Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
ListaItensVistoriaCorpodeBombeirosObrigatorio.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
initial sample
|
||
C:\Config.Msi\47e055.rbs
|
data
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\BouncyCastle.Crypto.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\System.ValueTuple.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI1EAC.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
modified
|
||
C:\Windows\Installer\MSI1EAC.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIE1AC.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSIE1AC.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIE3EF.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSIE3EF.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIFDA2.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSIFDA2.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIFFF5.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\System32\InstallUtil.InstallLog
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\~DF249BEF134D41FAF6.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF4CDBAE97BB9B291A.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF6E1821419CBD92E5.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF7D6DF77431214178.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF809BDB3C3038939A.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFC62927D95770B6A7.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallState
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation.zip
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.ini
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AteraAgent.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\Installer\47e054.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\47e056.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\MSI17E.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI1EAC.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSI1EAC.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI1EAC.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI1EAC.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI5.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI74.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIE1AC.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSIE1AC.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIE1AC.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIE1AC.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIE3EF.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSIE3EF.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIE3EF.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIE3EF.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIFDA2.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSIFDA2.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIFDA2.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIFDA2.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SourceHash{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1A374813EDB1A6631387E414D3E73232
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BA74182F76F15A9CF514DEF352303C95
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
Certificate, Version=3
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
|
Certificate, Version=3
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1A374813EDB1A6631387E414D3E73232
|
data
|
modified
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BA74182F76F15A9CF514DEF352303C95
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageAgentInformation.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\Temp\~DF349BA5819DF2EED8.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF72606B8D49D27887.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF7CF9D7145FB2BD29.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF902835E2B889D7DB.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFCBE2A7A22823B788.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFF75EAB7BA0250139.TMP
|
data
|
dropped
|
||
\Device\ConDrv
|
JSON data
|
dropped
|
There are 73 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSIE1AC.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4710906 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSIE3EF.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4711453 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSIFDA2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4718015 11 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="comunicado@gestorempresas.digital"
/CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q3000006YrPqIAK" /AgentId="036a7bb6-e9ab-4003-820d-512fa1b48707"
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI1EAC.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4726484 33 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
036a7bb6-e9ab-4003-820d-512fa1b48707 "947f5ffd-2187-4fed-88a8-f6375fd81e42" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q3000006YrPqIAK
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
036a7bb6-e9ab-4003-820d-512fa1b48707 "d33bc958-4922-4182-b68f-3483e8de9f0d" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q3000006YrPqIAK
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
036a7bb6-e9ab-4003-820d-512fa1b48707 "74b28cea-d314-412b-b1ac-0c6c5fd129c1" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q3000006YrPqIAK
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\ListaItensVistoriaCorpodeBombeirosObrigatorio.msi"
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding 399844DB614D5E1E27E49AAF003F570D
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding 04E8F29C9872C7FAF44877CCF53966A9 E Global\MSI0000
|
||
C:\Windows\SysWOW64\net.exe
|
"NET" STOP AteraAgent
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\net1.exe
|
C:\Windows\system32\net1 STOP AteraAgent
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"TaskKill.exe" /f /im AteraAgent.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
"C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 13 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://ps.atera.com/agentpackagesmac/AgentPackageWindowsUpdate/24.6/AgentPackageWindowsUpdate.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=d564941f-31f4-4f1e-8cfa-ab39104c2c32&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
|
13.232.67.199
|
||
http://schemas.datacontract.org
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageMarketplace/1.6/AgentPackageMarketplace.zip
|
unknown
|
||
http://www.microsoft.co
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=025e58c1-51ad-4981-aee3-45a08882b1fd&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
|
13.232.67.199
|
||
https://agent-api.atera.com/Production/Agent/track-event
|
unknown
|
||
http://dl.google.com/googletalk/googletalk-setup.exe
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/036a7bb6-e9ab-4003-820d-512fa1b48707/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=6c5d24e4-0b70-422e-83c6-48afa7e568d5&tt=0&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
|
13.232.67.199
|
||
http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/
|
unknown
|
||
http://schemas.datacontract.org/2004/07/System.ServiceProcess
|
unknown
|
||
http://wixtoolset.org
|
unknown
|
||
https://agent-api.atera.com/Production
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageRuntimeInstaller/13.0/AgentPackageRuntimeInstaller
|
unknown
|
||
http://acontrol.atera.com/
|
unknown
|
||
https://ps.pndsn.com
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/036a7bb6-e9ab-4003-820d-512fa1b48707/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=f5d904fa-4ebd-4e88-9d51-8bf1316d9b84&tr=33&tt=17324439817091491&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
|
13.232.67.199
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageADRemote/6.0/AgentPackageADRemote.zip
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageNetworkDiscovery/23.9/AgentPackageNetworkDiscove
|
unknown
|
||
http://agent-api.atera.com
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageSystemTools/27.8/AgentPackageSystemTools.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=254b40c1-e391-4dc5-a3fc-b4191829120e
|
unknown
|
||
http://schemas.datacontract.org/2004/07/
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=beca1352-9fbb-4086-9d34-96d86fc42e76
|
unknown
|
||
https://github.com/icsharpcode/SharpZipLib
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageNetworkDiscovery/15.0/AgentPackageNetworkDiscovery
|
unknown
|
||
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageAgentI
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
|
unknown
|
||
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/036a7bb6-e9ab-4003-820d-512fa1b48707/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=98e68274-5d6c-46f9-8e1c-6ac34eaaed9f&tr=33&tt=17324439817091491&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
|
13.232.67.199
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=27575d4d-f049-4af3-98fd-29c9ab567af2
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageTaskScheduler/17.2/AgentPackageTaskScheduler.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageTicketing/30.1/AgentPackageTicketing.zip
|
unknown
|
||
https://agent-api.atera.com
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/AgentStarting
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/036a7bb6-e9ab-4003-820d-512fa1b48707/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=b0e0aedc-7feb-42fd-9d01-6a81d3a7a14a&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
|
13.232.67.199
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=af9dd924-082e-4d82-abb8-ee5a0258cedd&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
|
13.232.67.199
|
||
http://www.w3.oh
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/036a7bb6
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetCommands
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/036a7bb6-e9ab-4003-820d-512fa1b48707/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=4e8081eb-de73-414b-8c17-81b909623b91&tt=0&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
|
13.232.67.199
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/036a7bb6-e9ab-H
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/036a7bb6-e9ab-4003-820d-512fa1b48707/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=49582081-0068-4f70-b5a7-3884c66622b6&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
|
13.232.67.199
|
||
https://agent-api.atera.com/
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/036a7bb6-e9ab-4003-820d-512fa1b48707/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=47d3572d-5ec1-4a16-8b18-b7c076a038fc&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
|
13.232.67.199
|
||
https://agent-api.atera.com/Production/Agent/GetRecurringPackages
|
unknown
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.Availability/13.0/Agent.Package.Availability.zip
|
unknown
|
||
https://www.newtonsoft.com/jsonschema
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/036a7bb6-e9ab-4003-820d-512fa1b48707/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=c1866262-6dbe-4127-848d-fdd2fb9c798a&tt=0&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
|
13.232.67.199
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=beca1352-9fbb-4086-9d34-96d86fc42e76&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
|
13.232.67.199
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/036a7bb6-e9ab-4003-820d-512fa1b48707/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=10b48a2e-94d5-4663-b23c-61fa3a71d716&tt=0&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
|
13.232.67.199
|
||
http://cacerts.digicerZ
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageRuntimeInstaller/1.5/AgentPackageRuntimeInstaller.
