Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Sterownik do drukarki TPCL-drv_2021.3_M-0_E (1).exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\0x0409.ini (copy)
|
Unicode text, UTF-16, little-endian text, with very long lines (308), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\0x08548.tmp
|
Unicode text, UTF-16, little-endian text, with very long lines (308), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\ISS8518.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\ISSetup.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\dat8459.tmp
|
InstallShield CAB
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\dat846A.tmp
|
InstallShield CAB
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\data1.cab (copy)
|
InstallShield CAB
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\data1.hdr (copy)
|
InstallShield CAB
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\lay8458.tmp
|
data
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\layout.bin (copy)
|
data
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\set84AA.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\set8558.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\setup.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\setup.ilg (copy)
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\setup.ini
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\TOSHIBA TEC\TPCL Printer Driver\Driver Wizard.lnk
|
MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600,
atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\TOSHIBA TEC\TPCL Printer Driver\PnP Recovery.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has command line arguments, Archive,
ctime=Mon Nov 25 08:26:54 2024, mtime=Mon Nov 25 08:26:54 2024, atime=Tue Dec 14 18:58:52 2021, length=3103448, window=hide
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\TOSHIBA TEC\TPCL Printer Driver\TECDRVIn.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Normal,
ctime=Mon Nov 25 08:26:51 2024, mtime=Mon Nov 25 08:26:54 2024, atime=Wed Oct 6 15:45:44 2010, length=192512, window=hide
|
dropped
|
||
C:\TEC_DRV\Common\Def8579.tmp
|
Unicode text, UTF-8 text, with very long lines (361), with CRLF line terminators
|
dropped
|
||
C:\TEC_DRV\Common\Defaults[TT]_2021.3.0.0.sds (copy)
|
Unicode text, UTF-8 text, with very long lines (361), with CRLF line terminators
|
dropped
|
||
C:\TEC_DRV\Common\t2s8599.tmp
|
Windows setup INFormation
|
dropped
|
||
C:\TEC_DRV\Common\t2s85AA.tmp
|
MS Windows HtmlHelp Data
|
dropped
|
||
C:\TEC_DRV\Common\t2sTT_2021.3.0.0.ini (copy)
|
Windows setup INFormation
|
dropped
|
||
C:\TEC_DRV\Common\t2sTTenu_2021.3.0.0.chm (copy)
|
MS Windows HtmlHelp Data
|
dropped
|
||
C:\TEC_DRV\Common\tec85CA.tmp
|
Windows setup INFormation
|
dropped
|
||
C:\TEC_DRV\Common\tec85CB.tmp
|
MS Windows HtmlHelp Data
|
dropped
|
||
C:\TEC_DRV\Common\tecTT_2021.3.0.0.ini (copy)
|
Windows setup INFormation
|
dropped
|
||
C:\TEC_DRV\Common\tecTTenu_2021.3.0.0.chm (copy)
|
MS Windows HtmlHelp Data
|
dropped
|
||
C:\TEC_DRV\Common\tt#85DB.tmp
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\TEC_DRV\Common\tt#8698.tmp
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\TEC_DRV\Common\tt#86A9.tmp
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\TEC_DRV\Common\tt#base_2021.3.0.0.ddz (copy)
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\TEC_DRV\Common\tt#t2s_2021.3.0.0.ddz (copy)
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\TEC_DRV\Common\tt#tec_2021.3.0.0.ddz (copy)
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\TEC_DRV\Dri8749.tmp
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\TEC_DRV\Dri91BA.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\TEC_DRV\Dri9276.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\TEC_DRV\DriverWizard.ddz (copy)
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\TEC_DRV\DriverWizard.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\TEC_DRV\DriverWizard.ini (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\TEC_DRV\Ins9277.tmp
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\TEC_DRV\Installation_Instructions.html (copy)
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\TEC_DRV\Por9288.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\TEC_DRV\PortHelperWow64.exe (copy)
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\TEC_DRV\Sea9298.tmp
|
Certificate, Version=3
|
dropped
|
||
C:\TEC_DRV\SeagullPublisher.cer (copy)
|
Certificate, Version=3
|
dropped
|
||
C:\TEC_DRV\TEC8717.tmp (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\TEC_DRV\TEC8718.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\TEC_DRV\TEC8729.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\TEC_DRV\TECDRVIn.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\TEC_DRV\TOS92AA.tmp
|
Windows setup INFormation
|
dropped
|
||
C:\TEC_DRV\TOSHIBATEC.inf (copy)
|
Windows setup INFormation
|
dropped
|
||
C:\TEC_DRV\Win32\Sea93E9.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\TEC_DRV\Win32\Sea9418.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\TEC_DRV\Win32\Sea9439.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\TEC_DRV\Win32\Seagull_V3_ConfigDispatcher.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\TEC_DRV\Win32\Seagull_V3_NetMonDispatcher.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\TEC_DRV\Win32\Seagull_V3_PrintDispatcher.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\TEC_DRV\Win32\tt#92CC.tmp
|
Microsoft Cabinet archive data, many, 5511341 bytes, 18 files, at 0x2c +A "Seagull_DriverCore.dll" +A "Seagull_ConfigBase.dll",
number 1, 387 datablocks, 0x1 compression
|
dropped
|
||
C:\TEC_DRV\Win32\tt#9389.tmp
|
Microsoft Cabinet archive data, many, 54849 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_T2S.dll" +A "Seagull_PrintModule_T2S.dll",
number 1, 4 datablocks, 0x1 compression
|
dropped
|
||
C:\TEC_DRV\Win32\tt#93C8.tmp
|
Microsoft Cabinet archive data, many, 169505 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_TEC.dll" +A "Seagull_PrintModule_TEC.dll",
number 1, 14 datablocks, 0x1 compression
|
dropped
|
||
C:\TEC_DRV\Win32\tt#base_2021.3.0.0.cab (copy)
|
Microsoft Cabinet archive data, many, 5511341 bytes, 18 files, at 0x2c +A "Seagull_DriverCore.dll" +A "Seagull_ConfigBase.dll",
number 1, 387 datablocks, 0x1 compression
|
dropped
|
||
C:\TEC_DRV\Win32\tt#t2s_2021.3.0.0.cab (copy)
|
Microsoft Cabinet archive data, many, 54849 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_T2S.dll" +A "Seagull_PrintModule_T2S.dll",
number 1, 4 datablocks, 0x1 compression
|
dropped
|
||
C:\TEC_DRV\Win32\tt#tec_2021.3.0.0.cab (copy)
|
Microsoft Cabinet archive data, many, 169505 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_TEC.dll" +A "Seagull_PrintModule_TEC.dll",
number 1, 14 datablocks, 0x1 compression
|
dropped
|
||
C:\TEC_DRV\lic92AB.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252
|
dropped
|
||
C:\TEC_DRV\licTTenu.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252
|
dropped
|
||
C:\TEC_DRV\tos92BC.tmp
|
data
|
dropped
|
||
C:\TEC_DRV\toshibatec.cat (copy)
|
data
|
dropped
|
||
C:\TEC_DRV\x64\Sea970B.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\TEC_DRV\x64\Sea97A9.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
modified
|
||
C:\TEC_DRV\x64\Sea97D9.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\TEC_DRV\x64\Seagull_V3_ConfigDispatcher.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\TEC_DRV\x64\Seagull_V3_NetMonDispatcher.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\TEC_DRV\x64\Seagull_V3_PrintDispatcher.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\TEC_DRV\x64\tt#9469.tmp
|
Microsoft Cabinet archive data, many, 6435532 bytes, 18 files, at 0x2c +A "Seagull_DriverCore.dll" +A "Seagull_ConfigBase.dll",
number 1, 436 datablocks, 0x1 compression
|
dropped
|
||
C:\TEC_DRV\x64\tt#95B2.tmp
|
Microsoft Cabinet archive data, many, 56090 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_T2S.dll" +A "Seagull_PrintModule_T2S.dll",
number 1, 5 datablocks, 0x1 compression
|
dropped
|
||
C:\TEC_DRV\x64\tt#95F1.tmp
|
Microsoft Cabinet archive data, many, 171484 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_TEC.dll" +A "Seagull_PrintModule_TEC.dll",
number 1, 14 datablocks, 0x1 compression
|
dropped
|
||
C:\TEC_DRV\x64\tt#base_2021.3.0.0.cab (copy)
|
Microsoft Cabinet archive data, many, 6435532 bytes, 18 files, at 0x2c +A "Seagull_DriverCore.dll" +A "Seagull_ConfigBase.dll",
number 1, 436 datablocks, 0x1 compression
|
dropped
|
||
C:\TEC_DRV\x64\tt#t2s_2021.3.0.0.cab (copy)
|
Microsoft Cabinet archive data, many, 56090 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_T2S.dll" +A "Seagull_PrintModule_T2S.dll",
number 1, 5 datablocks, 0x1 compression
|
dropped
|
||
C:\TEC_DRV\x64\tt#tec_2021.3.0.0.cab (copy)
|
Microsoft Cabinet archive data, many, 171484 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_TEC.dll" +A "Seagull_PrintModule_TEC.dll",
