
heap
|
page read and write
|
||
1E819701000
|
trusted library allocation
|
page read and write
|
||
207E7170000
|
heap
|
page read and write
|
||
1E8198DA000
|
trusted library allocation
|
page read and write
|
||
29FBE5A7000
|
heap
|
page read and write
|
||
217EFE59000
|
heap
|
page read and write
|
||
217F0000000
|
heap
|
page read and write
|
||
217EFE10000
|
heap
|
page read and write
|
||
1AB33B5000
|
stack
|
page read and write
|
||
7FFE7D194000
|
trusted library allocation
|
page read and write
|
||
20680681000
|
trusted library allocation
|
page read and write
|
||
1E818F20000
|
heap
|
page read and write
|
||
207E74D0000
|
heap
|
page read and write
|
||
1E818ED0000
|
heap
|
page read and write
|
||
1E819F7C000
|
trusted library allocation
|
page read and write
|
||
1E8199BE000
|
trusted library allocation
|
page read and write
|
||
206FF2E1000
|
heap
|
page read and write
|
||
29FBEEAF000
|
trusted library allocation
|
page read and write
|
||
207800B4000
|
trusted library allocation
|
page read and write
|
||
20780132000
|
trusted library allocation
|
page read and write
|
||
1E818FA0000
|
heap
|
page read and write
|
||
207E7192000
|
heap
|
page read and write
|
||
29FBE5E4000
|
heap
|
page read and write
|
||
20698E50000
|
heap
|
page read and write
|
||
1E832810000
|
heap
|
page read and write
|
||
1E8323A9000
|
heap
|
page read and write
|
||
5031000
|
trusted library allocation
|
page read and write
|
||
20780089000
|
trusted library allocation
|
page read and write
|
||
206FF510000
|
heap
|
page read and write
|
||
4A61000
|
trusted library allocation
|
page read and write
|
||
48B4000
|
heap
|
page read and write
|
||
1E818FDC000
|
heap
|
page read and write
|
||
4B07000
|
trusted library allocation
|
page read and write
|
||
1E819DFC000
|
trusted library allocation
|
page read and write
|
||
207E9560000
|
heap
|
page read and write
|
||
29FBEE73000
|
trusted library allocation
|
page read and write
|
||
207E98D0000
|
heap
|
page read and write
|
||
29FBE7B0000
|
heap
|
page read and write
|
||
1E819F53000
|
trusted library allocation
|
page read and write
|
||
217EFE2B000
|
heap
|
page read and write
|
||
4895000
|
heap
|
page read and write
|
||
29FBE569000
|
heap
|
page read and write
|
||
1E8323E3000
|
heap
|
page read and write
|
||
1E819962000
|
trusted library allocation
|
page read and write
|
||
206FF412000
|
unkown
|
page readonly
|
||
50D4000
|
trusted library allocation
|
page read and write
|
||
1E819FB3000
|
trusted library allocation
|
page read and write
|
||
4E3E000
|
heap
|
page read and write
|
||
217EFE4D000
|
heap
|
page read and write
|
||
1E819E39000
|
trusted library allocation
|
page read and write
|
||
1E81905D000
|
heap
|
page read and write
|
||
29FBEE37000
|
trusted library allocation
|
page read and write
|
||
1E831FC2000
|
heap
|
page read and write
|
||
207800B2000
|
trusted library allocation
|
page read and write
|
||
207E715C000
|
heap
|
page read and write
|
||
20680703000
|
trusted library allocation
|
page read and write
|
||
1E819F3A000
|
trusted library allocation
|
page read and write
|
||
21780001000
|
trusted library allocation
|
page read and write
|
||
29FBEDF1000
|
trusted library allocation
|
page read and write
|
||
206806F3000
|
trusted library allocation
|
page read and write
|
||
207E992C000
|
heap
|
page read and write
|
||
20780001000
|
trusted library allocation
|
page read and write
|
||
21780047000
|
trusted library allocation
|
page read and write
|
||
29FBE560000
|
heap
|
page read and write
|
||
4814000
|
heap
|
page read and write
|
||
206FF102000
|
unkown
|
page readonly
|
||
29FBEE63000
|
trusted library allocation
|
page read and write
|
||
207E71E0000
|
heap
|
page read and write
|
||
1E818FFC000
|
heap
|
page read and write
|
||
2078008C000
|
trusted library allocation
|
page read and write
|
||
1E819F50000
|
trusted library allocation
|
page read and write
|
||
21780083000
|
trusted library allocation
|
page read and write
|
||
207E7150000
|
heap
|
page read and write
|
||
207800BA000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
29FBEF33000
|
trusted library allocation
|
page read and write
|
||
490F000
|
stack
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
4AF3000
|
trusted library allocation
|
page read and write
|
||
7460000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
B6B1FE000
|
stack
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
BECCBFE000
|
stack
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
1E3B9450000
|
heap
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
206807D1000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
1AB52F4000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1AB3DFE000
|
stack
|
page read and write
|
||
206FF2F1000
|
heap
|
page read and write
|
||
217F0010000
|
trusted library allocation
|
page read and write
|
||
4B04000
|
trusted library allocation
|
page read and write
|
||
1AB5EFE000
|
stack
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
1E3B9458000
|
heap
|
page read and write
|
||
1E819C07000
|
trusted library allocation
|
page read and write
|
||
4E20000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
5112000
|
trusted library allocation
|
page read and write
|
||
DC622FE000
|
unkown
|
page readonly
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
C4A000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
DC625FE000
|
stack
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
B6B3FD000
|
stack
|
page read and write
|
||
1E3B946E000
|
heap
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7FFE7D100000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7D004000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
heap
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
1E819F72000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7FFE7D1C0000
|
trusted library allocation
|
page execute and read and write
|
||
8D7000
|
stack
|
page read and write
|
||
7FFE7CFE3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7CFE0000
|
trusted library allocation
|
page read and write
|
||
1AB39FD000
|
stack
|
page read and write
|
||
1E819B9B000
|
trusted library allocation
|
page read and write
|
||
4B9E000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1E819D34000
|
trusted library allocation
|
page read and write
|
||
145B1C7F000
|
heap
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
29FBE586000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
28969E00000
|
heap
|
page read and write
|
||
7FFE7D000000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
1E83220E000
|
unkown
|
page readonly
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
6EA1000
|
trusted library allocation
|
page read and write
|
||
1E819EA1000
|
trusted library allocation
|
page read and write
|
||
BECC0FF000
|
stack
|
page read and write
|
||
79CE000
|
heap
|
page read and write
|
||
1E83243D000
|
heap
|
page read and write
|
||
46FD000
|
trusted library allocation
|
page execute and read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
207E9657000
|
heap
|
page read and write
|
||
BECC6FE000
|
stack
|
page read and write
|
||
1E831700000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
1E3B945B000
|
heap
|
page read and write
|
||
7FFE7D196000
|
trusted library allocation
|
page read and write
|
||
1E8323DC000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
49C3000
|
trusted library allocation
|
page read and write
|
||
1E8197A7000
|
trusted library allocation
|
page read and write
|
||
1AB54FD000
|
stack
|
page read and write
|
||
303D000
|
stack
|
page read and write
|
||
217EFFE0000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
4E6F000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
4A36000
|
trusted library allocation
|
page execute and read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
C82000
|
heap
|
page read and write
|
||
EE9A57E000
|
unkown
|
page readonly
|
||
1D5E5F60000
|
heap
|
page read and write
|
||
1E819FA5000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
E5D000
|
stack
|
page read and write
|
||
7DF6AFD000
|
stack
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
heap
|
page read and write
|
||
1E3B948B000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
28969C30000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
4A3C000
|
trusted library allocation
|
page execute and read and write
|
||
7423000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
342B000
|
trusted library allocation
|
page execute and read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7FFE7D0B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7D3B0000
|
trusted library allocation
|
page read and write
|
||
145B36A0000
|
remote allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
4B46000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
4AA8000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
79DE000
|
heap
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
145B1C2B000
|
heap
|
page read and write
|
||
30F9000
|
heap
|
page read and write
|
||
7160000
|
heap
|
page execute and read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
1D5E5D80000
|
heap
|
page read and write
|
||
1E829713000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
CEA000
|
heap
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1E3B9330000
|
heap
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E10000
|
trusted library allocation
|
page read and write
|
||
1E819F74000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
6E9C000
|
trusted library allocation
|
page read and write
|
||
1E818F90000
|
trusted library allocation
|
page read and write
|
||
DC61EFE000
|
unkown
|
page readonly
|
||
1E3B943A000
|
heap
|
page read and write
|
||
EE99A7E000
|
stack
|
page readonly
|
||
7FFE7D076000
|
trusted library allocation
|
page read and write
|
||
207E98E0000
|
heap
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
207E7196000