|
unknown
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.Watchdog/13.0/Agent.Package.Watchdog.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=985e6a88-0b57-4d38-a817-216eb6ef36a4&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
|
13.232.67.199
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=fc5b0f0f-6a56-401f-80e9-8be81399a636&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
|
13.232.67.199
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=fbc5619b-ff2b-4cc2-bf14-e4eb42ae8834
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=fbc5619b-ff2b-4cc2-bf14-e4eb42ae8834&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
|
13.232.67.199
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.Availability/0.16/Agent.Package.Availability.z
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=d564941f-31f4-4f1e-8cfa-ab39104c2c32
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/036a7bb6-e9ab-4003-820d-512fa1b48707/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=7e86a2c4-8170-4152-af60-04b88101e9d5&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
|
13.232.67.199
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=30556299-8b6f-404b-8ffa-af2979283dda&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
|
13.232.67.199
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageUpgradeAgent/27.6/AgentPackageUpgradeAgent.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=985e6a88-0b57-4d38-a817-216eb6ef36a4
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/036a7bb6-e9ab-4003-820d-512fa1b48707/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=13748a53-9ba4-4d0b-89eb-106bb5773f70&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
|
13.232.67.199
|
||
https://www.newtonsoft.com/json
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/Age
|
unknown
|
||
http://wixtoolset.org/news/
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/036a7bb6-e9ab-4003-820d
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=b1f9d30a-4d02-478f-8a1f-0bd9525f8618
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageAgentInformation/22.7/AgentPackageAgentInformation
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/036a7bb6-e9ab-4003-820d-512fa1b48707/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=52166139-0835-47a8-ba03-8e3021aadb32&tr=33&tt=17324439964531271&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
|
13.232.67.199
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageOsUpdates/20.9/AgentPackageOsUpdates.zip
|
unknown
|
||
https://agent-api.aterD
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageNetworkDiscovery/13.0/AgentPackageNetworkDiscovery
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/036a7bb6-e9ab-4003-820d-512fa1b48707/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=7cb6273b-9aee-4659-b8d3-39f4cff22a24&tt=0&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
|
13.232.67.199
|
||
https://ps.atera.com/agentpackageswin/Agent.Package.IotPoc/13.0/Agent.Package.IotPoc.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=198af10c-e838-4982-a564-e08a82a398e4
|
unknown
|
||
https://ps.pndsn.com/v
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/AcknowledgeCommands
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/036a7bb6-e9ab-4003-820d-512fa1b48707/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=19e1beb7-925e-45d7-a87b-447402156469&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
|
13.232.67.199
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageTaskScheduler/13.0/AgentPackageTaskScheduler.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageAgentInformation/38.0/AgentPackageAgentInformation
|
unknown
|
||
http://msdn.microsoft.K/
|
unknown
|
||
https://agent-api.P
|
unknown
|
||
http://www.w3.o
|
unknown
|
||
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-061~=
|
unknown
|
||
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageA
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageAgentInformation/38.0/AgentPackageAgentInformati
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/GetCommandsFallback
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/036a7bb6-e9ab-4003-820d-512fa1b48707/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=9dbd0473-c525-491a-8cab-a2fddc92f86f&tr=33&tt=17324439224725513&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
|
13.232.67.199
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=b1f9d30a-4d02-478f-8a1f-0bd9525f8618&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
|
13.232.67.199
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=254b40c1-e391-4dc5-a3fc-b4191829120e&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
|
13.232.67.199
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageRuntimeInstaller/1.6/AgentPackageRuntimeInstalle
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ps.pndsn.com
|
13.232.67.199
|
||
bg.microsoft.map.fastly.net
|
199.232.210.172
|
||
d25btwd9wax8gu.cloudfront.net
|
108.158.75.46
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
||
ps.atera.com
|
unknown
|
||
agent-api.atera.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
13.232.67.199
|
ps.pndsn.com
|
United States
|
||
108.158.75.46
|
d25btwd9wax8gu.cloudfront.net
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\47e055.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\47e055.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB9EFD7FDAF9AD115987000E181661F5
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CD868C8CE5A308147ABB306D829266BC
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C32B8CE0327C1E141950B4C9C2AD4DA7
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D9B1B1F0B1FC024D9390FE4B94D97D5
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\007F59F54ACD08842B2D98A10E6D1E3A
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB25C26F7C51D3C4AA2BED5600F46956
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01010F83113E72A4C81AD77422D2F947
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01D9DC4B27DFC0340B543A11D3CEBE07
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\ATERA Networks\AteraAgent\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\ATERA Networks\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\7D0A237E2F2A7564CA141B792446E854
|
INSTALLFOLDER_files_Feature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Features
|
INSTALLFOLDER_files_Feature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
|
LastUsedSource
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
|
AutoBackupLogFiles
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AteraAgent
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
AccountId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
IntegratorLogin
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
CompanyId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
AgentId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
ServerName
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AlphaAgent
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
FileDirectory
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
FileDirectory
|
There are 135 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1C717BB1000
|
trusted library allocation
|
page read and write
|
||
1DD52F31000
|
trusted library allocation
|
page read and write
|
||
1A39A57E000
|
heap
|
page read and write
|
||
1A3FF3A0000
|
heap
|
page read and write
|
||
1A0DA9DB000
|
heap
|
page read and write
|
||
1A39A5A6000
|
heap
|
page read and write
|
||
1A0DB121000
|
trusted library allocation
|
page read and write
|
||
1A3FF316000
|
heap
|
page read and write
|
||
1A0DA9BB000
|
heap
|
page read and write
|
||
1A0DB1DF000
|
trusted library allocation
|
page read and write
|
||
281D9151000
|
trusted library allocation
|
page read and write
|
||
1A3FF0A2000
|
unkown
|
page readonly
|
||
1DD526AD000
|
heap
|
page read and write
|
||
1C717172000
|
unkown
|
page readonly
|
||
1DD5300E000
|
trusted library allocation
|
page read and write
|
||
1C717300000
|
heap
|
page read and write
|
||
1DD52E9E000
|
trusted library allocation
|
page read and write
|
||
1A39A530000
|
heap
|
page read and write
|
||
281D881B000
|
heap
|
page read and write
|
||
1A381B05000
|
trusted library allocation
|
page read and write
|
||
1A39A32A000
|
heap
|
page read and write
|
||
4534000
|
trusted library allocation
|
page read and write
|
||
1DD524C0000
|
heap
|
page read and write
|
||
1DD52E31000
|
trusted library allocation
|
page read and write
|
||
1C717580000
|
heap
|
page read and write
|
||
1DD6B502000
|
heap
|
page read and write
|
||
1A0DAC00000
|
heap
|
page read and write
|
||
1A381B4C000
|
trusted library allocation
|
page read and write
|
||
1C717391000
|
heap
|
page read and write
|
||
41B7000
|
heap
|
page read and write
|
||
1A3819D1000
|
trusted library allocation
|
page read and write
|
||
1A3FF372000
|
heap
|
page read and write
|
||
4B2C000
|
heap
|
page read and write
|
||
1A3FF310000
|
heap
|
page read and write
|
||
1A381A8A000
|
trusted library allocation
|
page read and write
|
||
42E1000
|
trusted library allocation
|
page read and write
|
||
1DD53091000
|
trusted library allocation
|
page read and write
|
||
1C717522000
|
unkown
|
page readonly
|
||
1DD6B9A0000
|
heap
|
page read and write
|
||
1DD6B5C0000
|
heap
|
page read and write
|
||
281D8BA0000
|
heap
|
page read and write
|
||
1A381B36000
|
trusted library allocation
|
page read and write
|
||
1A3FF331000
|
heap
|
page read and write
|
||
1A381A59000
|
trusted library allocation
|
page read and write
|
||
281D87E0000
|
heap
|
page read and write
|
||
7FF848B34000
|
trusted library allocation
|
page read and write
|
||
1A0DA9A0000
|
heap
|
page read and write
|
||
1A0DAA5B000
|
heap
|
page read and write
|
||
1A3FF580000
|
heap
|
page read and write
|
||
281D9197000
|
trusted library allocation
|
page read and write
|
||
1A0DB167000
|
trusted library allocation
|
page read and write
|
||
281D87E9000
|
heap
|
page read and write
|
||
281D91D3000
|
trusted library allocation
|
page read and write
|
||
281D920F000
|
trusted library allocation
|
page read and write
|
||
1DD52670000
|
heap
|
page read and write
|
||
1DD53132000
|
trusted library allocation
|
page read and write
|
||
1C717C33000
|
trusted library allocation
|
page read and write
|
||
1A0DB1A3000
|
trusted library allocation
|
page read and write
|
||
1A0DB193000
|
trusted library allocation
|
page read and write
|
||
1DD52860000
|
heap
|
page read and write
|
||
1A381B02000
|
trusted library allocation
|
page read and write
|
||
1DD6BA70000
|
heap
|
page read and write
|
||
17E17C5000
|
stack
|
page read and write
|
||
4491000
|
trusted library allocation
|
page read and write
|
||
1A0DAA23000
|
heap
|
page read and write
|
||
1A381A84000
|
trusted library allocation
|
page read and write
|
||
281D8825000
|
heap
|
page read and write
|
||
1C717C23000
|
trusted library allocation
|
page read and write
|
||
4384000
|
trusted library allocation
|
page read and write
|
||
1C71730C000
|
heap
|
page read and write
|
||
281D91C3000
|
trusted library allocation
|
page read and write
|
||
281D8869000
|
heap
|
page read and write
|
||
45AE000
|
heap
|
page read and write
|
||
1A381A5C000
|