number 1, 14 datablocks, 0x1 compression
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\7F7.tmp
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\Defaults[TT]_2021.3.0.0.sds (copy)
|
Unicode text, UTF-8 text, with very long lines (361), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\SET9AB2.tmp
|
MS Windows HtmlHelp Data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\SET9AF1.tmp
|
Windows setup INFormation
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\SET9B02.tmp
|
Windows setup INFormation
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\SET9B22.tmp
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\SET9B33.tmp
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\SET9B53.tmp
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\SET9BD1.tmp
|
Unicode text, UTF-8 text, with very long lines (361), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\SET9BE2.tmp
|
MS Windows HtmlHelp Data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\t2sTT_2021.3.0.0.ini (copy)
|
Windows setup INFormation
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\t2sTTenu_2021.3.0.0.chm (copy)
|
MS Windows HtmlHelp Data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\tecTT_2021.3.0.0.ini (copy)
|
Windows setup INFormation
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\tecTTenu_2021.3.0.0.chm (copy)
|
MS Windows HtmlHelp Data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\tt#base_2021.3.0.0.ddz (copy)
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\tt#t2s_2021.3.0.0.ddz (copy)
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\tt#tec_2021.3.0.0.ddz (copy)
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\SET9DCD.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\SET9DED.tmp
|
Windows setup INFormation
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\TOSHIBATEC.cat (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\TOSHIBATEC.inf (copy)
|
Windows setup INFormation
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\x64\SET9C31.tmp
|
Microsoft Cabinet archive data, many, 56090 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_T2S.dll" +A "Seagull_PrintModule_T2S.dll",
number 1, 5 datablocks, 0x1 compression
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\x64\SET9C70.tmp
|
Microsoft Cabinet archive data, many, 171484 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_TEC.dll" +A "Seagull_PrintModule_TEC.dll",
number 1, 14 datablocks, 0x1 compression
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\x64\SET9C91.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\x64\SET9CB1.tmp
|
Microsoft Cabinet archive data, many, 6435532 bytes, 18 files, at 0x2c +A "Seagull_DriverCore.dll" +A "Seagull_ConfigBase.dll",
number 1, 436 datablocks, 0x1 compression
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\x64\SET9D6D.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\x64\SET9D9D.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\x64\Seagull_V3_ConfigDispatcher.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\x64\Seagull_V3_NetMonDispatcher.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\x64\Seagull_V3_PrintDispatcher.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\x64\tt#base_2021.3.0.0.cab (copy)
|
Microsoft Cabinet archive data, many, 6435532 bytes, 18 files, at 0x2c +A "Seagull_DriverCore.dll" +A "Seagull_ConfigBase.dll",
number 1, 436 datablocks, 0x1 compression
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\x64\tt#t2s_2021.3.0.0.cab (copy)
|
Microsoft Cabinet archive data, many, 56090 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_T2S.dll" +A "Seagull_PrintModule_T2S.dll",
number 1, 5 datablocks, 0x1 compression
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\x64\tt#tec_2021.3.0.0.cab (copy)
|
Microsoft Cabinet archive data, many, 171484 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_TEC.dll" +A "Seagull_PrintModule_TEC.dll",
number 1, 14 datablocks, 0x1 compression
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISB87C.tmp
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe (copy)
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\cor84A.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\corecomp.ini (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\dot86B.tmp
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\dot86C.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\dotnetinstaller.exe (copy)
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\dotnetinstaller.exe.config (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\DIF849.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\DIFxData.ini
(copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\Fon839.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\FontData.ini
(copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\Lic838.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\License.rtf
(copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\Str89D.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\StringTable_0x0409.ips
(copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\_is9C8.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\_isres_0x0409.dll
(copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\def9C7.tmp
|
RIFF (little-endian) data, palette, 1168 bytes, data size 1028, 256 entries, extra bytes 0x6f66666c
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\default.pal
(copy)
|
RIFF (little-endian) data, palette, 1168 bytes, data size 1028, 256 entries, extra bytes 0x6f66666c
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\isr8CC.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\isrt.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\set818.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\setup.inx (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\0x0409.ini
|
Unicode text, UTF-16, little-endian text, with very long lines (308), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\Disk1\0x0409.ini
|
Unicode text, UTF-16, little-endian text, with very long lines (308), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\Disk1\ISSetup.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\Disk1\data1.cab
|
InstallShield CAB
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\Disk1\data1.hdr
|
InstallShield CAB
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\Disk1\layout.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\Disk1\setup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\Disk1\setup.ini
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\ISSetup.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\setup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\setup.ini
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Windows\INF\oem4.inf
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\INF\setupapi.dev.log
|
Generic INItialization configuration [BeginLog]
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\Defaults[TT]_2021.3.0.0.sds (copy)
|
Unicode text, UTF-8 text, with very long lines (361), with CRLF line terminators
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\SETA5CE.tmp
|
MS Windows HtmlHelp Data
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\SETA61D.tmp
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\SETA63D.tmp
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\SETA65D.tmp
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\SETA70A.tmp
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\SETA759.tmp
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\SETA845.tmp
|
Unicode text, UTF-8 text, with very long lines (361), with CRLF line terminators
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\SETA901.tmp
|
MS Windows HtmlHelp Data
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\t2sTT_2021.3.0.0.ini (copy)
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\t2sTTenu_2021.3.0.0.chm (copy)
|
MS Windows HtmlHelp Data
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\tecTT_2021.3.0.0.ini (copy)
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\tecTTenu_2021.3.0.0.chm (copy)
|
MS Windows HtmlHelp Data
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\tt#base_2021.3.0.0.ddz (copy)
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\tt#t2s_2021.3.0.0.ddz (copy)
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\tt#tec_2021.3.0.0.ddz (copy)
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\SETAD6D.tmp
|
data
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\SETAD7E.tmp
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\TOSHIBATEC.cat (copy)
|
data
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\TOSHIBATEC.inf (copy)
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\x64\SETA960.tmp
|
Microsoft Cabinet archive data, many, 56090 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_T2S.dll" +A "Seagull_PrintModule_T2S.dll",
number 1, 5 datablocks, 0x1 compression
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\x64\SETA9FD.tmp
|