|
heap
|
page read and write
|
||
1E3B946B000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFE7D193000
|
trusted library allocation
|
page read and write
|
||
34B6000
|
heap
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
49B0000
|
heap
|
page execute and read and write
|
||
1AB4EED000
|
stack
|
page read and write
|
||
1AB51FF000
|
stack
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
4FF0000
|
heap
|
page execute and read and write
|
||
49E0000
|
heap
|
page execute and read and write
|
||
3120000
|
heap
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7FFE7D1D0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
1E8197BD000
|
trusted library allocation
|
page read and write
|
||
29FBEE2D000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7EEC8000
|
trusted library allocation
|
page execute and read and write
|
||
1E3B9452000
|
heap
|
page read and write
|
||
207E70B4000
|
unkown
|
page readonly
|
||
7FFE7D160000
|
trusted library allocation
|
page read and write
|
||
1AB3728000
|
stack
|
page read and write
|
||
6EF0000
|
heap
|
page execute and read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
3505000
|
heap
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
217EFE6D000
|
heap
|
page read and write
|
||
7FFE7CFC4000
|
trusted library allocation
|
page read and write
|
||
EDE000
|
stack
|
page read and write
|
||
7FFE7D190000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
2079000F000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
1E3B9C02000
|
trusted library allocation
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
49F1000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
7FFE7D2BC000
|
trusted library allocation
|
page read and write
|
||
2178003D000
|
trusted library allocation
|
page read and write
|
||
6DDE000
|
stack
|
page read and write
|
||
BECC9FE000
|
stack
|
page read and write
|
||
5078000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
CEE000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
72CE000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
7FFE7D096000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1E832411000
|
heap
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
79DA000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
7FFE7CFF4000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7F568000
|
trusted library allocation
|
page execute and read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
1D5E5E68000
|
heap
|
page read and write
|
||
7FFE7D0B6000
|
trusted library allocation
|
page execute and read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
7FFE7D1D0000
|
trusted library allocation
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
207E73C0000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
1E819E42000
|
trusted library allocation
|
page read and write
|
||
3527000
|
heap
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
206805C0000
|
heap
|
page execute and read and write
|
||
1E819B97000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
1E3B9486000
|
heap
|
page read and write
|
||
1E3B948E000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
24206A8C000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
30E9000
|
heap
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
207E719A000
|
heap
|
page read and write
|
||
7DF70FE000
|
stack
|
page read and write
|
||
46F5000
|
trusted library allocation
|
page execute and read and write
|
||
24206920000
|
heap
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
91650FB000
|
stack
|
page read and write
|
||
1E8197CF000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7FFE7D1A0000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
5104000
|
trusted library allocation
|
page read and write
|
||
700E000
|
stack
|
page read and write
|
||
7DF6FFE000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7FFE7D0A0000
|
trusted library allocation
|
page execute and read and write
|
||
1E3B9470000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
464E000
|
stack
|
page read and write
|
||
702E000
|
stack
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
91647FE000
|
stack
|
page read and write
|
||
217F05F0000
|
heap
|
page execute and read and write
|
||
7DF69FE000
|
stack
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
3422000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7390000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
1E3B943A000
|
heap
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
207E7380000
|
heap
|
page read and write
|
||
46A0000
|
trusted library allocation
|
page read and write
|
||
74FE000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7421000
|
trusted library allocation
|
page read and write
|
||
1E832537000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
1E831A84000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
ABB3EFD000
|
stack
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
207E7320000
|
heap
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
1E8197DB000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
498E000
|
stack
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
1AB47FE000
|
stack
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7424000
|
trusted library allocation
|
page read and write
|
||
1AB48E9000
|
stack
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
CDC000
|
heap
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
7FFE7D00D000
|
trusted library allocation
|
page execute and read and write
|
||
2DFC000
|
stack
|
page read and write
|
||
74BE000
|
stack
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
496E000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFE7CFFD000
|
trusted library allocation
|
page execute and read and write
|
||
30FB000
|
heap
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7FFE7D19D000
|
trusted library allocation
|
page read and write
|
||
1E83244D000
|
heap
|
page read and write
|
||
1D5E6125000
|
heap
|
page read and write
|
||
1E3B9360000
|
heap
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
3420000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
206FF455000
|
heap
|
page read and write
|
||
1E8198BE000
|
trusted library allocation
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
7FFE7D1A6000
|
trusted library allocation
|
page read and write
|
||
207E7340000
|
heap
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
1E8199AF000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
4990000
|
trusted library allocation
|
page execute and read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
4A33000
|
trusted library allocation
|
page read and write
|
||
CA9000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
1E3B9442000
|
heap
|
page read and write
|
||
EE99FFD000
|
stack
|
page read and write
|
||
7FFE7D1E0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
5091000
|
trusted library allocation
|
page read and write
|
||
1E832C10000
|
heap
|
page read and write
|
||
4B25000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
remote allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
91654FC000
|
stack
|
page read and write
|
||
206FF100000
|
unkown
|
page readonly
|
||
4760000
|
trusted library allocation
|
page read and write
|
||
217F0145000
|
heap
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7FFE7D080000
|
trusted library allocation
|
page execute and read and write
|
||
CB8000
|
heap
|
page read and write
|
||
7FFE7D00D000
|
trusted library allocation
|
page execute and read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
29FBE4D0000
|
heap
|
page read and write
|
||
33FD000
|
trusted library allocation
|
page execute and read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
20780178000
|
trusted library allocation
|
page read and write
|
||
EE9A07E000
|
unkown
|
page readonly
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
145B1C00000
|
heap
|
page read and write
|
||
1E3B9475000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
7500000
|
heap
|
page read and write
|
||
1E819E46000
|
trusted library allocation
|
page read and write
|
||
EE9A77D000
|
stack
|
page read and write
|
||
207E717C000
|
heap
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
207E98F0000
|
heap
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
4B40000
|
trusted library allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
7DF6EFE000
|
stack
|
page read and write
|
||
3485000
|
heap
|
page read and write
|
||
217F00F0000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
206FF5CC000
|
unkown
|
page readonly
|
||
20680490000
|
trusted library allocation
|
page read and write
|
||
7470000
|
trusted library allocation
|
page read and write
|
||
1AB53E9000
|
stack
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
EE9A87E000
|
unkown
|
page readonly
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
29FBEF45000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
7FFE7D003000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFE7D180000
|
trusted library allocation
|
page read and write
|
||
29FBE500000
|
heap
|
page read and write
|
||
ABB36FF000
|
stack
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
1E8195F0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
3528000
|
heap
|
page read and write
|
||
2EA7000
|
stack
|
page read and write
|
||
1E818F10000
|
heap
|
page read and write
|
||
1E81989A000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1E832860000
|
heap
|
page read and write
|
||
1E83252B000
|
heap
|
page read and write
|
||
29FBE8E5000
|
heap
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
500C000
|
trusted library allocation
|
page execute and read and write
|
||
34A8000
|
heap
|
page read and write
|
||
6E94000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
29FBEE2F000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
59F1000
|
trusted library allocation
|
page read and write
|
||