trusted library allocation
|
page read and write
|
||
1DD526F8000
|
heap
|
page read and write
|
||
1A0DA9A8000
|
heap
|
page read and write
|
||
1A3FF352000
|
heap
|
page read and write
|
||
1C717344000
|
heap
|
page read and write
|
||
1A381A99000
|
trusted library allocation
|
page read and write
|
||
1DD526CD000
|
heap
|
page read and write
|
||
281D8FF9000
|
heap
|
page read and write
|
||
409F000
|
heap
|
page read and write
|
||
1A381A82000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
7FF848960000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
6790000
|
heap
|
page read and write
|
||
1DD52FF2000
|
trusted library allocation
|
page read and write
|
||
82BF0FF000
|
stack
|
page read and write
|
||
4200000
|
trusted library allocation
|
page read and write
|
||
4170000
|
heap
|
page readonly
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
47E000
|
stack
|
page read and write
|
||
281D9095000
|
heap
|
page read and write
|
||
847000
|
heap
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
7FF848B60000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
1C717490000
|
trusted library allocation
|
page read and write
|
||
17E21FE000
|
stack
|
page read and write
|
||
4523000
|
trusted library allocation
|
page read and write
|
||
281D8B60000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
7130000
|
trusted library allocation
|
page execute and read and write
|
||
1A0F3A08000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
40CB000
|
trusted library allocation
|
page execute and read and write
|
||
2828000
|
heap
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
26D0000
|
trusted library allocation
|
page read and write
|
||
70ED000
|
stack
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
7FF848B4D000
|
trusted library allocation
|
page read and write
|
||
1DD6BF03000
|
heap
|
page read and write
|
||
1DD52C83000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
3F80000
|
trusted library allocation
|
page read and write
|
||
1DD62EB2000
|
trusted library allocation
|
page read and write
|
||
45DF000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
17E3737000
|
stack
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
7FF848A66000
|
trusted library allocation
|
page execute and read and write
|
||
2AEA000
|
heap
|
page read and write
|
||
4587000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8489BC000
|
trusted library allocation
|
page execute and read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
7FF848973000
|
trusted library allocation
|
page read and write
|
||
7FF848B46000
|
trusted library allocation
|
page read and write
|
||
692E000
|
stack
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
4BFE000
|
stack
|
page read and write
|
||
2605000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
7FF848A40000
|
trusted library allocation
|
page execute and read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
1DD52ED4000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
ABAA4FE000
|
stack
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1DD6B80E000
|
unkown
|
page readonly
|
||
26F9000
|
heap
|
page read and write
|
||
17E3131000
|
stack
|
page read and write
|
||
6720000
|
trusted library allocation
|
page execute and read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
7389DFE000
|
stack
|
page read and write
|
||
1DD53002000
|
trusted library allocation
|
page read and write
|
||
1C730322000
|
unkown
|
page readonly
|
||
7FF8489AB000
|
trusted library allocation
|
page execute and read and write
|
||
1DD5325E000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
7FF848BE0000
|
trusted library allocation
|
page execute and read and write
|
||
4310000
|
trusted library allocation
|
page read and write
|
||
6CB9000
|
heap
|
page read and write
|
||
1DD53761000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
1A39A150000
|
heap
|
page execute and read and write
|
||
40D0000
|
heap
|
page read and write
|
||
4B90000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
40C7000
|
trusted library allocation
|
page execute and read and write
|
||
17E3E31000
|
stack
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
1DD6B530000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
17E2D3B000
|
stack
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
7FF848B23000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
4203000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
1DD52690000
|
heap
|
page read and write
|
||
69CE000
|
stack
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
ABAAEFE000
|
stack
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1C7304AA000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
A5E000
|
unkown
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
82BEFFE000
|
stack
|
page read and write
|
||
1A3FF0A0000
|
unkown
|
page readonly
|
||
41E8000
|
heap
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
10A05FF000
|
stack
|
page read and write
|
||
7FF848B55000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
7388AF5000
|
stack
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
42AE000
|
stack
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
7FF848A1C000
|
trusted library allocation
|
page execute and read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
1DD5310D000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
6C84000
|
heap
|
page read and write
|
||
1DD62E51000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
17E3D3B000
|
stack
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1DD62E3E000
|
trusted library allocation
|
page read and write
|
||
7FC88000
|
trusted library allocation
|
page execute and read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
1DD53415000
|
trusted library allocation
|
page read and write
|
||
ABAAAFE000
|
stack
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
7FF84896D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848980000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
1DD6BEF6000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1DD6BB87000
|
heap
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
4BB0000
|
trusted library allocation
|
page read and write
|
||
4AE000
|
stack
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
43E3000
|
trusted library allocation
|
page read and write
|
||
281D918D000
|
trusted library allocation
|
page read and write
|
||
6714000
|
trusted library allocation
|
page read and write
|
||
66E0000
|
trusted library allocation
|
page read and write
|
||
4090000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
7FF848BB0000
|
trusted library allocation
|
page execute and read and write
|
||
1DD53268000
|
trusted library allocation
|
page read and write
|
||
7FF848B1D000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1831CD00000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
7FF848BD0000
|
trusted library allocation
|
page execute and read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
17E3F3C000
|
stack
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
45B0000
|
trusted library allocation
|
page read and write
|
||
66B5000
|
trusted library allocation
|
page read and write
|
||
66F3000
|
trusted library allocation
|
page read and write
|
||
28C0000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
281D8DA5000
|
heap
|
page read and write
|
||
2741000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
26EE000
|
heap
|
page read and write
|
||
40A0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
7FF848B10000
|
trusted library allocation
|
page read and write
|
||
7FF848A16000
|
trusted library allocation
|
page read and write
|
||
1DD52FFA000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1A39A553000
|
heap
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
72CE000
|
stack
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
1DD52F2F000
|
trusted library allocation
|
page read and write
|
||
84B000
|
heap
|
page read and write
|
||
66FE000
|
trusted library allocation
|
page read and write
|
||
6AFE000
|
stack
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
7FF848AE3000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
2837000
|
heap
|
page read and write
|
||
4B97000
|
trusted library allocation
|
page execute and read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
43C6000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
1DD52F08000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
1DD52660000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
7FF848B10000
|
trusted library allocation
|
page read and write
|
||
4CF357F000
|
stack
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
5785000
|
trusted library allocation
|
page read and write
|
||
7FF84894D000
|
trusted library allocation
|
page execute and read and write
|
||
1A0DAAA0000
|
heap
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
17E1CFE000
|
stack
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
147000
|
stack
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
1A0DAD85000
|
heap
|
page read and write
|
||
7FF84897D000
|
trusted library allocation
|
page execute and read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1C71734B000
|
heap
|
page read and write
|
||
7FF848C20000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
1DD6B760000
|
unkown
|
page readonly
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
2704000
|
heap
|
page read and write
|
||
1C7174B0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
281D8B40000
|
trusted library allocation
|
page read and write
|
||
1DD52E20000
|
heap
|
page execute and read and write
|
||
4330000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
4580000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1DD6BB96000
|
heap
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
7FF848A26000
|
trusted library allocation
|
page execute and read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
1A0F3A16000
|
heap
|
page read and write
|
||
4C80000
|
heap
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
4331000
|
trusted library allocation
|
page read and write
|
||
82B000
|
heap
|
page read and write
|
||
1DD53326000
|
trusted library allocation
|
page read and write
|
||
6701000
|
trusted library allocation
|
page read and write
|
||
1C71719C000
|
unkown
|
page readonly
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
42B0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
678E000
|
stack
|
page read and write
|
||
7FF848B80000
|
trusted library allocation
|
page read and write
|
||
7FF848A10000
|
trusted library allocation
|
page read and write
|
||
7FF848B20000
|
trusted library allocation
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
7FF848942000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
5C95000
|
trusted library allocation
|
page read and write
|
||
7FF848B10000
|
trusted library allocation
|
page read and write
|
||
281F1A10000
|
heap
|
page execute and read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
7FF848C90000
|
trusted library allocation
|
page execute and read and write
|
||
447E000
|
stack
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
48FF000
|
stack
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
6C6E000
|
stack