Microsoft Cabinet archive data, many, 171484 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_TEC.dll" +A "Seagull_PrintModule_TEC.dll",
number 1, 14 datablocks, 0x1 compression
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\x64\SETAA4C.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\x64\SETAA6C.tmp
|
Microsoft Cabinet archive data, many, 6435532 bytes, 18 files, at 0x2c +A "Seagull_DriverCore.dll" +A "Seagull_ConfigBase.dll",
number 1, 436 datablocks, 0x1 compression
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\x64\SETAB0A.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\x64\SETAD2E.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\x64\Seagull_V3_ConfigDispatcher.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\x64\Seagull_V3_NetMonDispatcher.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\x64\Seagull_V3_PrintDispatcher.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\x64\tt#base_2021.3.0.0.cab (copy)
|
Microsoft Cabinet archive data, many, 6435532 bytes, 18 files, at 0x2c +A "Seagull_DriverCore.dll" +A "Seagull_ConfigBase.dll",
number 1, 436 datablocks, 0x1 compression
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\x64\tt#t2s_2021.3.0.0.cab (copy)
|
Microsoft Cabinet archive data, many, 56090 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_T2S.dll" +A "Seagull_PrintModule_T2S.dll",
number 1, 5 datablocks, 0x1 compression
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\x64\tt#tec_2021.3.0.0.cab (copy)
|
Microsoft Cabinet archive data, many, 171484 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_TEC.dll" +A "Seagull_PrintModule_TEC.dll",
number 1, 14 datablocks, 0x1 compression
|
dropped
|
||
C:\Windows\System32\catroot2\dberr.txt
|
ASCII text, with CRLF line terminators
|
modified
|
There are 174 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Sterownik do drukarki TPCL-drv_2021.3_M-0_E (1).exe
|
"C:\Users\user\Desktop\Sterownik do drukarki TPCL-drv_2021.3_M-0_E (1).exe"
|
||
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\setup.exe
|
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\setup.exe -package:"C:\Users\user\Desktop\Sterownik
do drukarki TPCL-drv_2021.3_M-0_E (1).exe" -no_selfdeleter -IS_temp -media_path:"C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\Disk1\"
-tempdisk1folder:"C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\" -IS_OriginalLauncher:"C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\Disk1\setup.exe"
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe
|
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{44B75239-B0AF-47DD-A0EA-BC7D4A0B17ED}
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe
|
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{5425AD48-0ECD-4EE0-85CD-E51323D6FCF4}
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe
|
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{F2901D81-EC67-4183-B0BC-B0228BC2084C}
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe
|
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{539B659B-A16F-4977-A999-3AA0E583BB3E}
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe
|
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0E945D39-A59F-4496-9E17-EAE507F80961}
|
||
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe
|
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{BCF05350-BA9A-4EF4-A170-B5E82B942E03}
|
||
C:\Windows\System32\SrTasks.exe
|
C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\TEC_DRV\TECDRVIn.exe
|
C:\TEC_DRV\TECDRVIn.exe
|
||
C:\Windows\System32\drvinst.exe
|
DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\TOSHIBATEC.inf" "9" "4b7447563"
"0000000000000158" "WinSta0\Default" "0000000000000164" "208" "C:\TEC_DRV"
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{4b29340b-77a4-1642-8c1c-e9c6c398ae5b} Global\{95b0d15e-59ba-f945-a362-1292ebab1705}
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\TOSHIBATEC.inf C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\TOSHIBATEC.cat
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://=0x%04x.iniMS
|
unknown
|
||
http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
|
unknown
|
||
http://www.certplus.com/CRL/class3.crl0
|
unknown
|
||
http://www.e-me.lv/repository0
|
unknown
|
||
http://www.acabogacia.org/doc0
|
unknown
|
||
http://crl.chambersign.org/chambersroot.crl0
|
unknown
|
||
http://ocsp.suscerte.gob.ve0
|
unknown
|
||
http://www.postsignum.cz/crl/psrootqca2.crl02
|
unknown
|
||
http://crl.dhimyotis.com/certignarootca.crl0
|
unknown
|
||
http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0
|
unknown
|
||
http://www.chambersign.org1
|
unknown
|
||
http://www.pkioverheid.nl/policies/root-policy0
|
unknown
|
||
http://www.toshibatec.com_3_M0
|
unknown
|
||
http://repository.swisssign.com/0
|
unknown
|
||
http://www.suscerte.gob.ve/lcr0#
|
unknown
|
||
http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0
|
unknown
|
||
http://crl.ssc.lt/root-c/cacrl.crl0
|
unknown
|
||
http://postsignum.ttc.cz/crl/psrootqca2.crl0
|
unknown
|
||
http://s.symcb.coW
|
unknown
|
||
http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
|
unknown
|
||
http://ca.disig.sk/ca/crl/ca_disig.crl0
|
unknown
|
||
http://crl1.comsign.co.il/crl/comsignglobalrootca.crl0
|
unknown
|
||
http://www.certplus.com/CRL/class3P.crl0
|
unknown
|
||
http://www.suscerte.gob.ve/dpc0
|
unknown
|
||
http://www.certeurope.fr/reference/root2.crl0
|
unknown
|
||
http://www.certplus.com/CRL/class2.crl0
|
unknown
|
||
http://www.disig.sk/ca/crl/ca_disig.crl0
|
unknown
|
||
http://www.defence.gov.au/pki0
|
unknown
|
||
http://www.sk.ee/cps/0
|
unknown
|
||
http://www.globaltrust.info0=
|
unknown
|
||
http://www.toshibatec.com;
|
unknown
|
||
http://www.anf.es
|
unknown
|
||
http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_1_0.pdf09
|
unknown
|
||
http://crl.postsignum.cz/crl/psrootqca4.crl02
|
unknown
|
||
http://pki.registradores.org/normativa/index.htm0
|
unknown
|
||
http://policy.camerfirma.com0
|
unknown
|
||
http://www.ssc.lt/cps03
|
unknown
|
||
https://d./
|
unknown
|
||
http://ocsp.pki.gva.es0
|
unknown
|
||
http://www.anf.es/es/address-direccion.html
|
unknown
|
||
https://www.anf.es/address/)1(0&
|
unknown
|
||
http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?
|
unknown
|
||
http://ca.mtin.es/mtin/ocsp0
|
unknown
|
||
http://crl.ssc.lt/root-b/cacrl.crl0
|
unknown
|
||
http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0
|
unknown
|
||
http://web.ncdc.gov.sa/crl/nrcacomb1.crl0
|
unknown
|
||
http://www.certicamara.com/dpc/0Z
|
unknown
|
||
http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G
|
unknown
|
||
https://wwww.certigna.fr/autorites/0m
|
unknown
|
||
http://www.dnie.es/dpc0
|
unknown
|
||
http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0
|
unknown
|
||
http://ca.mtin.es/mtin/DPCyPoliticas0
|
unknown
|
||
https://www.anf.es/AC/ANFServerCA.crl0
|
unknown
|
||
https://repository.tsp.zetes.com0
|
unknown
|
||
http://www.globaltrust.info0
|
unknown
|
||
http://certificates.starfieldtech.com/repository/1604
|
unknown
|
||
http://acedicom.edicomgroup.com/doc0
|
unknown
|
||
http://www.certplus.com/CRL/class3TS.crl0
|
unknown
|
||
https://crl.anf.es/AC/ANFServerCA.crl0
|
unknown
|
||
http://www.certeurope.fr/reference/pc-root2.pdf0
|
unknown
|
||
http://ac.economia.gob.mx/last.crl0G
|
unknown
|
||
http://deviis4.installshield.com/NetNirvana/data2.cabDisk1
|
unknown
|
||
https://www.catcert.net/verarrel
|
unknown
|
||
http://www.disig.sk/ca0f
|
unknown
|
||
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
|
unknown
|
||
http://www.e-szigno.hu/RootCA.crl
|
unknown
|
||
http://www.sk.ee/juur/crl/0
|
unknown
|
||
http://crl.chambersign.org/chambersignroot.crl0
|
unknown
|
||
http://crl.xrampsecurity.com/XGCA.crl0
|
unknown
|
||
http://cacerts.digicert
|
unknown
|
||
http://certs.oati.net/repository/OATICA2.crl0
|
unknown
|
||
http://crl.oces.trust2408.com/oces.crl0
|
unknown
|
||
http://www.quovadis.bm0
|
unknown
|
||
http://crl.ssc.lt/root-a/cacrl.crl0
|
unknown
|
||
http://certs.oaticerts.com/repository/OATICA2.crl
|
unknown
|
||
http://certs.oati.net/repository/OATICA2.crt0
|
unknown
|
||
http://www.accv.es00
|
unknown
|
||
http://www.toshibatec.com=%ld
|
unknown
|
||
http://www.pkioverheid.nl/policies/root-policy-G20
|
unknown
|
||
https://www.netlock.net/docs
|
unknown
|
||
http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
|
unknown
|
||
http://www.e-trust.be/CPS/QNcerts
|
unknown
|
||
http://ocsp.ncdc.gov.sa0
|
unknown
|
||
https://d.sym
|
unknown
|
||
http://s.symcb.coWVTAsn1SpcMinimalCriteriaInfoEncode-204Dll
|
unknown
|
||
http://ts-crl.ws.syO
|
unknown
|
||
http://fedir.comsign.co.il/crl/ComSignCA.crl0
|
unknown
|
||
http://acraiz.icpbrasil.gov.br/LCRacraizv5.crl0
|
unknown
|
||
http://crl2.postsignum.cz/crl/psrootqca4.crl01
|
unknown
|
||
http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0
|
unknown
|
||
http://web.ncdc.gov.sa/crl/nrcaparta1.crl
|
unknown
|
||
http://www.datev.de/zertifikat-policy-int0
|
unknown