49C0000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
1E819E94000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
24206A4B000
|
heap
|
page read and write
|
||
6EB4000
|
trusted library allocation
|
page read and write
|
||
1E818F25000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
494C000
|
stack
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page execute and read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
28969E37000
|
heap
|
page read and write
|
||
217F0140000
|
heap
|
page read and write
|
||
6E60000
|
trusted library allocation
|
page read and write
|
||
4A30000
|
trusted library allocation
|
page read and write
|
||
7FFE7D220000
|
trusted library allocation
|
page read and write
|
||
1E819B9F000
|
trusted library allocation
|
page read and write
|
||
965000
|
heap
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
3541000
|
heap
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7FFE7D250000
|
trusted library allocation
|
page execute and read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
4FCE000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
BECC5FF000
|
stack
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
4A20000
|
heap
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
C9D000
|
heap
|
page read and write
|
||
34B3000
|
heap
|
page read and write
|
||
C7C000
|
heap
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
744E000
|
heap
|
page read and write
|
||
6E5C000
|
trusted library allocation
|
page read and write
|
||
7FFE7CFFD000
|
trusted library allocation
|
page execute and read and write
|
||
F40000
|
heap
|
page read and write
|
||
21780151000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
70CF000
|
stack
|
page read and write
|
||
46F7000
|
trusted library allocation
|
page execute and read and write
|
||
1E819F2A000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1E8328B4000
|
heap
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
CDA000
|
heap
|
page read and write
|
||
7FFE7D014000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
29FCEDFD000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
1E819E4A000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
217EFE36000
|
heap
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
1E8324D8000
|
heap
|
page read and write
|
||
C5A000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7FFE7D200000
|
trusted library allocation
|
page read and write
|
||
507F000
|
trusted library allocation
|
page read and write
|
||
24206B13000
|
heap
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
1E8198CA000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
30CB000
|
heap
|
page read and write
|
||
1E819D36000
|
trusted library allocation
|
page read and write
|
||
30F6000
|
heap
|
page read and write
|
||
7FFE7D230000
|
trusted library allocation
|
page execute and read and write
|
||
714E000
|
stack
|
page read and write
|
||
4AFE000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
1E8197A2000
|
trusted library allocation
|
page read and write
|
||
49B4000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
29FBE740000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
20698EC8000
|
heap
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
DC624FE000
|
unkown
|
page readonly
|
||
7FFE7D2D0000
|
trusted library allocation
|
page read and write
|
||
1E832451000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
7FAE8000
|
trusted library allocation
|
page execute and read and write
|
||
1AB3AFE000
|
stack
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7FFE7D190000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
76DE000
|
stack
|
page read and write
|
||
1E819E12000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
145B36A0000
|
remote allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
1E3B9457000
|
heap
|
page read and write
|
||
48D0000
|
heap
|
page readonly
|
||
6FEE000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
850117E000
|
unkown
|
page readonly
|
||
1E832552000
|
heap
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
145B1BA0000
|
heap
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
7FFE7CFC0000
|
trusted library allocation
|
page read and write
|
||
6E55000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
7FFE7D1D0000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
7FFE7CFF4000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
710E000
|
stack
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
1AB3EE9000
|
stack
|
page read and write
|
||
32C7000
|
heap
|
page read and write
|
||
1E819670000
|
heap
|
page execute and read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
7FFE7D260000
|
trusted library allocation
|
page execute and read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
1AB45FC000
|
stack
|
page read and write
|
||
1E819025000
|
heap
|
page read and write
|
||
4763000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7D170000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
1AB46EA000
|
stack
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7FFE7D220000
|
trusted library allocation
|
page execute and read and write
|
||
9164EFB000
|
stack
|
page read and write
|
||
207E7430000
|
heap
|
page read and write
|
||
7FFE7CFE2000
|
trusted library allocation
|
page read and write
|
||
24206A64000
|
heap
|
page read and write
|
||
1E3B942B000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
7FFE7D0AC000
|
trusted library allocation
|
page execute and read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
4C20000
|
heap
|
page read and write
|
||
7FFE7D0A0000
|
trusted library allocation
|
page execute and read and write
|
||
4A50000
|
heap
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
46BD000
|
trusted library allocation
|
page execute and read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
4AD9000
|
trusted library allocation
|
page execute and read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E80000
|
trusted library allocation
|
page read and write
|
||
347A000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
1E3B9448000
|
heap
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
ABB34FF000
|
stack
|
page read and write
|
||
7FFE7CFE3000
|
trusted library allocation
|
page execute and read and write
|
||
29FBE5BD000
|
heap
|
page read and write
|
||
7FFE7D190000
|
trusted library allocation
|
page read and write
|
||
145B3802000
|
trusted library allocation
|
page read and write
|
||
24207215000
|
heap
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
91657FE000
|
stack
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
1E832580000
|
trusted library allocation
|
page read and write
|
||
4A2E000
|
stack
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
BECC1FE000
|
stack
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
329E000
|
stack
|
page read and write
|
||
7FFE7D210000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
1E3B94A8000
|
heap
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
1E819E6A000
|
trusted library allocation
|
page read and write
|
||
9164AFF000
|
stack
|
page read and write
|
||
6DE0000
|
trusted library allocation
|
page execute and read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
29FBEDC0000
|
heap
|
page execute and read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
7FFE7D200000
|
trusted library allocation
|
page execute and read and write
|
||
1E819D38000
|
trusted library allocation
|
page read and write
|
||
1E831730000
|
trusted library allocation
|
page read and write
|
||
1E3B9441000
|
heap
|
page read and write
|
||
6E54000
|
trusted library allocation
|
page read and write
|
||
46B0000
|
heap
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
EE9A47D000
|
stack
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
2178012F000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
91656FD000
|
stack
|
page read and write
|
||
73E4000
|
trusted library allocation
|
page read and write
|
||
29FD7726000
|
heap
|
page read and write
|
||
512F000
|
stack
|
page read and write
|
||
30CD000
|
heap
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
29FBE5AB000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
1E8197CB000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
1E3B9400000
|
heap
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1E829701000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
207E9550000
|
heap
|
page execute and read and write
|
||
EE9A17E000
|
unkown
|
page readonly
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
1E8197EB000
|
trusted library allocation
|
page read and write
|
||
1E8198BA000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
206FF100000
|
unkown
|
page readonly
|
||
7FFE7CFF3000
|
trusted library allocation
|
page execute and read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFE7D370000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
29FD7728000
|
heap
|
page read and write
|
||
1E819F6C000
|
trusted library allocation
|
page read and write
|
||
1AB40FF000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1E818F50000
|
heap
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
7FFE7D1E0000
|
trusted library allocation
|
page read and write
|
||
207E9909000
|
heap
|
page read and write
|
||
30B8000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
29FBE632000
|
heap
|
page read and write
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
207E7090000
|
unkown
|
page readonly
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
7FFE7D1F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7D01D000
|
trusted library allocation
|
page execute and read and write
|
||
E1F000
|
stack
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
1E3B9467000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
ABB3CFF000
|
stack
|
page read and write
|
||
29FBEDE0000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
145B1D13000
|
heap
|