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
4510000
|
heap
|
page read and write
|
||
43EC000
|
trusted library allocation
|
page read and write
|
||
4553000
|
trusted library allocation
|
page execute and read and write
|
||
7FF84896D000
|
trusted library allocation
|
page execute and read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
427C000
|
trusted library allocation
|
page execute and read and write
|
||
1DD6BEBF000
|
heap
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
1DD52843000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
734E000
|
stack
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
7FF848B56000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
70AE000
|
stack
|
page read and write
|
||
1DD6B9DE000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66B5000
|
trusted library allocation
|
page read and write
|
||
7FF848A80000
|
trusted library allocation
|
page execute and read and write
|
||
279F000
|
heap
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
69AF000
|
stack
|
page read and write
|
||
1A0DB15B000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
6CC0000
|
heap
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
7FF848984000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
7119000
|
trusted library allocation
|
page execute and read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1DD52F14000
|
trusted library allocation
|
page read and write
|
||
ABAA3FE000
|
stack
|
page read and write
|
||
1C730483000
|
heap
|
page read and write
|
||
1DD52E9A000
|
trusted library allocation
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848B20000
|
trusted library allocation
|
page read and write
|
||
1A0DAC20000
|
trusted library allocation
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
4395000
|
trusted library allocation
|
page read and write
|
||
1A39A59C000
|
heap
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
1DD6B762000
|
unkown
|
page readonly
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
281D8821000
|
heap
|
page read and write
|
||
1A0F3AD0000
|
heap
|
page execute and read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
2F9F000
|
heap
|
page read and write
|
||
4764000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
4CF367E000
|
stack
|
page read and write
|
||
6B6F000
|
stack
|
page read and write
|
||
1DD6BE96000
|
heap
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
4CF347D000
|
stack
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
10A01FE000
|
stack
|
page read and write
|
||
1C717BA0000
|
heap
|
page read and write
|
||
1DD6AE60000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
7FF848D20000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
43E1000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
724F000
|
stack
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
7060000
|
trusted library allocation
|
page read and write
|
||
1A3FF270000
|
heap
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
2737000
|
heap
|
page read and write
|
||
1DD526F6000
|
heap
|
page read and write
|
||
4D2C000
|
heap
|
page read and write
|
||
29D0000
|
heap
|
page execute and read and write
|
||
41F0000
|
trusted library allocation
|
page read and write
|
||
1DD6BB20000
|
heap
|
page read and write
|
||
1DD53496000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
27C3000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
7FF848B70000
|
trusted library allocation
|
page read and write
|
||
1A0F39BF000
|
heap
|
page read and write
|
||
6B4E000
|
stack
|
page read and write
|
||
7FF848B70000
|
trusted library allocation
|
page read and write
|
||
1C7303D0000
|
heap
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
1A0F3A4D000
|
heap
|
page read and write
|
||
27C6000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1C730485000
|
heap
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
10B000
|
stack
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
6630000
|
trusted library allocation
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
71B0000
|
heap
|
page read and write
|
||
7FF848B50000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
6CA0000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
1DD52F04000
|
trusted library allocation
|
page read and write
|
||
31BD000
|
stack
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
3F60000
|
heap
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
1C717515000
|
heap
|
page read and write
|
||
4420000
|
trusted library allocation
|
page read and write
|
||
17E26BE000
|
stack
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
284C000
|
heap
|
page read and write
|
||
1C7303DB000
|
heap
|
page read and write
|
||
7100000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
4554000
|
trusted library allocation
|
page read and write
|
||
17E27BE000
|
unkown
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
2B2B000
|
heap
|
page read and write
|
||
1C717400000
|
heap
|
page read and write
|
||
7FF848960000
|
trusted library allocation
|
page read and write
|
||
31FD000
|
stack
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
29FD000
|
stack
|
page read and write
|
||
281D8806000
|
heap
|
page read and write
|
||
7FF848964000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
2A6F000
|
stack
|
page read and write
|
||
1DD6BB7F000
|
heap
|
page read and write
|
||
1A39A314000
|
heap
|
page read and write
|
||
17E1EFE000
|
stack
|
page read and write
|
||
ABAABFE000
|
stack
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
1C717170000
|
unkown
|
page readonly
|
||
7FF848B60000
|
trusted library allocation
|
page execute and read and write
|
||
1DD5300A000
|
trusted library allocation
|
page read and write
|
||
1DD534A7000
|
trusted library allocation
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
4540000
|
trusted library allocation
|
page read and write
|
||
1C730320000
|
unkown
|
page readonly
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
283B000
|
stack
|
page read and write
|
||
4430000
|
trusted library allocation
|
page read and write
|
||
7FF848A30000
|
trusted library allocation
|
page read and write
|
||
66B9000
|
trusted library allocation
|
page read and write
|
||
7FF848B59000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
1A381B4A000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
1A39A57A000
|
heap
|
page read and write
|
||
1C717D01000
|
trusted library allocation
|
page read and write
|
||
17E3C37000
|
stack
|
page read and write
|
||
1DD6BDA2000
|
unkown
|
page readonly
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
7FF848964000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
7FF848B60000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
7FF848B80000
|
trusted library allocation
|
page read and write
|
||
26EC000
|
heap
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
73891FE000
|
stack
|
page read and write
|
||
1A0F39E3000
|
heap
|
page read and write
|
||
82B000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
6730000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
1A39A336000
|
heap
|
page read and write
|
||
7180000
|
trusted library allocation
|
page read and write
|
||
1831CCF5000
|
heap
|
page read and write
|
||
1DD52ED0000
|
trusted library allocation
|
page read and write
|
||
10A09FE000
|
stack
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1C717538000
|
unkown
|
page readonly
|
||
4B60000
|
trusted library allocation
|
page read and write
|
||
66F4000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
54C000
|
stack
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
1A3FF590000
|
unkown
|
page readonly
|
||
1DD52F0C000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
7FF8489A0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
281D9293000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
43D0000
|
trusted library allocation
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
284C000
|
heap
|
page read and write
|
||
26CA000
|
heap
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
29B5000
|
heap
|
page read and write
|
||
2705000
|
trusted library allocation
|
page execute and read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
73895FC000
|
stack
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
1DD6BB62000
|
heap
|
page read and write
|
||
5C91000
|
trusted library allocation
|
page read and write
|
||
7F698000
|
trusted library allocation
|
page execute and read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
7FF848BE0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
66B5000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
6CCF000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
17E2F37000
|
stack
|
page read and write
|
||
429F000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
1C71738E000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66FC000
|
trusted library allocation
|
page read and write
|
||
1A0EB12D000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
26E4000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
1DD53167000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
7FF4579C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF84895D000
|
trusted library allocation
|
page execute and read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
7FF848B60000
|
trusted library allocation
|
page execute and read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
66E0000
|
trusted library allocation
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
1A39A321000
|
heap
|
page read and write
|
||
1DD52EB3000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
4370000
|
trusted library allocation
|
page read and write
|
||
70F0000
|
trusted library allocation
|
page read and write
|
||
281D8740000
|
heap
|
page read and write
|
||
7389CFC000
|
stack
|
page read and write
|
||
7FF848B60000
|
trusted library allocation
|
page execute and read and write
|
||
1DD52640000
|
trusted library allocation
|
page read and write
|
||
66C0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
7FF848980000
|
trusted library allocation
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
1DD53262000
|
trusted library allocation
|
page read and write
|
||
ABAA8FF000
|
stack
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
70F3000
|
trusted library allocation
|
page read and write
|
||
7FF848A00000
|
trusted library allocation
|
page execute and read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
4590000
|
heap
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
412E000
|
stack
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
1DD6BF13000
|
heap
|
page read and write
|
||
26D4000
|
trusted library allocation
|
page read and write
|
||
1831CBF0000
|
heap
|
page read and write
|
||
1A39A545000
|
heap
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
ABA9F31000
|
stack
|
page read and write
|
||
7FF848A36000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
F0E000
|
stack
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
329E000
|
stack
|
page read and write
|
||
4B50000
|
trusted library allocation
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
7FF848983000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848A46000
|
trusted library allocation
|