|
||
http://www.installshield.coW
|
unknown
|
||
http://fedir.comsign.co.il/crl/comsignglobalrootca.crl0;
|
unknown
|
||
https://repository.luxtrust.lu0
|
unknown
|
||
http://cps.chambersign.org/cps/chambersroot.html0
|
unknown
|
||
http://www.acabogacia.org0
|
unknown
|
||
http://www.firmaprofesional.com/cps0
|
unknown
|
||
http://www.uce.gub.uy/acrn/acrn.crl0
|
unknown
|
||
http://www.installshield.com/isetup/ProErrorCentral.asp?ErrorCode=%d
|
unknown
|
There are 90 hidden URLs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
|
AoACAPIError
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
|
AoACAPIResult
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
FirstRun
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
LastIndex
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
|
NestingLevel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
|
StartNesting
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
SRInitDone
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
|
SrCreateRp (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
|
SrCreateRp (Leave)
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
|
LogFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
|
ProductGuid
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
|
RegOwner
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
|
DisplayIcon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
|
LogMode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
RPSessionInterval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
LastIndex
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
|
NestingLevel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
|
StartNesting
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
|
NestingLevel
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\Setup\SetupapiLogStatus
|
setupapi.dev.log
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\0ECA937423F01F974CA582BCFC417550BE20B95E
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3679CA35668772304D30A5FB873B0FA77BB70D54
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3679CA35668772304D30A5FB873B0FA77BB70D54
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3679CA35668772304D30A5FB873B0FA77BB70D54
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3679CA35668772304D30A5FB873B0FA77BB70D54
|
Blob
|
There are 154 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2B56000
|
heap
|
page read and write
|
||
27A786BB000
|
heap
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
7FF62F237000
|
unkown
|
page readonly
|
||
16E58E30000
|
trusted library allocation
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
22398D30000
|
heap
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
2A65000
|
heap
|
page read and write
|
||
669000
|
heap
|
page read and write
|
||
1A85275E000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
631000
|
heap
|
page read and write
|
||
2A18000
|
heap
|
page read and write
|
||
2BCB000
|
heap
|
page read and write
|
||
1AC6ED80000
|
heap
|
page read and write
|
||
22398E3D000
|
heap
|
page read and write
|
||
27A78840000
|
heap
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
668000
|
heap
|
page read and write
|
||
16E58E46000
|
trusted library allocation
|
page read and write
|
||
6F5000
|
heap
|
page read and write
|
||
1A85274F000
|
heap
|
page read and write
|
||
7FF62F220000
|
unkown
|
page readonly
|
||
540000
|
heap
|
page read and write
|
||
75A000
|
heap
|
page read and write
|
||
16E58E46000
|
trusted library allocation
|
page read and write
|
||
F2A68FE000
|
stack
|
page read and write
|
||
27A7885C000
|
heap
|
page read and write
|
||
16E56EF3000
|
heap
|
page read and write
|
||
7FF62F220000
|
unkown
|
page readonly
|
||
556B000
|
heap
|
page read and write
|
||
548F000
|
heap
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
66B000
|
heap
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
635000
|
heap
|
page read and write
|
||
16E56EF1000
|
heap
|
page read and write
|
||
2795FFE000
|
stack
|
page read and write
|
||
27A7893E000
|
heap
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
64B000
|
heap
|
page read and write
|
||
16E56EB0000
|
heap
|
page read and write
|
||
2239AE5F000
|
heap
|
page read and write
|
||
55F5000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
16E58E46000
|
trusted library allocation
|
page read and write
|
||
6EC000
|
heap
|
page read and write
|
||
2C8D000
|
heap
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
71E000
|
heap
|
page read and write
|
||
16E56EF1000
|
heap
|
page read and write
|
||
669000
|
heap
|
page read and write
|
||
6B1000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
27A786AD000
|
heap
|
page read and write
|
||
6EF000
|
heap
|
page read and write
|
||
27A786A9000
|
heap
|
page read and write
|
||
2190000
|
trusted library allocation
|
page read and write
|
||
27A786A9000
|
heap
|
page read and write
|
||
27A786A5000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
28CE000
|
stack
|
page read and write
|
||
55D7000
|
heap
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
22398E02000
|
heap
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
16E56EF1000
|
heap
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
2BA7000
|
heap
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
29CB000
|
heap
|
page read and write
|
||
27A786C8000
|
heap
|
page read and write
|
||
16E56EEF000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
2239AE8D000
|
heap
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
64B000
|
heap
|
page read and write
|
||
6EF000
|
heap
|
page read and write
|
||
636000
|
heap
|
page read and write
|
||
27A78915000
|
heap
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
27A788CB000
|
heap
|
page read and write
|
||
29E2000
|
heap
|
page read and write
|
||
5424000
|
heap
|
page read and write
|
||
75C000
|
heap
|
page read and write
|
||
2239AED6000
|
heap
|
page read and write
|
||
2B8B37E000
|
stack
|
page read and write
|
||
27A7869B000
|
heap
|
page read and write
|
||
2AB4000
|
heap
|
page read and write
|
||
16E58E33000
|
trusted library allocation
|
page read and write
|
||
27A786CE000
|
heap
|
page read and write
|
||
2BD1000
|
heap
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
2239AE2D000
|
heap
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
27A786C8000
|
heap
|
page read and write
|
||
7FF62F246000
|
unkown
|
page read and write
|
||
1A852720000
|
heap
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
8C930FE000
|
stack
|
page read and write
|
||
29EE000
|
heap
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
27A78864000
|
heap
|
page read and write
|
||
639000
|
heap
|
page read and write
|
||
24344E46000
|
heap
|
page read and write
|
||
22398E3F000
|
heap
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
5486000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
6D8000
|
heap
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
6F6000
|
heap
|
page read and write
|
||
1E701F30000
|
heap
|
page read and write
|
||
22398DE0000
|
heap
|
page read and write
|
||
7FF62F237000
|
unkown
|
page readonly
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
27A786B6000
|
heap
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
62C000
|
heap
|
page read and write
|
||
27A786D2000
|
heap
|
page read and write
|
||
7FF62F24B000
|
unkown
|
page readonly
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
27A786E6000
|
heap
|
page read and write
|
||
1E702036000
|
heap
|
page read and write
|
||
16E58E35000
|
trusted library allocation
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
6E6000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
2BD3000
|
heap
|
page read and write
|
||
2B8B2FE000
|
stack
|
page read and write
|
||
27961FE000
|
stack
|
page read and write
|
||
27A786AD000
|
heap
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
27A786BB000
|
heap
|
page read and write
|
||
2239AE3B000
|
heap
|
page read and write
|
||
7FF62F237000
|
unkown
|
page readonly
|
||
55F2000
|
heap
|
page read and write
|
||
6F2000
|
heap
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
16E58B44000
|
heap
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
22398DE5000
|
heap
|
page read and write
|
||
6BF000
|
heap
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
62D000
|
heap
|
page read and write
|
||
5473000
|
heap
|
page read and write
|
||
2239AE21000
|
heap
|
page read and write
|
||
62D000
|
heap
|
page read and write
|
||
69B000
|
heap
|
page read and write
|
||
22398E1C000
|
heap
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
16E58E46000
|
trusted library allocation
|
page read and write
|
||
16E58E47000
|
trusted library allocation
|
page read and write
|
||
55D7000
|
heap
|
page read and write
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
2239AEC4000
|
heap
|
page read and write
|
||
16E56EEE000
|
heap
|
page read and write
|
||
27A78D41000
|
heap
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