page read and write
|
||
28969C50000
|
heap
|
page read and write
|
||
207E717A000
|
heap
|
page read and write
|
||
217EFDC0000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
DC626FE000
|
unkown
|
page readonly
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
6E00000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
heap
|
page read and write
|
||
1E832660000
|
heap
|
page read and write
|
||
1E8197E7000
|
trusted library allocation
|
page read and write
|
||
206807AF000
|
trusted library allocation
|
page read and write
|
||
1E3B945D000
|
heap
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
21780155000
|
trusted library allocation
|
page read and write
|
||
1E819E44000
|
trusted library allocation
|
page read and write
|
||
1E819FAB000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7FFE7D183000
|
trusted library allocation
|
page read and write
|
||
7FFE7CFFB000
|
trusted library allocation
|
page execute and read and write
|
||
850147E000
|
unkown
|
page readonly
|
||
7DF68FE000
|
stack
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
516E000
|
stack
|
page read and write
|
||
4BDF000
|
stack
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
2178003F000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
217F0E20000
|
heap
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
1E8197E3000
|
trusted library allocation
|
page read and write
|
||
91651FE000
|
stack
|
page read and write
|
||
C99C7FE000
|
stack
|
page read and write
|
||
1E8324EF000
|
heap
|
page read and write
|
||
207E96F4000
|
unkown
|
page readonly
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
1E8198C6000
|
trusted library allocation
|
page read and write
|
||
C7A000
|
heap
|
page read and write
|
||
206FF12C000
|
unkown
|
page readonly
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
49CD000
|
trusted library allocation
|
page execute and read and write
|
||
145B1C81000
|
heap
|
page read and write
|
||
ABB3AFE000
|
stack
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
ABB37FD000
|
stack
|
page read and write
|
||
ABB39FF000
|
stack
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7FFE7CFE3000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7F240000
|
trusted library allocation
|
page execute and read and write
|
||
7420000
|
trusted library allocation
|
page execute and read and write
|
||
1E818FBB000
|
heap
|
page read and write
|
||
4F0C000
|
stack
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
91658FA000
|
stack
|
page read and write
|
||
6E00000
|
trusted library allocation
|
page read and write
|
||
1D5E5E60000
|
heap
|
page read and write
|
||
C55000
|
heap
|
page read and write
|
||
1E819E84000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
CBA000
|
heap
|
page read and write
|
||
1E818F15000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
1E818F30000
|
heap
|
page read and write
|
||
CF6000
|
heap
|
page read and write
|
||
6DD0000
|
trusted library allocation
|
page read and write
|
||
335E000
|
stack
|
page read and write
|
||
1E8195E0000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
850157E000
|
stack
|
page read and write
|
||
29FBED10000
|
heap
|
page execute and read and write
|
||
7FFE7CFE2000
|
trusted library allocation
|
page read and write
|
||
F8E000
|
stack
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
217EFE55000
|
heap
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7431000
|
trusted library allocation
|
page read and write
|
||
21780143000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
1E8324DD000
|
heap
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
207E9612000
|
heap
|
page read and write
|
||
7FFE7D240000
|
trusted library allocation
|
page execute and read and write
|
||
1E829780000
|
trusted library allocation
|
page read and write
|
||
742C000
|
trusted library allocation
|
page read and write
|
||
30F7000
|
heap
|
page read and write
|
||
7FFE7D17A000
|
trusted library allocation
|
page read and write
|
||
7FFE7D1A0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
79EB000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
468E000
|
stack
|
page read and write
|
||
49C0000
|
trusted library allocation
|
page read and write
|
||
7FFE7CFC3000
|
trusted library allocation
|
page execute and read and write
|
||
7424000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
1E81975C000
|
trusted library allocation
|
page read and write
|
||
6E94000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
1E3B946D000
|
heap
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
24206C00000
|
heap
|
page read and write
|
||
C95000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
1E819F6A000
|
trusted library allocation
|
page read and write
|
||
49D0000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
1E819859000
|
trusted library allocation
|
page read and write
|
||
46FB000
|
trusted library allocation
|
page execute and read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
1E8324F5000
|
heap
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
1E3B9413000
|
heap
|
page read and write
|
||
EE999FD000
|
stack
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
CA2000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
5009000
|
trusted library allocation
|
page execute and read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
73EC000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
6E55000
|
trusted library allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
8500AFB000
|
stack
|
page read and write
|
||
28969F02000
|
heap
|
page read and write
|
||
7FFE7D210000
|
trusted library allocation
|
page read and write
|
||
1AB38FE000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFE7CFED000
|
trusted library allocation
|
page execute and read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1E832162000
|
unkown
|
page readonly
|
||
4A39000
|
trusted library allocation
|
page execute and read and write
|
||
73E5000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1E3B944D000
|
heap
|
page read and write
|
||
1E818FE6000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
145B1BE0000
|
trusted library allocation
|
page read and write
|
||
7FFE7CFE4000
|
trusted library allocation
|
page read and write
|
||
1AB5BFD000
|
stack
|
page read and write
|
||
1E8199BA000
|
trusted library allocation
|
page read and write
|
||
769D000
|
stack
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
1E81976B000
|
trusted library allocation
|
page read and write
|
||
741E000
|
heap
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
4ABD000
|
trusted library allocation
|
page read and write
|
||
206807D5000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
217F0D70000
|
heap
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
EE9948B000
|
stack
|
page read and write
|
||
1E3B946C000
|
heap
|
page read and write
|
||
7FFE7CFF0000
|
trusted library allocation
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1E819E9D000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
48C6000
|
heap
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
20690681000
|
trusted library allocation
|
page read and write
|
||
4880000
|
heap
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
7FFE7D18E000
|
trusted library allocation
|
page read and write
|
||
ABB3FFE000
|
stack
|
page read and write
|
||
303C000
|
stack
|
page read and write
|
||
DC623FE000
|
stack
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
3470000
|
heap
|
page read and write
|
||
5010000
|
trusted library allocation
|
page read and write
|
||
1E3B945A000
|
heap
|
page read and write
|
||
29FBEF1C000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
217EFDA0000
|
heap
|
page read and write
|
||
4797000
|
trusted library allocation
|
page execute and read and write
|
||
207E964C000
|
heap
|
page read and write
|
||
1E819A0D000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
4900000
|
heap
|
page execute and read and write
|
||
6E91000
|
trusted library allocation
|
page read and write
|
||
1E3B9477000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
207E7090000
|
unkown
|
page readonly
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
4840000
|
trusted library allocation
|
page read and write
|
||
6E93000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
46E0000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1E819D3A000
|
trusted library allocation
|
page read and write
|
||
5003000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
1E83242F000
|
heap
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
7450000
|
trusted library allocation
|
page execute and read and write
|
||
1AB3CFE000
|
stack
|
page read and write
|
||
4AC0000
|
trusted library allocation
|
page read and write
|
||
1AB4DFB000
|
stack
|
page read and write
|
||
207E994B000
|
heap
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7FFE7D000000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
29FBE4E0000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFE7D1A0000
|
trusted library allocation
|
page read and write
|
||
21790001000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
206FF428000
|
unkown
|
page readonly
|
||
6DF0000
|
trusted library allocation
|
page read and write
|
||
3460000
|
trusted library allocation
|
page execute and read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
1AB55FC000
|
stack
|
page read and write
|
||
91652FC000
|
stack
|
page read and write
|
||
51AF000
|
stack
|
page read and write
|
||
3400000
|
trusted library allocation
|
page read and write
|
||
7FFE7D3C0000
|
trusted library allocation
|
page read and write
|
||
CFA000
|
heap
|
page read and write
|
||
29FCEDF1000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
3404000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
4C31000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
8501C7E000
|
unkown
|
page readonly
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