page execute and read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
1A39A310000
|
heap
|
page read and write
|
||
4B63000
|
trusted library allocation
|
page execute and read and write
|
||
48BE000
|
stack
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
73899FC000
|
stack
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
82BEDFE000
|
stack
|
page read and write
|
||
52E5000
|
trusted library allocation
|
page read and write
|
||
4420000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
1DD6BA24000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
4093000
|
trusted library allocation
|
page execute and read and write
|
||
2600000
|
heap
|
page read and write
|
||
1A3FF40E000
|
heap
|
page read and write
|
||
1DD52FFE000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
2707000
|
heap
|
page read and write
|
||
1DD53322000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
2707000
|
trusted library allocation
|
page execute and read and write
|
||
43E4000
|
trusted library allocation
|
page read and write
|
||
1DD52EBE000
|
trusted library allocation
|
page read and write
|
||
433D000
|
trusted library allocation
|
page read and write
|
||
7FF8489AD000
|
trusted library allocation
|
page execute and read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
7FF848B5E000
|
trusted library allocation
|
page read and write
|
||
281D883B000
|
heap
|
page read and write
|
||
1DD6BDA0000
|
unkown
|
page readonly
|
||
4273000
|
trusted library allocation
|
page read and write
|
||
2F03000
|
heap
|
page read and write
|
||
281D882B000
|
heap
|
page read and write
|
||
45FE000
|
stack
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
1C717440000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
2F18000
|
heap
|
page read and write
|
||
73893FE000
|
stack
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
7FF848C50000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
17E303C000
|
stack
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
7FF848BB0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
1A39A325000
|
heap
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
7FF848B23000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
44D8000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
7FF848A80000
|
trusted library allocation
|
page execute and read and write
|
||
1A39A240000
|
heap
|
page read and write
|
||
7FF848B80000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1DD52EFC000
|
trusted library allocation
|
page read and write
|
||
1DD52865000
|
heap
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
26E0000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
71C0000
|
heap
|
page execute and read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
82BE7FE000
|
stack
|
page read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
1A3FF585000
|
heap
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
6730000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1DD53260000
|
trusted library allocation
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
43E000
|
stack
|
page read and write
|
||
42BD000
|
trusted library allocation
|
page execute and read and write
|
||
1DD52F2D000
|
trusted library allocation
|
page read and write
|
||
7FF848C10000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
4410000
|
trusted library allocation
|
page execute and read and write
|
||
43D2000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
2670000
|
heap
|
page read and write
|
||
738A0FE000
|
stack
|
page read and write
|
||
73898FC000
|
stack
|
page read and write
|
||
1C717CDF000
|
trusted library allocation
|
page read and write
|
||
17E3629000
|
stack
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
1DD52610000
|
heap
|
page read and write
|
||
1C717220000
|
heap
|
page read and write
|
||
1A0DB263000
|
trusted library allocation
|
page read and write
|
||
ADE000
|
stack
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
281D918F000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
82BE9FE000
|
stack
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
1A0EB131000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
1DD6B960000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
7FF848982000
|
trusted library allocation
|
page read and write
|
||
7FC70000
|
trusted library allocation
|
page execute and read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
10A07FE000
|
stack
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
7FF848B90000
|
trusted library allocation
|
page execute and read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
270B000
|
trusted library allocation
|
page execute and read and write
|
||
6CBB000
|
heap
|
page read and write
|
||
2690000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1A0F3A34000
|
heap
|
page read and write
|
||
66B4000
|
trusted library allocation
|
page read and write
|
||
7FF84898B000
|
trusted library allocation
|
page execute and read and write
|
||
41DC000
|
stack
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
4270000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
40C5000
|
trusted library allocation
|
page execute and read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
4920000
|
heap
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
6730000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
7FF848984000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
4370000
|
trusted library allocation
|
page read and write
|
||
82D000
|
heap
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
7FF848A3C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848BC0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
281D881F000
|
heap
|
page read and write
|
||
1A39A59E000
|
heap
|
page read and write
|
||
1A39A540000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
1DD52FCE000
|
trusted library allocation
|
page read and write
|
||
696E000
|
stack
|
page read and write
|
||
2B12000
|
heap
|
page read and write
|
||
6CA0000
|
heap
|
page read and write
|
||
17E263E000
|
stack
|
page read and write
|
||
4420000
|
trusted library allocation
|
page read and write
|
||
2AAE000
|
stack
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
7F8E0000
|
trusted library allocation
|
page execute and read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
4370000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
4640000
|
heap
|
page readonly
|
||
7FF848B90000
|
trusted library allocation
|
page read and write
|
||
2B46000
|
heap
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
7FF848B1A000
|
trusted library allocation
|
page read and write
|
||
2F89000
|
heap
|
page read and write
|
||
4404000
|
trusted library allocation
|
page read and write
|
||
17E2E29000
|
stack
|
page read and write
|
||
1DD52E8B000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1DD6B5F0000
|
heap
|
page execute and read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
6C70000
|
heap
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
4690000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1831CCD0000
|
heap
|
page read and write
|
||
17E233F000
|
stack
|
page read and write
|
||
82BE8FE000
|
stack
|
page read and write
|
||
1DD6BF07000
|
heap
|
page read and write
|
||
4C50000
|
heap
|
page readonly
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
82BEAFD000
|
stack
|
page read and write
|
||
281D8BA5000
|
heap
|
page read and write
|
||
4B6D000
|
trusted library allocation
|
page execute and read and write
|
||
17E3B39000
|
stack
|
page read and write
|
||
7FF848BC0000
|
trusted library allocation
|
page execute and read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
73896FB000
|
stack
|
page read and write
|
||
1DD6BEFD000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
1A39A2C3000
|
heap
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
1A3FF510000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1A0EB121000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
A9E000
|
stack
|
page read and write
|
||
17E1DFD000
|
stack
|
page read and write
|
||
4280000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
1A3919D1000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
73890FF000
|
stack
|
page read and write
|
||
7FF848BE6000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
1A0F39A0000
|
heap
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
7FF848980000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
ABAA9FE000
|
stack
|
page read and write
|
||
7FF848B3E000
|
trusted library allocation
|
page read and write
|
||
4526000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page execute and read and write
|
||
1DD5268C000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
7FF848B99000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43B0000
|
heap
|
page execute and read and write
|
||
66F0000
|
trusted library allocation
|
page execute and read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
1DD53419000
|
trusted library allocation
|
page read and write
|
||
43B4000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
2F79000
|
heap
|
page read and write
|
||
281D927F000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
26E5000
|
heap
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
4670000
|
trusted library allocation
|
page execute and read and write
|
||
4760000
|
trusted library allocation
|
page read and write
|
||
1DD52F23000
|
trusted library allocation
|
page read and write
|
||
1C717D05000
|
trusted library allocation
|
page read and write
|
||
281D8866000
|
heap
|
page read and write
|
||
2B5F000
|
heap
|
page read and write
|
||
82BF1FD000
|
stack
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
7FF848970000
|
trusted library allocation
|
page read and write
|
||
1A39A2FA000
|
heap
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
44ED000
|
trusted library allocation
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
2700000
|
trusted library allocation
|
page read and write
|
||
463F000
|
stack
|
page read and write
|
||
7FF84898B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8489A4000
|
trusted library allocation
|
page read and write
|
||
321E000
|
stack
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
4C3E000
|
stack
|
page read and write
|
||
42D0000
|
heap
|
page read and write
|
||
1A3FF0A0000
|
unkown
|
page readonly
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
27B9000
|
heap
|
page read and write
|
||
281D8770000
|
heap
|
page read and write
|
||
4576000
|
trusted library allocation
|
page read and write
|
||
6C2E000
|
stack
|
page read and write
|
||
6740000
|
trusted library allocation
|
page read and write
|
||
7FF84898D000
|
trusted library allocation
|
page execute and read and write
|
||
4550000
|
trusted library allocation
|
page read and write
|
||
281E9151000
|
trusted library allocation
|
page read and write
|
||
1A0DB15F000
|
trusted library allocation
|
page read and write
|
||
1A3FF358000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
7388FFF000
|
stack
|
page read and write
|
||
7FF848B90000
|
trusted library allocation
|
page read and write
|
||
26C0000
|
trusted library allocation
|
page read and write
|
||
6BA0000
|
heap
|
page execute and read and write
|
||