2B63000
|
heap
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
27A786B5000
|
heap
|
page read and write
|
||
2239AE5E000
|
heap
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
27A786BC000
|
heap
|
page read and write
|
||
27A786DB000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
29F5000
|
heap
|
page read and write
|
||
2239AECC000
|
heap
|
page read and write
|
||
8C92EFF000
|
stack
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
2994000
|
heap
|
page read and write
|
||
2244000
|
heap
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
7FF62F221000
|
unkown
|
page execute read
|
||
27A786BC000
|
heap
|
page read and write
|
||
54D4000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
2B38000
|
heap
|
page read and write
|
||
16E58E46000
|
trusted library allocation
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
1F77B964000
|
heap
|
page read and write
|
||
2A26000
|
heap
|
page read and write
|
||
27A786A7000
|
heap
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
1E702110000
|
heap
|
page read and write
|
||
27A786C8000
|
heap
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
27A786B3000
|
heap
|
page read and write
|
||
6E6000
|
heap
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
27A789F0000
|
heap
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
27A78844000
|
heap
|
page read and write
|
||
27A78907000
|
heap
|
page read and write
|
||
1F77B94F000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
642000
|
heap
|
page read and write
|
||
7FF62F220000
|
unkown
|
page readonly
|
||
27A786CE000
|
heap
|
page read and write
|
||
1F77B956000
|
heap
|
page read and write
|
||
62D000
|
heap
|
page read and write
|
||
27A78693000
|
heap
|
page read and write
|
||
27A78864000
|
heap
|
page read and write
|
||
2239AE66000
|
heap
|
page read and write
|
||
16E56EB9000
|
heap
|
page read and write
|
||
27A786A9000
|
heap
|
page read and write
|
||
27A7876D000
|
heap
|
page read and write
|
||
27A786A5000
|
heap
|
page read and write
|
||
7FF62F246000
|
unkown
|
page write copy
|
||
69B000
|
heap
|
page read and write
|
||
27A7869B000
|
heap
|
page read and write
|
||
27A786AD000
|
heap
|
page read and write
|
||
2C4F000
|
heap
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
5437000
|
heap
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
7FF62F24A000
|
unkown
|
page read and write
|
||
1E702022000
|
heap
|
page read and write
|
||
27A786CE000
|
heap
|
page read and write
|
||
75A000
|
heap
|
page read and write
|
||
27A786A9000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
7FF62F246000
|
unkown
|
page read and write
|
||
649000
|
heap
|
page read and write
|
||
2239ACF0000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
642000
|
heap
|
page read and write
|
||
27A78D57000
|
heap
|
page read and write
|
||
54C2000
|
heap
|
page read and write
|
||
4D7000
|
unkown
|
page write copy
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
27A78910000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
2A65000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
27A786A5000
|
heap
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
5595000
|
heap
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
55D4000
|
heap
|
page read and write
|
||
22398D50000
|
heap
|
page read and write
|
||
27A786A5000
|
heap
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
2C4D000
|
heap
|
page read and write
|
||
16E58E46000
|
trusted library allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
55AB000
|
heap
|
page read and write
|
||
27A785E0000
|
heap
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
1C60FC9D000
|
heap
|
page read and write
|
||
27A786D2000
|
heap
|
page read and write
|
||
27A786B0000
|
heap
|
page read and write
|
||
7FF62F246000
|
unkown
|
page write copy
|
||
27A7869F000
|
heap
|
page read and write
|
||
6E9000
|
heap
|
page read and write
|
||
7FF62F221000
|
unkown
|
page execute read
|
||
1C6117B4000
|
heap
|
page read and write
|
||
662000
|
heap
|
page read and write
|
||
65D000
|
heap
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
62C000
|
heap
|
page read and write
|
||
1A852741000
|
heap
|
page read and write
|
||
7FF62F237000
|
unkown
|
page readonly
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
27A78769000
|
heap
|
page read and write
|
||
669000
|
heap
|
page read and write
|
||
2239AE5D000
|
heap
|
page read and write
|
||
55F7000
|
heap
|
page read and write
|
||
27A786CE000
|
heap
|
page read and write
|
||
2A35000
|
heap
|
page read and write
|
||
45B0000
|
trusted library allocation
|
page read and write
|
||
69A000
|
heap
|
page read and write
|
||
2BC3000
|
heap
|
page read and write
|
||
56E000
|
stack
|
page read and write
|
||
1A85275E000
|
heap
|
page read and write
|
||
1C60FC8B000
|
heap
|
page read and write
|
||
559A000
|
heap
|
page read and write
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
1A85276B000
|
heap
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
27A78D50000
|
heap
|
page read and write
|
||
647000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
55A3000
|
heap
|
page read and write
|
||
55F9000
|
heap
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
1E702031000
|
heap
|
page read and write
|
||
27A786BB000
|
heap
|
page read and write
|
||
2A91000
|
heap
|
page read and write
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
4AE000
|
unkown
|
page readonly
|
||
55F7000
|
heap
|
page read and write
|
||
27A78D95000
|
heap
|
page read and write
|
||
1F77B946000
|
heap
|
page read and write
|
||
55F5000
|
heap
|
page read and write
|
||
63B000
|
heap
|
page read and write
|
||
515BCFE000
|
stack
|
page read and write
|
||
1E703A64000
|
heap
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
27A78D95000
|
heap
|
page read and write
|
||
27A786DB000
|
heap
|
page read and write
|
||
642000
|
heap
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
55DA000
|
heap
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
6EC000
|
heap
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
2B8B47E000
|
stack
|
page read and write
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
8F804F8000
|
stack
|
page read and write
|
||
6BA000
|
heap
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
24344E36000
|
heap
|
page read and write
|
||
27A786D2000
|
heap
|
page read and write
|
||
29EC000
|
heap
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
16E56F2C000
|
heap
|
page read and write
|
||
2BE9000
|
heap
|
page read and write
|
||
2BBE000
|
heap
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
5EB000
|
heap
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
27A78D50000
|
heap
|
page read and write
|
||
6D5000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
2C55000
|
heap
|
page read and write
|
||
4B72A7E000
|
stack
|
page read and write
|
||
2239AEA4000
|
heap
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
2239A9A3000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
24344E30000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
2239AED0000
|
heap
|
page read and write
|
||
62A000
|
heap
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
16E57110000
|
heap
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
16E56EE6000
|
heap
|
page read and write
|
||
54D4000
|
heap
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
27A78860000
|
heap
|
page read and write
|
||
632000
|
heap
|
page read and write
|
||
27A786D2000
|
heap
|
page read and write
|
||
27A786D2000
|
heap
|
page read and write
|
||
4DC2000
|
heap
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
68B000
|
heap
|
page read and write
|
||
27A786AB000
|
heap
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
2BBB000
|
heap
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
75A000
|
heap
|
page read and write
|
||
27A78767000
|
heap
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
7FF62F246000
|
unkown
|
page write copy
|
||
665000
|
heap
|
page read and write
|
||
27A786BC000
|
heap
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
27A786DB000
|
heap
|
page read and write
|
||
2239AEE1000
|
heap
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
F2A6A7F000
|
stack
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
67C000
|
heap
|
page read and write
|
||
64B000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
55C6000
|
heap
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
6A5000
|
heap
|
page read and write
|
||
658000
|
heap
|
page read and write
|
||
7FF62F246000
|
unkown
|
page write copy
|
||
6F8000
|
heap
|
page read and write
|
||
4D7000
|
unkown
|
page read and write
|
||
6CE000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
69B000
|
heap
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
24344DF4000
|
heap
|
page read and write
|
||
27A788DD000
|
heap
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
6AA000
|
heap
|
page read and write
|
||
61D000
|
heap
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