29FD76C8000
|
heap
|
page read and write
|
||
7FFE7D03C000
|
trusted library allocation
|
page execute and read and write
|
||
46F2000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7FFE7D1E0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
24206A41000
|
heap
|
page read and write
|
||
7FFE7D0A0000
|
trusted library allocation
|
page read and write
|
||
348F000
|
heap
|
page read and write
|
||
DC61FFE000
|
unkown
|
page readonly
|
||
6E90000
|
trusted library allocation
|
page execute and read and write
|
||
1E819FAF000
|
trusted library allocation
|
page read and write
|
||
207E7190000
|
heap
|
page read and write
|
||
7FFE7CFF3000
|
trusted library allocation
|
page read and write
|
||
7DF6BFF000
|
stack
|
page read and write
|
||
7DF72FE000
|
stack
|
page read and write
|
||
4E6E000
|
stack
|
page read and write
|
||
9164CFE000
|
stack
|
page read and write
|
||
207E719E000
|
heap
|
page read and write
|
||
1E3B944C000
|
heap
|
page read and write
|
||
1E819E73000
|
trusted library allocation
|
page read and write
|
||
1E831F1C000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1E81978C000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
742E000
|
trusted library allocation
|
page read and write
|
||
90B000
|
stack
|
page read and write
|
||
1E819E24000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
ABB35FE000
|
stack
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7FFE7D280000
|
trusted library allocation
|
page read and write
|
||
3205000
|
heap
|
page read and write
|
||
145B1D17000
|
heap
|
page read and write
|
||
48FE000
|
stack
|
page read and write
|
||
206FF3B0000
|
heap
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
1E819F68000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
6DAE000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7410000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7FFE7D1F0000
|
trusted library allocation
|
page execute and read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
325D000
|
stack
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7390000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
4ADC000
|
trusted library allocation
|
page execute and read and write
|
||
24206A02000
|
heap
|
page read and write
|
||
4EAE000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
DC620FE000
|
stack
|
page read and write
|
||
206FF2D7000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
29FBE760000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
49BC000
|
stack
|
page read and write
|
||
7460000
|
trusted library allocation
|
page read and write
|
||
50C6000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
5C35000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7FAD0000
|
trusted library allocation
|
page execute and read and write
|
||
BECCAFE000
|
stack
|
page read and write
|
||
7FFE7CFFD000
|
trusted library allocation
|
page execute and read and write
|
||
207E98E4000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
1AB60FE000
|
stack
|
page read and write
|
||
207E7360000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1E831F9E000
|
heap
|
page read and write
|
||
7FFE7D110000
|
trusted library allocation
|
page execute and read and write
|
||
508D000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
73F0000
|
trusted library allocation
|
page read and write
|
||
1E819E96000
|
trusted library allocation
|
page read and write
|
||
1E819AED000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
29FBEF41000
|
trusted library allocation
|
page read and write
|
||
6E80000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
217F0E18000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
9164FFC000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
207E71DB000
|
heap
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
7FFE7D390000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
33B0000
|
heap
|
page read and write
|
||
2179000D000
|
trusted library allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
4AAF000
|
trusted library allocation
|
page read and write
|
||
1E819C0D000
|
trusted library allocation
|
page read and write
|
||
DEF000
|
stack
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
1E8324DA000
|
heap
|
page read and write
|
||
7FFE7D1B0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
2178012C000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E59000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
73E5000
|
trusted library allocation
|
page read and write
|
||
1E3B9497000
|
heap
|
page read and write
|
||
91645FE000
|
stack
|
page read and write
|
||
7FFE7D1F0000
|
trusted library allocation
|
page read and write
|
||
5C31000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
5116000
|
trusted library allocation
|
page read and write
|
||
7FFE7D07C000
|
trusted library allocation
|
page execute and read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
B6AE7B000
|
stack
|
page read and write
|
||
217EFD80000
|
heap
|
page read and write
|
||
207E74D5000
|
heap
|
page read and write
|
||
4B34000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
7441000
|
heap
|
page read and write
|
||
1AB3BFE000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7DF66F1000
|
stack
|
page read and write
|
||
1E8327D2000
|
unkown
|
page readonly
|
||
7FFE7D380000
|
trusted library allocation
|
page read and write
|
||
7FFE7CFD4000
|
trusted library allocation
|
page read and write
|
||
7445000
|
heap
|
page read and write
|
||
799E000
|
stack
|
page read and write
|
||
46B4000
|
trusted library allocation
|
page read and write
|
||
7FFE7D08C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7CFED000
|
trusted library allocation
|
page execute and read and write
|
||
73E9000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
7FFE7D1F0000
|
trusted library allocation
|
page read and write
|
||
1E819A0B000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
1E819F70000
|
trusted library allocation
|
page read and write
|
||
DC61E7E000
|
stack
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1E3B945E000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
1D5E5F80000
|
heap
|
page read and write
|
||
79EB000
|
heap
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
2DCD000
|
stack
|
page read and write
|
||
1E8197FA000
|
trusted library allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
850167E000
|
unkown
|
page readonly
|
||
7FFE7D183000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
7FFE7D00D000
|
trusted library allocation
|
page execute and read and write
|
||
48E5000
|
heap
|
page read and write
|
||
207E9639000
|
heap
|
page read and write
|
||
7430000
|
heap
|
page read and write
|
||
C1A000
|
heap
|
page read and write
|
||
7FFE7D00B000
|
trusted library allocation
|
page execute and read and write
|
||
3425000
|
trusted library allocation
|
page execute and read and write
|
||
48CE000
|
stack
|
page read and write
|
||
4F4E000
|
stack
|
page read and write
|
||
7FFE7D1F0000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7421000
|
trusted library allocation
|
page read and write
|
||
7500000
|
remote allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7510000
|
heap
|
page execute and read and write
|
||
2D4D000
|
stack
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1E819FA7000
|
trusted library allocation
|
page read and write
|
||
4900000
|
trusted library allocation
|
page execute and read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
20690691000
|
trusted library allocation
|
page read and write
|
||
1E819E40000
|
trusted library allocation
|
page read and write
|
||
7F258000
|
trusted library allocation
|
page execute and read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
1E819F6E000
|
trusted library allocation
|
page read and write
|
||
1AB4BF5000
|
stack
|
page read and write
|
||
ABB3141000
|
stack
|
page read and write
|
||
1E8198C2000
|
trusted library allocation
|
page read and write
|
||
7FFE7D200000
|
trusted library allocation
|
page read and write
|
||
7FFE7D1C0000
|
trusted library allocation
|
page execute and read and write
|
||
C88000
|
heap
|
page read and write
|
||
7FFE7D240000
|
trusted library allocation
|
page execute and read and write
|
||
4A6E000
|
stack
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
BECC4FE000
|
stack
|
page read and write
|
||
7FFE7CFDD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7D200000
|
trusted library allocation
|
page read and write
|
||
30E9000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
331E000
|
unkown
|
page read and write
|
||
7FFE7D250000
|
trusted library allocation
|
page read and write
|
||
C3F000
|
heap
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
207E98EC000
|
heap
|
page read and write
|
||
7FFE7D240000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7410000
|
trusted library allocation
|
page read and write
|
||
1AB4FF7000
|
stack
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
20680670000
|
heap
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
1D5E6120000
|
heap
|
page read and write
|
||
28969E52000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
EE99C7D000
|
stack
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
9164DFE000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
7FFE7D090000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
3505000
|
heap
|
page read and write
|
||
7FFE7CFFD000
|
trusted library allocation
|
page execute and read and write
|
||
4764000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
91644F5000
|
stack
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
1AB363F000
|
stack
|
page read and write
|
||
3700000
|
heap
|
page read and write
|
||
145B1C02000
|
heap
|
page read and write
|
||
704F000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
353A000
|
heap
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
46C0000
|
trusted library allocation