3F90000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
82BF2FE000
|
stack
|
page read and write
|
||
7FF848984000
|
trusted library allocation
|
page read and write
|
||
44F0000
|
trusted library section
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
2F7B000
|
heap
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
1C73045F000
|
heap
|
page read and write
|
||
7FF848962000
|
trusted library allocation
|
page read and write
|
||
281D92A5000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
1DD526AF000
|
heap
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1A39A2A8000
|
heap
|
page read and write
|
||
43F1000
|
trusted library allocation
|
page read and write
|
||
6B8E000
|
stack
|
page read and write
|
||
43D0000
|
trusted library allocation
|
page read and write
|
||
5781000
|
trusted library allocation
|
page read and write
|
||
2E3B000
|
stack
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
1A0F3A31000
|
heap
|
page read and write
|
||
1C717CF3000
|
trusted library allocation
|
page read and write
|
||
73892FE000
|
stack
|
page read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
7389BFC000
|
stack
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
trusted library allocation
|
page read and write
|
||
17E403D000
|
stack
|
page read and write
|
||
6C10000
|
remote allocation
|
page read and write
|
||
6C90000
|
heap
|
page read and write
|
||
6730000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
1C71738C000
|
heap
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
1DD6BA28000
|
heap
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
73897FE000
|
stack
|
page read and write
|
||
7FF84899D000
|
trusted library allocation
|
page execute and read and write
|
||
5495000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
437B000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
1A0DAAE0000
|
heap
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
281D8FF0000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1A3FF39B000
|
heap
|
page read and write
|
||
66E0000
|
trusted library allocation
|
page read and write
|
||
7F680000
|
trusted library allocation
|
page execute and read and write
|
||
1A3819B0000
|
heap
|
page execute and read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
6C10000
|
remote allocation
|
page read and write
|
||
6CCD000
|
heap
|
page read and write
|
||
4260000
|
trusted library allocation
|
page read and write
|
||
7FF848A60000
|
trusted library allocation
|
page execute and read and write
|
||
1DD6BB70000
|
heap
|
page read and write
|
||
7FF84896D000
|
trusted library allocation
|
page execute and read and write
|
||
58C000
|
stack
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
6629000
|
trusted library allocation
|
page execute and read and write
|
||
40C0000
|
trusted library allocation
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
7FF848964000
|
trusted library allocation
|
page read and write
|
||
66BC000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
7FF848B06000
|
trusted library allocation
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
17E393D000
|
stack
|
page read and write
|
||
7050000
|
trusted library allocation
|
page execute and read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
7FF848B50000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
1DD53417000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
7FF848B20000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
7388BFE000
|
stack
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
2E78000
|
stack
|
page read and write
|
||
1A0DB271000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
7FF848A3C000
|
trusted library allocation
|
page execute and read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
7FF848C30000
|
trusted library allocation
|
page read and write
|
||
3555000
|
heap
|
page read and write
|
||
281D92A1000
|
trusted library allocation
|
page read and write
|
||
27AC000
|
heap
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
1DD525C0000
|
heap
|
page read and write
|
||
1C730411000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
7FF848B00000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
7FF84899C000
|
trusted library allocation
|
page execute and read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
4582000
|
trusted library allocation
|
page read and write
|
||
41E0000
|
trusted library allocation
|
page execute and read and write
|
||
1C717520000
|
unkown
|
page readonly
|
||
17E22E9000
|
stack
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
452B000
|
trusted library allocation
|
page read and write
|
||
7FF8489AB000
|
trusted library allocation
|
page execute and read and write
|
||
1A3919DF000
|
trusted library allocation
|
page read and write
|
||
7388DFE000
|
stack
|
page read and write
|
||
17E3329000
|
stack
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
277B000
|
heap
|
page read and write
|
||
1DD525A0000
|
heap
|
page read and write
|
||
281D9099000
|
heap
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
475E000
|
stack
|
page read and write
|
||
68CE000
|
stack
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
25E5000
|
heap
|
page read and write
|
||
ABAA6FD000
|
stack
|
page read and write
|
||
1DD52F10000
|
trusted library allocation
|
page read and write
|
||
7FF848A66000
|
trusted library allocation
|
page execute and read and write
|
||
2702000
|
trusted library allocation
|
page read and write
|
||
1DD53121000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
4373000
|
trusted library allocation
|
page read and write
|
||
7FF848BA0000
|
trusted library allocation
|
page execute and read and write
|
||
1A3FF350000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
7FF848B25000
|
trusted library allocation
|
page read and write
|
||
2779000
|
heap
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
7FF848B26000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
284C000
|
heap
|
page read and write
|
||
4395000
|
trusted library allocation
|
page read and write
|
||
1DD6B5BE000
|
heap
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
40E0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
4555000
|
trusted library allocation
|
page read and write
|
||
6790000
|
remote allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1A39A230000
|
heap
|
page read and write
|
||
32DE000
|
stack
|
page read and write
|
||
7FF848B4D000
|
trusted library allocation
|
page read and write
|
||
10A00F1000
|
stack
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
7F6B8000
|
trusted library allocation
|
page execute and read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
7180000
|
trusted library allocation
|
page read and write
|
||
40C2000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
1A0DA8B0000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
10A04FD000
|
stack
|
page read and write
|
||
7FF848AF0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
26F9000
|
heap
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
698D000
|
stack
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
1DD52ED9000
|
trusted library allocation
|
page read and write
|
||
85B000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
1A3FF150000
|
heap
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
7180000
|
trusted library allocation
|
page read and write
|
||
4376000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
7F6A0000
|
trusted library allocation
|
page execute and read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
1DD53485000
|
trusted library allocation
|
page read and write
|
||
44E1000
|
trusted library allocation
|
page read and write
|
||
6B80000
|
trusted library allocation
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
4BE000
|
stack
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
6C8F000
|
stack
|
page read and write
|
||
1DD52FCA000
|
trusted library allocation
|
page read and write
|
||
82BE6F0000
|
stack
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
2704000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
1DD6BAAE000
|
heap
|
page read and write
|
||
47AE000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
1C717CDC000
|
trusted library allocation
|
page read and write
|
||
7FF848A40000
|
trusted library allocation
|
page execute and read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
17E353E000
|
stack
|
page read and write
|
||
4560000
|
trusted library allocation
|
page read and write
|
||
1A3FF624000
|
unkown
|
page readonly
|
||
6CCD000
|
heap
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
29A0000
|
heap
|
page read and write
|
||
1DD6BA4F000
|
heap
|
page read and write
|
||
2EEA000
|
heap
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
7FF848D10000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
1DD6B4F0000
|
heap
|
page read and write
|
||
82F000
|
heap
|
page read and write
|
||
7FF848963000
|
trusted library allocation
|
page execute and read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
281D88D1000
|
heap
|
page read and write
|
||
1DD6B4FE000
|
heap
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
2F0C000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66F1000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
32F7000
|
heap
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
7FF848C80000
|
trusted library allocation
|
page read and write
|
||
7FF8489DC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8489F6000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
1DD534A5000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
7180000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
7FF848B70000
|
trusted library allocation
|
page read and write
|
||
29E0000
|
trusted library allocation
|
page execute and read and write
|
||
1A0DB275000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
7FF8489DC000
|
trusted library allocation
|
page execute and read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
7389EFB000
|
stack
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
26E0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
2F12000
|
heap
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
7FF848943000
|
trusted library allocation
|
page execute and read and write
|
||
7FF84898D000
|
trusted library allocation
|
page execute and read and write
|
||
2741000
|
heap
|
page read and write
|
||
7180000
|
trusted library allocation
|
page read and write
|
||
4320000
|
trusted library allocation
|
page execute and read and write
|
||
10A08FE000
|
stack
|
page read and write
|
||
6CCC000
|
stack
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
7FF848B70000
|
trusted library allocation
|
page read and write
|
||
82BEBFF000
|
stack
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
7FF848C00000
|
trusted library allocation
|
page execute and read and write
|
||
7389FFB000
|
stack
|
page read and write
|
||
690E000
|
stack
|
page read and write
|
||
281D9075000
|
heap
|
page read and write
|
||
47FF000
|
stack
|
page read and write
|
||
4420000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
1C71732C000
|
heap
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
7FF8489F0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
1831CD28000
|
heap
|