55D0000
|
heap
|
page read and write
|
||
2C06000
|
heap
|
page read and write
|
||
16E56EEF000
|
heap
|
page read and write
|
||
6EC000
|
heap
|
page read and write
|
||
749000
|
heap
|
page read and write
|
||
54BB000
|
heap
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
6E2000
|
heap
|
page read and write
|
||
27A786DB000
|
heap
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
2A53000
|
heap
|
page read and write
|
||
55F5000
|
heap
|
page read and write
|
||
27A786B4000
|
heap
|
page read and write
|
||
29C3000
|
heap
|
page read and write
|
||
27A786CF000
|
heap
|
page read and write
|
||
CA5E1B8000
|
stack
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
27A786CB000
|
heap
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
16E56EF1000
|
heap
|
page read and write
|
||
55F9000
|
heap
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page read and write
|
||
16E58E46000
|
trusted library allocation
|
page read and write
|
||
27A7891F000
|
heap
|
page read and write
|
||
2C47000
|
heap
|
page read and write
|
||
6EC000
|
heap
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
27A78693000
|
heap
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
638000
|
heap
|
page read and write
|
||
5FF0000
|
heap
|
page read and write
|
||
27A786CF000
|
heap
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
27A786CB000
|
heap
|
page read and write
|
||
27A786BC000
|
heap
|
page read and write
|
||
7FF62F246000
|
unkown
|
page read and write
|
||
27A7891B000
|
heap
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
2239AE8B000
|
heap
|
page read and write
|
||
62C000
|
heap
|
page read and write
|
||
699000
|
heap
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
509000
|
unkown
|
page readonly
|
||
2239904C000
|
heap
|
page read and write
|
||
55F7000
|
heap
|
page read and write
|
||
1F77B941000
|
heap
|
page read and write
|
||
65C000
|
heap
|
page read and write
|
||
27A7885A000
|
heap
|
page read and write
|
||
22398EBC000
|
heap
|
page read and write
|
||
27A786C8000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
2BBB000
|
heap
|
page read and write
|
||
27A786A9000
|
heap
|
page read and write
|
||
662000
|
heap
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
heap
|
page read and write
|
||
64B000
|
heap
|
page read and write
|
||
CA5E5FE000
|
stack
|
page read and write
|
||
5444000
|
heap
|
page read and write
|
||
1C60FC66000
|
heap
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
1A852690000
|
heap
|
page read and write
|
||
27A786E6000
|
heap
|
page read and write
|
||
54C2000
|
heap
|
page read and write
|
||
55FB000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
27A78910000
|
heap
|
page read and write
|
||
27A786CB000
|
heap
|
page read and write
|
||
2239AEBE000
|
heap
|
page read and write
|
||
2AB6000
|
heap
|
page read and write
|
||
1C6117B0000
|
heap
|
page read and write
|
||
16E58E4A000
|
trusted library allocation
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
5473000
|
heap
|
page read and write
|
||
2239AE33000
|
heap
|
page read and write
|
||
5598000
|
heap
|
page read and write
|
||
515B9FE000
|
stack
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
45B5000
|
trusted library section
|
page read and write
|
||
2C4F000
|
heap
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
546E000
|
heap
|
page read and write
|
||
8F80AFE000
|
stack
|
page read and write
|
||
2239AEA6000
|
heap
|
page read and write
|
||
27A78907000
|
heap
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
2239AE46000
|
heap
|
page read and write
|
||
2BCB000
|
heap
|
page read and write
|
||
6F8000
|
heap
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
646000
|
heap
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
29D3000
|
heap
|
page read and write
|
||
2C6A000
|
heap
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
27A78D53000
|
heap
|
page read and write
|
||
299B000
|
heap
|
page read and write
|
||
27A786A5000
|
heap
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
4DC000
|
unkown
|
page readonly
|
||
16E56EED000
|
heap
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
4D7000
|
unkown
|
page write copy
|
||
16E56F3E000
|
heap
|
page read and write
|
||
55F9000
|
heap
|
page read and write
|
||
29FD000
|
heap
|
page read and write
|
||
27A7885C000
|
heap
|
page read and write
|
||
1C60FC85000
|
heap
|
page read and write
|
||
27A7893E000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
27A7869B000
|
heap
|
page read and write
|
||
22398EBE000
|
heap
|
page read and write
|
||
55F9000
|
heap
|
page read and write
|
||
2239AE4D000
|
heap
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
2239AE5B000
|
heap
|
page read and write
|
||
27A788C2000
|
heap
|
page read and write
|
||
671000
|
heap
|
page read and write
|
||
27A78841000
|
heap
|
page read and write
|
||
63A000
|
heap
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
2240000
|
heap
|
page read and write
|
||
16E56EF3000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
647000
|
heap
|
page read and write
|
||
63B000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
27A78D67000
|
heap
|
page read and write
|
||
27A7876E000
|
heap
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
697000
|
heap
|
page read and write
|
||
56A000
|
heap
|
page read and write
|
||
24344DF0000
|
heap
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
55F9000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
21CE000
|
stack
|
page read and write
|
||
1C60FC6C000
|
heap
|
page read and write
|
||
27A7885C000
|
heap
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
2A1B000
|
heap
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
721000
|
heap
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
2C7E000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
27A786DB000
|
heap
|
page read and write
|
||
27A78D55000
|
heap
|
page read and write
|
||
27A78D5C000
|
heap
|
page read and write
|
||
8C92AFB000
|
stack
|
page read and write
|
||
64C000
|
heap
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
27A786C8000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
4AE000
|
unkown
|
page readonly
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
22399049000
|
heap
|
page read and write
|
||
646000
|
heap
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
2239AE61000
|
heap
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
509000
|
unkown
|
page readonly
|
||
1A8526C0000
|
heap
|
page read and write
|
||
2B56000
|
heap
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
16E56EEF000
|
heap
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
27A786B7000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
63D000
|
heap
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
7FF62F221000
|
unkown
|
page execute read
|
||
1A85276A000
|
heap
|
page read and write
|
||
54C2000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
1C60FC60000
|
heap
|
page read and write
|
||
2B38000
|
heap
|
page read and write
|
||
16E56EE7000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
2239AEDA000
|
heap
|
page read and write
|
||
5445000
|
heap
|
page read and write
|
||
27A786B3000
|
heap
|
page read and write
|
||
55D0000
|
heap
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
2BA1000
|
heap
|
page read and write
|
||
7FF62F24B000
|
unkown
|
page readonly
|
||
27A788C2000
|
heap
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
16E58B4F000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
27A786E6000
|
heap
|
page read and write
|
||
16E56EEF000
|
heap
|
page read and write
|
||
16E58E31000
|
trusted library allocation
|
page read and write
|
||
27A786BB000
|
heap
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
27A78921000
|
heap
|
page read and write
|
||
2BFE000
|
heap
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
515B8FC000
|
stack
|
page read and write
|
||
FFED1FE000
|
stack
|
page read and write
|
||
691000
|
heap
|
page read and write
|
||
55DA000
|
heap
|
page read and write
|
||
692000
|
heap
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
667000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
27A786B5000
|
heap
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
2239AE8B000
|
heap
|
page read and write
|
||
6F8000
|
heap
|
page read and write
|
||
22398DFC000
|
heap
|
page read and write
|
||
27A78758000
|
heap
|
page read and write
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
6DD000
|
heap
|
page read and write
|
||
27A786A5000
|
heap
|
page read and write
|
||
27A786AD000
|
heap
|
page read and write
|
||
2B38000
|
heap
|
page read and write
|
||
55E2000
|
heap
|
page read and write
|
||
41F0000
|
trusted library allocation
|
page read and write
|
||
2BC3000
|
heap
|
page read and write
|
||
55DA000
|
heap
|
page read and write
|
||
6EF000
|
heap
|
page read and write
|
||
7FF62F221000
|
unkown
|
page execute read
|
||
16E56F01000
|
heap
|
page read and write
|
||
27A786D2000
|
heap
|