|
page read and write
|
||
206FF318000
|
heap
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
6E00000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
350E000
|
heap
|
page read and write
|
||
EE99D7E000
|
unkown
|
page readonly
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
1E82970E000
|
trusted library allocation
|
page read and write
|
||
1E819E64000
|
trusted library allocation
|
page read and write
|
||
1E819D32000
|
trusted library allocation
|
page read and write
|
||
24206900000
|
heap
|
page read and write
|
||
145B1BB0000
|
heap
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
4AB1000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
494E000
|
stack
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
1E3B9449000
|
heap
|
page read and write
|
||
7FFE7D190000
|
trusted library allocation
|
page read and write
|
||
4B40000
|
trusted library allocation
|
page read and write
|
||
476D000
|
trusted library allocation
|
page execute and read and write
|
||
1E832590000
|
heap
|
page execute and read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1E3B9390000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7F550000
|
trusted library allocation
|
page execute and read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
1AB5CFE000
|
stack
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
29FBE520000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
207E7385000
|
heap
|
page read and write
|
||
AC7000
|
stack
|
page read and write
|
||
7FFE7D1F9000
|
trusted library allocation
|
page read and write
|
||
7FFE7D220000
|
trusted library allocation
|
page read and write
|
||
217EFEF9000
|
heap
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
7FFE7D230000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7D1AD000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
4845000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
91649FE000
|
stack
|
page read and write
|
||
7FFE7D190000
|
trusted library allocation
|
page read and write
|
||
7FFE7D0C6000
|
trusted library allocation
|
page execute and read and write
|
||
332E000
|
stack
|
page read and write
|
||
24206A00000
|
heap
|
page read and write
|
||
4C1E000
|
stack
|
page read and write
|
||
217EFCA0000
|
heap
|
page read and write
|
||
24207200000
|
heap
|
page read and write
|
||
795E000
|
stack
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
4690000
|
heap
|
page read and write
|
||
1AB56FC000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
145B36A0000
|
remote allocation
|
page read and write
|
||
6E80000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
947000
|
stack
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
28969E02000
|
heap
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
24206A22000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
206FF2DB000
|
heap
|
page read and write
|
||
5081000
|
trusted library allocation
|
page read and write
|
||
28969E5F000
|
heap
|
page read and write
|
||
7FFE7D04C000
|
trusted library allocation
|
page execute and read and write
|
||
785D000
|
stack
|
page read and write
|
||
3138000
|
heap
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
850197E000
|
stack
|
page read and write
|
||
28969E48000
|
heap
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
145B3670000
|
trusted library allocation
|
page read and write
|
||
7FFE7D1AD000
|
trusted library allocation
|
page read and write
|
||
1E819B9D000
|
trusted library allocation
|
page read and write
|
||
4FD3000
|
trusted library allocation
|
page read and write
|
||
7FFE7CFE0000
|
trusted library allocation
|
page read and write
|
||
4770000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
7FFE7D090000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7D220000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
1AB49ED000
|
stack
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
79DE000
|
heap
|
page read and write
|
||
1E8195F3000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
1E8323DE000
|
heap
|
page read and write
|
||
DC627FE000
|
stack
|
page read and write
|
||
7FFE7D1A0000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
3427000
|
trusted library allocation
|
page execute and read and write
|
||
503E000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E91000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
7FFE7D1E9000
|
trusted library allocation
|
page read and write
|
||
1E819FAD000
|
trusted library allocation
|
page read and write
|
||
1E8197D3000
|
trusted library allocation
|
page read and write
|
||
1AB4CFA000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7FFE7CFD2000
|
trusted library allocation
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
1E819B95000
|
trusted library allocation
|
page read and write
|
||
4AB3000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7FFE7CFD0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
28969D30000
|
heap
|
page read and write
|
||
761E000
|
stack
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
6E9E000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
EE99F7E000
|
unkown
|
page readonly
|
||
2069068D000
|
trusted library allocation
|
page read and write
|
||
7500000
|
remote allocation
|
page read and write
|
||
EE9A67E000
|
unkown
|
page readonly
|
||
8501A7E000
|
unkown
|
page readonly
|
||
3100000
|
heap
|
page read and write
|
||
1E3B945C000
|
heap
|
page read and write
|
||
1E3B9502000
|
heap
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
1E8327D0000
|
unkown
|
page readonly
|
||
6035000
|
trusted library allocation
|
page read and write
|
||
4850000
|
heap
|
page readonly
|
||
1AB4AE9000
|
stack
|
page read and write
|
||
7390000
|
trusted library allocation
|
page read and write
|
||
7FFE7D166000
|
trusted library allocation
|
page read and write
|
||
CB7000
|
heap
|
page read and write
|
||
7FFE7D230000
|
trusted library allocation
|
page read and write
|
||
79D9000
|
heap
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
206804B0000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
217F0DB0000
|
heap
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
1E819E9F000
|
trusted library allocation
|
page read and write
|
||
1E3B944A000
|
heap
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
7FFE7D09C000
|
trusted library allocation
|
page execute and read and write
|
||
EE9A27E000
|
stack
|
page read and write
|
||
7460000
|
trusted library allocation
|
page read and write
|
||
7FFE7CFE0000
|
trusted library allocation
|
page read and write
|
||
48B0000
|
trusted library allocation
|
page read and write
|
||
7FFE7D246000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
C57000
|
heap
|
page read and write
|
||
7FFE7D17C000
|
trusted library allocation
|
page read and write
|
||
7FFE7D03C000
|
trusted library allocation
|
page execute and read and write
|
||
207E7433000
|
heap
|
page read and write
|
||
206FF450000
|
heap
|
page read and write
|
||
20780172000
|
trusted library allocation
|
page read and write
|
||
29FD7672000
|
heap
|
page read and write
|
||
349C000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
145B1C40000
|
heap
|
page read and write
|
||
7FFE7CFE4000
|
trusted library allocation
|
page read and write
|
||
1E819FA9000
|
trusted library allocation
|
page read and write
|
||
5020000
|
heap
|
page read and write
|
||
1E3B9435000
|
heap
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
46B0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
339F000
|
stack
|
page read and write
|
||
46F4000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
28969D60000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
9164BFE000
|
stack
|
page read and write
|
||
1AB58FC000
|
stack
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
91653FC000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
50CB000
|
trusted library allocation
|
page read and write
|
||
1E3B9436000
|
heap
|
page read and write
|
||
33F0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1E819786000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
1E819F19000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
3395000
|
heap
|
page read and write
|
||
49D0000
|
trusted library allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
7FFE7CFDD000
|
trusted library allocation
|
page execute and read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
207E7156000
|
heap
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
2896A602000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
7FFE7D180000
|
trusted library allocation
|
page read and write
|
||
24206A2B000
|
heap
|
page read and write
|
||
29FBE7B5000
|
heap
|
page read and write
|
||
7FFE7D1D0000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
7FFE7CFF0000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
4827000
|
trusted library allocation
|
page execute and read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
DAE000
|
stack
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
7FFE7D01C000
|
trusted library allocation
|
page execute and read and write
|
||
2178003B000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
C98000
|
heap
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
1E8197AC000
|
trusted library allocation
|
page read and write
|
||
3490000
|
heap
|
page read and write
|
||
207E991F000
|
heap
|
page read and write
|
||
7FFE7D100000
|
trusted library allocation
|
page execute and read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
1E3B9463000
|
heap
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
BECC3FD000
|
stack
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
7FFE7D1E0000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
7460000
|
trusted library allocation
|
page read and write
|
||
7FFE7CFD0000
|
trusted library allocation
|
page read and write
|
||
7FFE7D2E0000
|
trusted library allocation
|
page read and write
|
||
BECC8FE000
|
stack