page read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
17E2B2D000
|
stack
|
page read and write
|
||
1C717170000
|
unkown
|
page readonly
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
1A3FF33C000
|
heap
|
page read and write
|
||
1DD534A1000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
7FF848940000
|
trusted library allocation
|
page read and write
|
||
7FF848B79000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
1DD6BA60000
|
heap
|
page read and write
|
||
1DD6BEA6000
|
heap
|
page read and write
|
||
266E000
|
stack
|
page read and write
|
||
1DD53266000
|
trusted library allocation
|
page read and write
|
||
6B80000
|
trusted library allocation
|
page read and write
|
||
2853000
|
heap
|
page read and write
|
||
281D918B000
|
trusted library allocation
|
page read and write
|
||
4399000
|
trusted library allocation
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
7FF848B50000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
17E3229000
|
stack
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
7FF848B75000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
7FF848BA0000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
278E000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
4781000
|
trusted library allocation
|
page read and write
|
||
7FF848983000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848BA0000
|
trusted library allocation
|
page execute and read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
1A3FF515000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
817000
|
heap
|
page read and write
|
||
852000
|
heap
|
page read and write
|
||
7FF848B20000
|
trusted library allocation
|
page read and write
|
||
43D0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
1DD52C70000
|
heap
|
page read and write
|
||
1DD53494000
|
trusted library allocation
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
2F68000
|
heap
|
page read and write
|
||
1DD6B970000
|
heap
|
page execute and read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
1DD52697000
|
heap
|
page read and write
|
||
1DD6BABC000
|
heap
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
7FF848B00000
|
trusted library allocation
|
page read and write
|
||
6650000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
6B00000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
1C727BC1000
|
trusted library allocation
|
page read and write
|
||
1831CCF0000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
1DD53006000
|
trusted library allocation
|
page read and write
|
||
17E2C2A000
|
stack
|
page read and write
|
||
1A3819C0000
|
heap
|
page read and write
|
||
1A0DA9E3000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
281E915D000
|
trusted library allocation
|
page read and write
|
||
6C10000
|
remote allocation
|
page read and write
|
||
1A0DAD80000
|
heap
|
page read and write
|
||
1DD53411000
|
trusted library allocation
|
page read and write
|
||
4328000
|
trusted library allocation
|
page read and write
|
||
1A3817F0000
|
trusted library allocation
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
26ED000
|
heap
|
page read and write
|
||
7388CFF000
|
stack
|
page read and write
|
||
1DD52FF6000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
1A381960000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
4279000
|
trusted library allocation
|
page execute and read and write
|
||
1DD52E96000
|
trusted library allocation
|
page read and write
|
||
1DD53165000
|
trusted library allocation
|
page read and write
|
||
43C2000
|
trusted library allocation
|
page read and write
|
||
7FF848B20000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
68AF000
|
stack
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
26C0000
|
heap
|
page read and write
|
||
7FF848980000
|
trusted library allocation
|
page read and write
|
||
4420000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
7FF848B90000
|
trusted library allocation
|
page read and write
|
||
847000
|
heap
|
page read and write
|
||
7FF848990000
|
trusted library allocation
|
page read and write
|
||
6626000
|
trusted library allocation
|
page execute and read and write
|
||
4680000
|
trusted library allocation
|
page read and write
|
||
26DD000
|
trusted library allocation
|
page execute and read and write
|
||
1A0DAD00000
|
heap
|
page execute and read and write
|
||
1A3FF592000
|
unkown
|
page readonly
|
||
4341000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1A39A2A5000
|
heap
|
page read and write
|
||
1DD534A3000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
7FF848960000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
7FF848BA0000
|
trusted library allocation
|
page execute and read and write
|
||
17E1B3D000
|
stack
|
page read and write
|
||
1A39A31D000
|
heap
|
page read and write
|
||
43E4000
|
trusted library allocation
|
page read and write
|
||
1A0DAAC0000
|
heap
|
page read and write
|
||
10A03FE000
|
stack
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
1C717585000
|
heap
|
page read and write
|
||
7FF848BC0000
|
trusted library allocation
|
page read and write
|
||
25EE000
|
stack
|
page read and write
|
||
1A3FF230000
|
heap
|
page read and write
|
||
1A381B48000
|
trusted library allocation
|
page read and write
|
||
1DD52EF8000
|
trusted library allocation
|
page read and write
|
||
1DD534D3000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
1DD5340F000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
7FF84897D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1A3FF35C000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
7FF848A20000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848B00000
|
trusted library allocation
|
page read and write
|
||
7FF848A36000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
1A0DB24F000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
847000
|
heap
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
1DD5349F000
|
trusted library allocation
|
page read and write
|
||
2B0C000
|
heap
|
page read and write
|
||
2737000
|
heap
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
487F000
|
stack
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
17E293D000
|
stack
|
page read and write
|
||
7FF8489FC000
|
trusted library allocation
|
page execute and read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
7FF848B17000
|
trusted library allocation
|
page read and write
|
||
458B000
|
trusted library allocation
|
page execute and read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
1A39A555000
|
heap
|
page read and write
|
||
425E000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
43BF000
|
stack
|
page read and write
|
||
5491000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
730E000
|
stack
|
page read and write
|
||
7140000
|
trusted library allocation
|
page read and write
|
||
1C7173E9000
|
heap
|
page read and write
|
||
84A000
|
heap
|
page read and write
|
||
67A0000
|
heap
|
page execute and read and write
|
||
5D5000
|
heap
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
1C730590000
|
heap
|
page execute and read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
6D0E000
|
stack
|
page read and write
|
||
1A0F3A1B000
|
heap
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
1DD6BA09000
|
heap
|
page read and write
|
||
29AE000
|
stack
|
page read and write
|
||
43B7000
|
heap
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
1DD5310A000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
281D8750000
|
heap
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
662C000
|
trusted library allocation
|
page execute and read and write
|
||
281D9097000
|
heap
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
694E000
|
stack
|
page read and write
|
||
44DF000
|
trusted library allocation
|
page read and write
|
||
ABAACFE000
|
stack
|
page read and write
|
||
6730000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
430E000
|
stack
|
page read and write
|
||
711C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848C40000
|
trusted library allocation
|
page read and write
|
||
68ED000
|
stack
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
26ED000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
27A4000
|
heap
|
page read and write
|
||
4420000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
1DD526BB000
|
heap
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
720E000
|
stack
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
52E1000
|
trusted library allocation
|
page read and write
|
||
1A0DA9E7000
|
heap
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
41EC000
|
stack
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
2F9A000
|
heap
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page read and write
|
||
857000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
4188000
|
trusted library allocation
|
page read and write
|
||
17E383F000
|
stack
|
page read and write
|
||
7FF848BA0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
281D927C000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
7FF848AA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF84899D000
|
trusted library allocation
|
page execute and read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
278A000
|
heap
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
1C727BBD000
|
trusted library allocation
|
page read and write
|
||
27C3000
|
heap
|
page read and write
|
||
281D8DA0000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
728E000
|
stack
|
page read and write
|
||
4276000
|
trusted library allocation
|
page execute and read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
40A4000
|
trusted library allocation
|
page read and write
|
||
1DD62E31000
|
trusted library allocation
|
page read and write
|
||
7FF84896B000
|
trusted library allocation
|
page execute and read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
1DD6B9FC000
|
heap
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
7FF848B1C000
|
trusted library allocation
|
page read and write
|
||
ABAA2FE000
|
stack
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
7120000
|
trusted library allocation
|
page read and write
|
||
43D0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1DD6BEB2000
|
heap
|
page read and write
|
||
4770000
|
heap
|
page execute and read and write
|
||
800000
|
heap
|
page read and write
|
||
7FF848963000
|
trusted library allocation
|
page execute and read and write
|
||
2837000
|
heap
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
1DD6BE9E000
|
heap
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
409D000
|
trusted library allocation
|
page execute and read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
1A3817D0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
7FF8489A4000
|
trusted library allocation
|
page read and write
|
||
6730000
|
trusted library allocation
|
page read and write
|
||
2741000
|
heap
|
page read and write
|
||
7FF8489A0000
|
trusted library allocation
|
page read and write
|
||
471E000
|
stack
|
page read and write
|
||
25E0000
|
heap
|
page read and write
|
||
7F8F8000
|
trusted library allocation
|
page execute and read and write
|
||
1DD52EED000
|
trusted library allocation
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