page read and write
|
||
2239AE29000
|
heap
|
page read and write
|
||
27A786A5000
|
heap
|
page read and write
|
||
27A786CF000
|
heap
|
page read and write
|
||
669000
|
heap
|
page read and write
|
||
1E703BD0000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
2300000
|
heap
|
page read and write
|
||
61B000
|
heap
|
page read and write
|
||
22398E14000
|
heap
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
45B0000
|
trusted library allocation
|
page read and write
|
||
27A786CE000
|
heap
|
page read and write
|
||
1E702044000
|
heap
|
page read and write
|
||
67A000
|
heap
|
page read and write
|
||
55A3000
|
heap
|
page read and write
|
||
16E58E47000
|
trusted library allocation
|
page read and write
|
||
27A78D67000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
16E56EF5000
|
heap
|
page read and write
|
||
5D0000
|
direct allocation
|
page execute and read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
27A7874D000
|
heap
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
4B72C7F000
|
stack
|
page read and write
|
||
16E57144000
|
heap
|
page read and write
|
||
2239AE3A000
|
heap
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
22398E3F000
|
heap
|
page read and write
|
||
2A2E000
|
heap
|
page read and write
|
||
55F5000
|
heap
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
27A786DB000
|
heap
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
6BA000
|
heap
|
page read and write
|
||
73D000
|
heap
|
page read and write
|
||
7FF62F221000
|
unkown
|
page execute read
|
||
2B56000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
210F000
|
stack
|
page read and write
|
||
2BCB000
|
heap
|
page read and write
|
||
27A786CE000
|
heap
|
page read and write
|
||
2A95000
|
heap
|
page read and write
|
||
45B0000
|
trusted library allocation
|
page read and write
|
||
6D3000
|
heap
|
page read and write
|
||
429000
|
unkown
|
page write copy
|
||
22398E0E000
|
heap
|
page read and write
|
||
2993000
|
heap
|
page read and write
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
27A786CB000
|
heap
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
68D000
|
heap
|
page read and write
|
||
55A3000
|
heap
|
page read and write
|
||
6D8000
|
heap
|
page read and write
|
||
61B000
|
heap
|
page read and write
|
||
2C4A000
|
heap
|
page read and write
|
||
27A786AB000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
75C000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
2239AE43000
|
heap
|
page read and write
|
||
27A78686000
|
heap
|
page read and write
|
||
54B8000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
7FF62F220000
|
unkown
|
page readonly
|
||
27A78D41000
|
heap
|
page read and write
|
||
5428000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
55C6000
|
heap
|
page read and write
|
||
27A788CC000
|
heap
|
page read and write
|
||
75C000
|
heap
|
page read and write
|
||
61A000
|
heap
|
page read and write
|
||
27A786D2000
|
heap
|
page read and write
|
||
739000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
65C000
|
heap
|
page read and write
|
||
29EC000
|
heap
|
page read and write
|
||
22398E34000
|
heap
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
6F3000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
16E56EE5000
|
heap
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
1F77B956000
|
heap
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
8F809FE000
|
stack
|
page read and write
|
||
16E57140000
|
heap
|
page read and write
|
||
2239AE94000
|
heap
|
page read and write
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
27A786AD000
|
heap
|
page read and write
|
||
16E56EF1000
|
heap
|
page read and write
|
||
6E6000
|
heap
|
page read and write
|
||
22398E13000
|
heap
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
27A78D4D000
|
heap
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
7FF62F246000
|
unkown
|
page read and write
|
||
27A786D2000
|
heap
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
55F7000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
22398DFD000
|
heap
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
2239AEDE000
|
heap
|
page read and write
|
||
1F77B94D000
|
heap
|
page read and write
|
||
27A786B8000
|
heap
|
page read and write
|
||
636000
|
heap
|
page read and write
|
||
63A000
|
heap
|
page read and write
|
||
2BCB000
|
heap
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
6AB000
|
heap
|
page read and write
|
||
22398E3D000
|
heap
|
page read and write
|
||
2B0B000
|
heap
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
55AC000
|
heap
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
5476000
|
heap
|
page read and write
|
||
65A000
|
heap
|
page read and write
|
||
2C8D000
|
heap
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
27A786CE000
|
heap
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
2239AE5D000
|
heap
|
page read and write
|
||
16E58E46000
|
trusted library allocation
|
page read and write
|
||
75C000
|
heap
|
page read and write
|
||
7FF62F24A000
|
unkown
|
page read and write
|
||
27A78D41000
|
heap
|
page read and write
|
||
16E58E46000
|
trusted library allocation
|
page read and write
|
||
27A786D2000
|
heap
|
page read and write
|
||
2239AEDE000
|
heap
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
29FF000
|
heap
|
page read and write
|
||
29BC000
|
heap
|
page read and write
|
||
739000
|
heap
|
page read and write
|
||
27A786E6000
|
heap
|
page read and write
|
||
672000
|
heap
|
page read and write
|
||
55FB000
|
heap
|
page read and write
|
||
27A78692000
|
heap
|
page read and write
|
||
2990000
|
trusted library allocation
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
16E56EF1000
|
heap
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
643000
|
heap
|
page read and write
|
||
27A788F6000
|
heap
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
2C8D000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
2239AE2E000
|
heap
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
2239AE3B000
|
heap
|
page read and write
|
||
27A78859000
|
heap
|
page read and write
|
||
55EB000
|
heap
|
page read and write
|
||
2239AE9A000
|
heap
|
page read and write
|
||
27A7891F000
|
heap
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
5427000
|
heap
|
page read and write
|
||
7FF62F220000
|
unkown
|
page readonly
|
||
27A7885C000
|
heap
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
27A78D5C000
|
heap
|
page read and write
|
||
2B4D000
|
heap
|
page read and write
|
||
638000
|
heap
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
27A786B7000
|
heap
|
page read and write
|
||
1F77B946000
|
heap
|
page read and write
|
||
669000
|
heap
|
page read and write
|
||
27A78670000
|
heap
|
page read and write
|
||
67D000
|
heap
|
page read and write
|
||
27A7874D000
|
heap
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
27A786BB000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
55A8000
|
heap
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
27A786A9000
|
heap
|
page read and write
|
||
2A7D000
|
heap
|
page read and write
|
||
55F5000
|
heap
|
page read and write
|
||
27A7876D000
|
heap
|
page read and write
|
||
6F8000
|
heap
|
page read and write
|
||
4B727CB000
|
stack
|
page read and write
|
||
16E58E36000
|
trusted library allocation
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
65A000
|
heap
|
page read and write
|
||
27A786A5000
|
heap
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
2239AE81000
|
heap
|
page read and write
|
||
1E702044000
|
heap
|
page read and write
|
||
27A786D2000
|
heap
|
page read and write
|
||
6EF000
|
heap
|
page read and write
|
||
6E4000
|
heap
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
27A78D55000
|
heap
|
page read and write
|
||
FFECEFF000
|
stack
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
27A7885C000
|
heap
|
page read and write
|
||
2BB4000
|
heap
|
page read and write
|
||
2A29000
|
heap
|
page read and write
|
||
2239AE85000
|
heap
|
page read and write
|
||
2239AE94000
|
heap
|
page read and write
|
||
27A786AD000
|
heap
|
page read and write
|
||
2BD3000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
5473000
|
heap
|
page read and write
|
||
2B0B000
|
heap
|
page read and write
|
||
6F7000
|
heap
|
page read and write
|
||
27A78907000
|
heap
|
page read and write
|
||
16E58E46000
|
trusted library allocation
|
page read and write
|
||
632000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
24344E09000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
7FF62F24B000
|
unkown
|
page readonly
|
||
429000
|
unkown
|
page read and write
|
||
27A786C8000
|
heap
|
page read and write
|
||
7FF62F24B000
|
unkown
|
page readonly
|
||
7FF62F237000
|
unkown
|
page readonly
|
||
27A786BB000
|
heap
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
5598000
|
heap
|
page read and write
|
||
16E56EF3000
|
heap
|
page read and write
|
||
2190000
|
trusted library allocation
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