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
145B1C63000
|
heap
|
page read and write
|
||
FDE000
|
stack
|
page read and write
|
||
1E3B948E000
|
heap
|
page read and write
|
||
28969E13000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
29FBEE2B000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
207E9662000
|
unkown
|
page readonly
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
EE99E7E000
|
stack
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
C4E000
|
stack
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
1E3B9350000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7FFE7D004000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7FFE7D290000
|
trusted library allocation
|
page read and write
|
||
29FBEF1F000
|
trusted library allocation
|
page read and write
|
||
207E98F6000
|
heap
|
page read and write
|
||
206FF2DD000
|
heap
|
page read and write
|
||
1E8197D7000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7FFE7CFF2000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
207E8DA0000
|
heap
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
24206B02000
|
heap
|
page read and write
|
||
207E9902000
|
heap
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
20790001000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
1E819D30000
|
trusted library allocation
|
page read and write
|
||
4A95000
|
heap
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
1E3B9462000
|
heap
|
page read and write
|
||
6D6E000
|
stack
|
page read and write
|
||
CD7000
|
heap
|
page read and write
|
||
1AB4328000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFE7D1B6000
|
trusted library allocation
|
page read and write
|
||
34B6000
|
heap
|
page read and write
|
||
1E832160000
|
unkown
|
page readonly
|
||
1E819D56000
|
trusted library allocation
|
page read and write
|
||
7FFE7CFE4000
|
trusted library allocation
|
page read and write
|
||
4AF6000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E55000
|
trusted library allocation
|
page read and write
|
||
321E000
|
stack
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
708E000
|
stack
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
7FFE7D1B0000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7FFE7D09C000
|
trusted library allocation
|
page execute and read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
1E83240D000
|
heap
|
page read and write
|
||
7FFE7D02C000
|
trusted library allocation
|
page execute and read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
206807AC000
|
trusted library allocation
|
page read and write
|
||
C99C6FF000
|
stack
|
page read and write
|
||
5A65000
|
trusted library allocation
|
page read and write
|
||
34A8000
|
heap
|
page read and write
|
||
7DF6DFE000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFE7D0D6000
|
trusted library allocation
|
page execute and read and write
|
||
207E7480000
|
heap
|
page read and write
|
||
50C3000
|
trusted library allocation
|
page read and write
|
||
7FFE7D0C6000
|
trusted library allocation
|
page execute and read and write
|
||
91659FE000
|
stack
|
page read and write
|
||
1E819E68000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
B6B2FC000
|
stack
|
page read and write
|
||
24206A71000
|
heap
|
page read and write
|
||
73E5000
|
trusted library allocation
|
page read and write
|
||
B6B07C000
|
stack
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
C9E000
|
heap
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7FFE7D1C0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFE7D1D5000
|
trusted library allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
206FF522000
|
unkown
|
page readonly
|
||
7FFE7D173000
|
trusted library allocation
|
page read and write
|
||
4B40000
|
trusted library allocation
|
page read and write
|
||
B6B4FC000
|
stack
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
20680530000
|
heap
|
page execute and read and write
|
||
EE9A5FE000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFE7D1B0000
|
trusted library allocation
|
page read and write
|
||
207E7440000
|
heap
|
page execute and read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
1E8197DF000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
1E831FF0000
|
heap
|
page execute and read and write
|
||
217F0F10000
|
heap
|
page execute and read and write
|
||
7FFE7D210000
|
trusted library allocation
|
page read and write
|
||
79B2000
|
heap
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
7FFE7D1B6000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7FFE7D00B000
|
trusted library allocation
|
page execute and read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFE7D086000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
heap
|
page read and write
|
||
C99C3FD000
|
stack
|
page read and write
|
||
48CF000
|
stack
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
3450000
|
heap
|
page readonly
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
1E81995A000
|
trusted library allocation
|
page read and write
|
||
29FBE8E0000
|
heap
|
page read and write
|
||
4AE0000
|
trusted library allocation
|
page read and write
|
||
4EB8000
|
trusted library allocation
|
page read and write
|
||
7410000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
1AB59FC000
|
stack
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7FFE7D1C0000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
4A14000
|
heap
|
page read and write
|
||
1E3B944B000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
1E818EE0000
|
heap
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
4B40000
|
trusted library allocation
|
page read and write
|
||
7FFE7D0F0000
|
trusted library allocation
|
page execute and read and write
|
||
206FF410000
|
unkown
|
page readonly
|
||
46C4000
|
trusted library allocation
|
page read and write
|
||
1E3B944E000
|
heap
|
page read and write
|
||
7FFE7D1B0000
|
trusted library allocation
|
page read and write
|
||
1E819B99000
|
trusted library allocation
|
page read and write
|
||
6031000
|
trusted library allocation
|
page read and write
|
||
28969E34000
|
heap
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
30CB000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
ABB38FE000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
145B1D02000
|
heap
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
2078017A000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
4910000
|
trusted library allocation
|
page read and write
|
||
ABB3DFE000
|
stack
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
4868000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
46F3000
|
trusted library allocation
|
page execute and read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
49AE000
|
stack
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
50F5000
|
trusted library allocation
|
page read and write
|
||
7FFE7D270000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
91646FE000
|
stack
|
page read and write
|
||
DC621FE000
|
unkown
|
page readonly
|
||
217F0DFC000
|
heap
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
1AB57FE000
|
stack
|
page read and write
|
||
7370000
|
trusted library allocation
|
page execute and read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
207E994F000
|
heap
|
page read and write
|
||
7DF71FD000
|
stack
|
page read and write
|
||
217F0DFF000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
1AB41FD000
|
stack
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
4840000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
28969E16000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
4B42000
|
trusted library allocation
|
page read and write
|
||
4AC1000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
3493000
|
heap
|
page read and write
|
||
7FFE7D180000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
145B1D00000
|
heap
|
page read and write
|
||
1E819EA4000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
4FDD000
|
trusted library allocation
|
page execute and read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1E8197A0000
|
trusted library allocation
|
page read and write
|
||
4A00000
|
trusted library allocation
|
page execute and read and write
|
||
6DB0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
31ED000
|
unkown
|
page read and write
|
||
1E8196F0000
|
heap
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
488E000
|
stack
|
page read and write
|
||
7FFE7D1C0000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
59F5000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
trusted library allocation
|
page read and write
|
||
7380000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
789F000
|
stack
|
page read and write
|
||
207E9943000
|
heap
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
4920000
|
heap
|
page execute and read and write
|
||
49FD000
|
stack
|
page read and write
|
||
4AB4000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
740F000
|
stack
|
page read and write
|
||
7460000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
remote allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
DC61F7E000
|
stack
|
page read and write
|
||
91655FC000
|
stack
|
page read and write
|
||
33E0000
|
trusted library allocation
|
page read and write
|
||
C74000
|
heap
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
7FFE7D210000
|
trusted library allocation
|
page execute and read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
206FF1B0000
|
heap
|
page read and write
|
||
A8B000
|
stack
|
page read and write
|
||
BECC7FE000
|
stack
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7FFE7D090000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
4AAD000
|
stack
|
page read and write
|
||
206FF515000
|
heap
|
page read and write
|
||
1AB3FE9000
|
stack
|
page read and write
|
||
207E73E0000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
4B52000
|
trusted library allocation
|
page read and write