1DD52F00000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
2795000
|
heap
|
page read and write
|
||
1A0DABF0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
4500000
|
heap
|
page read and write
|
||
3025000
|
heap
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
17E3429000
|
stack
|
page read and write
|
||
1A381B42000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1A0DA9C8000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
2F26000
|
heap
|
page read and write
|
||
1DD530EF000
|
trusted library allocation
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
3550000
|
heap
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
7388EFC000
|
stack
|
page read and write
|
||
1A3FF360000
|
heap
|
page read and write
|
||
281D9140000
|
heap
|
page read and write
|
||
1A39A54D000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
281D90F0000
|
heap
|
page execute and read and write
|
||
6620000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
2B28000
|
heap
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
7FF848A46000
|
trusted library allocation
|
page execute and read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
7FF848953000
|
trusted library allocation
|
page read and write
|
||
10A0BFE000
|
stack
|
page read and write
|
||
7FF848B50000
|
trusted library allocation
|
page read and write
|
||
10A0AFF000
|
stack
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
7FF848944000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
6B2E000
|
stack
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
262D000
|
stack
|
page read and write
|
||
7FF848C60000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
2737000
|
heap
|
page read and write
|
||
6C8A000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
1A39A56F000
|
heap
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
1A0DA9DF000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1A0DA9FB000
|
heap
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
43A5000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
26E1000
|
heap
|
page read and write
|
||
7FF848C70000
|
trusted library allocation
|
page read and write
|
||
1A39A0D0000
|
heap
|
page execute and read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
6790000
|
remote allocation
|
page read and write
|
||
7FF848982000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
1A0DAD70000
|
heap
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
2E8F000
|
stack
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
26AE000
|
stack
|
page read and write
|
||
7FF848BF0000
|
trusted library allocation
|
page read and write
|
||
ABAADFD000
|
stack
|
page read and write
|
||
26D3000
|
trusted library allocation
|
page execute and read and write
|
||
4094000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
7FF848A1C000
|
trusted library allocation
|
page execute and read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
17E247B000
|
stack
|
page read and write
|
||
4395000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
7FF848B70000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
1A39A560000
|
heap
|
page read and write
|
||
2F45000
|
heap
|
page read and write
|
||
6CB9000
|
heap
|
page read and write
|
||
4B64000
|
trusted library allocation
|
page read and write
|
||
7FF848AFE000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
7FF848B80000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
A1E000
|
unkown
|
page read and write
|
||
1DD53413000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
1C717B00000
|
heap
|
page execute and read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
2F68000
|
heap
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
177000
|
stack
|
page read and write
|
||
1C730481000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
46DE000
|
stack
|
page read and write
|
||
281D8827000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
7FF848984000
|
trusted library allocation
|
page read and write
|
||
2704000
|
heap
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
7110000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
7FF848A16000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
1A0DAC05000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1A0F3A36000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
26F9000
|
heap
|
page read and write
|
||
7FF848B3D000
|
trusted library allocation
|
page read and write
|
||
4480000
|
heap
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
27B9000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1DD6B9B7000
|
heap
|
page read and write
|
||
2707000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
7FF848A20000
|
trusted library allocation
|
page execute and read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
7FF848A30000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
ABAA7FF000
|
stack
|
page read and write
|
||
17E2A3D000
|
stack
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
483E000
|
stack
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
313D000
|
stack
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
7FF84898D000
|
trusted library allocation
|
page execute and read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
7FF848AA0000
|
trusted library allocation
|
page execute and read and write
|
||
1C717420000
|
heap
|
page read and write
|
||
1DD53264000
|
trusted library allocation
|
page read and write
|
||
1DD6BE9A000
|
heap
|
page read and write
|
||
1C717353000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
4210000
|
heap
|
page execute and read and write
|
||
7FF848B06000
|
trusted library allocation
|
page read and write
|
||
420D000
|
trusted library allocation
|
page execute and read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
4394000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
42C0000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page execute and read and write
|
||
1A3FF250000
|
heap
|
page read and write
|
||
82BECFE000
|
stack
|
page read and write
|
||
7FF8489BC000
|
trusted library allocation
|
page execute and read and write
|
||
66F1000
|
trusted library allocation
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1DD5308C000
|
trusted library allocation
|
page read and write
|
||
455D000
|
trusted library allocation
|
page execute and read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
276E000
|
stack
|
page read and write
|
||
4B9B000
|
trusted library allocation
|
page execute and read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
7389AFD000
|
stack
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
281E9161000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
7FF848B80000
|
trusted library allocation
|
page execute and read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
1A39A233000
|
heap
|
page read and write
|
||
7FF848BD0000
|
trusted library allocation
|
page execute and read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
13B000
|
stack
|
page read and write
|
||
1DD6B9EA000
|
heap
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
1A39A56A000
|
heap
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
43EE000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
82BEEFE000
|
stack
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1DD525E0000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
7FF8489AD000
|
trusted library allocation
|
page execute and read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
2DED000
|
stack
|
page read and write
|
||
66F4000
|
trusted library allocation
|
page read and write
|
||
1DD52840000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
439C000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
2707000
|
heap
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
2877000
|
stack
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
2A2E000
|
stack
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
4B5D000
|
heap
|
page read and write
|
||
7FF848B03000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
307D000
|
stack
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
17E20FE000
|
stack
|
page read and write
|
||
6C4E000
|
stack
|
page read and write
|
||
1C717510000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
1DD6B9C0000
|
heap
|
page read and write
|
||
10A06FE000
|
stack
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1DD6BE90000
|
heap
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
42CE000
|
stack
|
page read and write
|
||
1C717365000
|
heap
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
1C7303CC000
|
unkown
|
page readonly
|
||
66E0000
|
trusted library allocation
|
page read and write
|
||
7FF848A10000
|
trusted library allocation
|
page read and write
|
||
4C40000
|
heap
|
page execute and read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
4B40000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
4572000
|
trusted library allocation
|
page read and write
|
||
ABAA5FF000
|
stack
|
page read and write
|
||
43E1000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
27C6000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
17E1FFE000
|
stack
|
page read and write
|
||
7FF848993000
|
trusted library allocation
|
page read and write
|
||
10A02FF000
|
stack
|
page read and write
|
||
853000
|
heap
|
page read and write
|
||
7FF848BB0000
|
trusted library allocation
|
page execute and read and write
|
||
2B04000
|
heap
|
page read and write
|
||
1831CD20000
|
heap
|
page read and write
|
||
6790000
|
remote allocation
|
page read and write
|
||
432F000
|
trusted library allocation
|
page read and write
|
||
1DD52615000
|
heap
|
page read and write
|
||
1DD6AE30000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
29B8000
|
trusted library allocation
|
page read and write
|
||
2660000
|
heap
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
2770000
|
heap
|
page readonly
|
||
10A0CFE000
|
stack
|
page read and write
|
||
2B1A000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
6623000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
7FF848BB0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
1DD52FC6000
|
trusted library allocation
|
page read and write
|
||
1A3FF0C4000
|
unkown
|
page readonly
|
||
4564000
|
trusted library allocation
|
page read and write
|
||
7FF848B90000
|
trusted library allocation
|
page execute and read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
281D8790000
|
heap
|
page read and write
|
||
1A0DB24C000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
1DD62E43000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
7FF848AE0000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
1DD6BC30000
|
heap
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
281D8864000
|
heap
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
17E3A29000
|
stack
|
page read and write
|
||
1A0DB15D000
|
trusted library allocation
|
page read and write
|
||
2827000
|
heap
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
1C727BB1000
|
trusted library allocation
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
1DD53104000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
43A0000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
There are 2073 hidden memdumps, click here to show them.