|
||
21790011000
|
trusted library allocation
|
page read and write
|
||
4AFB000
|
trusted library allocation
|
page read and write
|
||
24206A91000
|
heap
|
page read and write
|
||
350E000
|
heap
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
1E818FC6000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7DF6CFE000
|
stack
|
page read and write
|
||
1E3B9431000
|
heap
|
page read and write
|
||
207E95E4000
|
heap
|
page read and write
|
||
217F0E1D000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
473F000
|
stack
|
page read and write
|
||
145B1C13000
|
heap
|
page read and write
|
||
1E8198D6000
|
trusted library allocation
|
page read and write
|
||
6FAF000
|
stack
|
page read and write
|
||
79A0000
|
heap
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
207E9660000
|
unkown
|
page readonly
|
||
1E831EF2000
|
heap
|
page read and write
|
||
1E819FBD000
|
trusted library allocation
|
page read and write
|
||
1E8197C7000
|
trusted library allocation
|
page read and write
|
||
5006000
|
trusted library allocation
|
page execute and read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
207E7140000
|
heap
|
page read and write
|
||
1AB5FFE000
|
stack
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
7FFE7D01B000
|
trusted library allocation
|
page execute and read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
33D5000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
206FF520000
|
unkown
|
page readonly
|
||
7FFE7D1E0000
|
trusted library allocation
|
page read and write
|
||
206FF390000
|
heap
|
page read and write
|
||
4950000
|
heap
|
page readonly
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
remote allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E80000
|
trusted library allocation
|
page read and write
|
||
1E829721000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
91648FC000
|
stack
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
1E8328AF000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
50EE000
|
stack
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
33F3000
|
trusted library allocation
|
page execute and read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
206807C3000
|
trusted library allocation
|
page read and write
|
||
7DF67FE000
|
stack
|
page read and write
|
||
7FFE7D170000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFE7D1D0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
850137B000
|
stack
|
page read and write
|
||
1AB44FD000
|
stack
|
page read and write
|
||
7FFE7D2B0000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
32DE000
|
stack
|
page read and write
|
||
1E819767000
|
trusted library allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
34B3000
|
heap
|
page read and write
|
||
8501B7E000
|
stack
|
page read and write
|
||
7FFE7D0A6000
|
trusted library allocation
|
page execute and read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
24206A13000
|
heap
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
482B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7D209000
|
trusted library allocation
|
page read and write
|
||
7FFE7D096000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7FFE7D200000
|
trusted library allocation
|
page execute and read and write
|
||
BECBDB1000
|
stack
|
page read and write
|
||
C36000
|
heap
|
page read and write
|
||
1E819DF6000
|
trusted library allocation
|
page read and write
|
||
7FFE7D180000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1E8198CE000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
1E819F64000
|
trusted library allocation
|
page read and write
|
||
479B000
|
trusted library allocation
|
page execute and read and write
|
||
89B000
|
stack
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
985000
|
heap
|
page read and write
|
||
E3B000
|
stack
|
page read and write
|
||
7FFE7D080000
|
trusted library allocation
|
page read and write
|
||
49A0000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFE7D010000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
1E819CD9000
|
trusted library allocation
|
page read and write
|
||
33F4000
|
trusted library allocation
|
page read and write
|
||
1E3B9461000
|
heap
|
page read and write
|
||
7FFE7CFED000
|
trusted library allocation
|
page execute and read and write
|
||
765E000
|
stack
|
page read and write
|
||
20698F28000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
73CE000
|
stack
|
page read and write
|
||
207E9629000
|
heap
|
page read and write
|
||
30F9000
|
heap
|
page read and write
|
||
CDE000
|
heap
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
4820000
|
trusted library allocation
|
page read and write
|
||
7FFE7D070000
|
trusted library allocation
|
page read and write
|
||
7FFE7D230000
|
trusted library allocation
|
page execute and read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
29FD7670000
|
heap
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
7FFE7D1B5000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
3440000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
7FFE7CFEB000
|
trusted library allocation
|
page execute and read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
207E94E0000
|
heap
|
page execute and read and write
|
||
6E10000
|
trusted library allocation
|
page read and write
|
||
207E98FE000
|
heap
|
page read and write
|
||
46B3000
|
trusted library allocation
|
page execute and read and write
|
||
24207090000
|
trusted library allocation
|
page read and write
|
||
7EEB0000
|
trusted library allocation
|
page execute and read and write
|
||
3060000
|
heap
|
page read and write
|
||
BECC2FE000
|
stack
|
page read and write
|
||
145B1C6F000
|
heap
|
page read and write
|
||
1AB5AFE000
|
stack
|
page read and write
|
||
24206A38000
|
heap
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
DC6227E000
|
stack
|
page read and write
|
||
1E819E02000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
7FFE7D2C0000
|
trusted library allocation
|
page read and write
|
||
29FCEE01000
|
trusted library allocation
|
page read and write
|
||
1E3B945F000
|
heap
|
page read and write
|
||
4700000
|
trusted library allocation
|
page read and write
|
||
206FF3D0000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
DC61B4B000
|
stack
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
EE9A0FE000
|
stack
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7FFE7D3A0000
|
trusted library allocation
|
page read and write
|
||
331F000
|
stack
|
page read and write
|
||
50AF000
|
stack
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
4E10000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
1E3B9468000
|
heap
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
7FFE7D0A6000
|
trusted library allocation
|
page read and write
|
||
4B40000
|
trusted library allocation
|
page read and write
|
||
1E8198D2000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
29FD7707000
|
heap
|
page read and write
|
||
7FFE7D1A7000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
145B1B80000
|
heap
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
7FFE7CFCD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7D19E000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
1AB50FE000
|
stack
|
page read and write
|
||
730E000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
7040000
|
heap
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
1AB33FF000
|
stack
|
page read and write
|
||
7410000
|
trusted library allocation
|
page read and write
|
||
506E000
|
stack
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
8501076000
|
stack
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
206FF2BD000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFE7D0E0000
|
trusted library allocation
|
page execute and read and write
|
||
4710000
|
heap
|
page read and write
|
||
24206B00000
|
heap
|
page read and write
|
||
24207202000
|
heap
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page execute and read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1AB437E000
|
stack
|
page read and write
|
||
79EC000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FFE7D2F0000
|
trusted library allocation
|
page execute and read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7410000
|
trusted library allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7500000
|
remote allocation
|
page read and write
|
||
7FFE7D2A0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
207E992A000
|
heap
|
page read and write
|
||
206FF2BA000
|
heap
|
page read and write
|
||
4F8E000
|
stack
|
page read and write
|
||
7FFE7CFF0000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
217EFE4F000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7FF44B1B0000
|
trusted library allocation
|
page execute and read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1E819E06000
|
trusted library allocation
|
page read and write
|
||
7460000
|
trusted library allocation
|
page read and write
|
||
217F0DD9000
|
heap
|
page read and write
|
||
ABB3BFE000
|
stack
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
353A000
|
heap
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
7FFE7D185000
|
trusted library allocation
|
page read and write
|
||
217F0005000
|
heap
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7D1AD000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
217EFE51000
|
heap
|
page read and write
|
||
29FBE59B000
|
heap
|
page read and write
|
||
B45000
|
heap
|
page read and write
|
||
1E81A008000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
49B0000
|
trusted library allocation
|
page read and write
|
||
5122000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
7FFE7CFD3000
|
trusted library allocation
|
page execute and read and write
|
||
217F0E11000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
7444000
|
trusted library allocation
|
page read and write
|
There are 2234 hidden memdumps, click here to show them.