721000
|
heap
|
page read and write
|
||
27A78686000
|
heap
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
695000
|
heap
|
page read and write
|
||
638000
|
heap
|
page read and write
|
||
1AC6D150000
|
heap
|
page read and write
|
||
6B8000
|
heap
|
page read and write
|
||
16E56EEF000
|
heap
|
page read and write
|
||
21BF000
|
stack
|
page read and write
|
||
7FF62F24B000
|
unkown
|
page readonly
|
||
55FB000
|
heap
|
page read and write
|
||
28F0000
|
trusted library allocation
|
page read and write
|
||
1AC6D17E000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
6AF000
|
stack
|
page read and write
|
||
64A000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
1A8541E0000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
27A7868A000
|
heap
|
page read and write
|
||
1E70203F000
|
heap
|
page read and write
|
||
659000
|
heap
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
22398E3F000
|
heap
|
page read and write
|
||
2A3A000
|
heap
|
page read and write
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
2210000
|
heap
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
1C60FC9C000
|
heap
|
page read and write
|
||
27A78D4D000
|
heap
|
page read and write
|
||
1C60FBF0000
|
heap
|
page read and write
|
||
641000
|
heap
|
page read and write
|
||
1E703A60000
|
heap
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
2C8D000
|
heap
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
1F77B850000
|
heap
|
page read and write
|
||
661000
|
heap
|
page read and write
|
||
22398E3D000
|
heap
|
page read and write
|
||
27A7893E000
|
heap
|
page read and write
|
||
27A7893E000
|
heap
|
page read and write
|
||
544C000
|
heap
|
page read and write
|
||
2BBC000
|
heap
|
page read and write
|
||
63B000
|
heap
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
61D000
|
heap
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
27A78685000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
21CE000
|
stack
|
page read and write
|
||
27A788D9000
|
heap
|
page read and write
|
||
1C60FC86000
|
heap
|
page read and write
|
||
2239AEB7000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
22398E14000
|
heap
|
page read and write
|
||
27A786BC000
|
heap
|
page read and write
|
||
5527000
|
heap
|
page read and write
|
||
27A786DB000
|
heap
|
page read and write
|
||
27A786A9000
|
heap
|
page read and write
|
||
16E58E46000
|
trusted library allocation
|
page read and write
|
||
2BA1000
|
heap
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
16E58E48000
|
trusted library allocation
|
page read and write
|
||
540B000
|
heap
|
page read and write
|
||
27A7869F000
|
heap
|
page read and write
|
||
27A786B0000
|
heap
|
page read and write
|
||
509000
|
unkown
|
page readonly
|
||
6F5000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
27A786BC000
|
heap
|
page read and write
|
||
659000
|
heap
|
page read and write
|
||
658000
|
heap
|
page read and write
|
||
29DE000
|
heap
|
page read and write
|
||
519000
|
unkown
|
page readonly
|
||
5B6000
|
heap
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
2AAB000
|
heap
|
page read and write
|
||
29D4000
|
heap
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
663000
|
heap
|
page read and write
|
||
669000
|
heap
|
page read and write
|
||
27A786A5000
|
heap
|
page read and write
|
||
27A78758000
|
heap
|
page read and write
|
||
16E58E46000
|
trusted library allocation
|
page read and write
|
||
16E56EEF000
|
heap
|
page read and write
|
||
27A786CE000
|
heap
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
27A78693000
|
heap
|
page read and write
|
||
27A78846000
|
heap
|
page read and write
|
||
24344D40000
|
heap
|
page read and write
|
||
739000
|
heap
|
page read and write
|
||
1AC6EBB0000
|
heap
|
page read and write
|
||
22398E3D000
|
heap
|
page read and write
|
||
6F5000
|
heap
|
page read and write
|
||
5562000
|
heap
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
2BBE000
|
heap
|
page read and write
|
||
27A786E6000
|
heap
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
2239AE61000
|
heap
|
page read and write
|
||
27A7869B000
|
heap
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
5549000
|
heap
|
page read and write
|
||
55F7000
|
heap
|
page read and write
|
||
65A000
|
heap
|
page read and write
|
||
27A786CB000
|
heap
|
page read and write
|
||
27A786BC000
|
heap
|
page read and write
|
||
27A78D67000
|
heap
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
27A786BB000
|
heap
|
page read and write
|
||
2239AE46000
|
heap
|
page read and write
|
||
29E2000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
40F0000
|
heap
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
549F000
|
heap
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
6AF000
|
heap
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
27A786DB000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
1C60FC8B000
|
heap
|
page read and write
|
||
550E000
|
heap
|
page read and write
|
||
5FE0000
|
heap
|
page read and write
|
||
63D000
|
heap
|
page read and write
|
||
27A7876E000
|
heap
|
page read and write
|
||
16E56EE7000
|
heap
|
page read and write
|
||
55F5000
|
heap
|
page read and write
|
||
2B39000
|
heap
|
page read and write
|
||
27A786B3000
|
heap
|
page read and write
|
||
7FF62F24B000
|
unkown
|
page readonly
|
||
656000
|
heap
|
page read and write
|
||
4DC000
|
unkown
|
page readonly
|
||
749000
|
heap
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
7FF62F24B000
|
unkown
|
page readonly
|
||
662000
|
heap
|
page read and write
|
||
27A786A8000
|
heap
|
page read and write
|
||
2239AEC7000
|
heap
|
page read and write
|
||
195000
|
stack
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
631000
|
heap
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
2A8D000
|
heap
|
page read and write
|
||
2239AEB0000
|
heap
|
page read and write
|
||
2C4F000
|
heap
|
page read and write
|
||
658000
|
heap
|
page read and write
|
||
556B000
|
heap
|
page read and write
|
||
7FF62F220000
|
unkown
|
page readonly
|
||
5E0000
|
heap
|
page read and write
|
||
7FF62F24B000
|
unkown
|
page readonly
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
16E56EF3000
|
heap
|
page read and write
|
||
701000
|
heap
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
698000
|
heap
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
27A78D57000
|
heap
|
page read and write
|
||
61C000
|
heap
|
page read and write
|
||
519000
|
unkown
|
page readonly
|
||
648000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
6E2000
|
heap
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
541B000
|
heap
|
page read and write
|
||
2199000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
7FF62F221000
|
unkown
|
page execute read
|
||
515BDFE000
|
stack
|
page read and write
|
||
515BEFE000
|
stack
|
page read and write
|
||
62C000
|
heap
|
page read and write
|
||
7FF62F220000
|
unkown
|
page readonly
|
||
16E56EF5000
|
heap
|
page read and write
|
||
432F000
|
stack
|
page read and write
|
||
2239AE43000
|
heap
|
page read and write
|
||
6BE000
|
heap
|
page read and write
|
||
27A78600000
|
heap
|
page read and write
|
||
27A788E1000
|
heap
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
2BC3000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
6CD000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
27A786C8000
|
heap
|
page read and write
|
||
53E0000
|
heap
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
2BBB000
|
heap
|
page read and write
|
||
1F77B740000
|
heap
|
page read and write
|
||
27A788D6000
|
heap
|
page read and write
|
||
27A786CB000
|
heap
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
6F5000
|
heap
|
page read and write
|
||
71E000
|
heap
|
page read and write
|
||
22398E3D000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
73D000
|
heap
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
2239AEDF000
|
heap
|
page read and write
|
||
16E58C70000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
2BA7000
|
heap
|
page read and write
|
||
2239AE6D000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
27A786C8000
|
heap
|
page read and write
|
||
27A786CB000
|
heap
|
page read and write
|
||
647000
|
heap
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
16E58E32000
|
trusted library allocation
|
page read and write
|
||
682000
|
heap
|
page read and write
|
||
553F000
|
heap
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
67B000
|
heap
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
2239AED3000
|
heap
|
page read and write
|
||
65C000
|
heap
|
page read and write
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
638000
|
heap
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
16E56EF3000
|
heap
|
page read and write
|
||
16E58E46000
|
trusted library allocation
|
page read and write
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
6E3000
|
heap
|
page read and write
|
||
5437000
|
heap
|
page read and write
|
||
27A786B6000
|
heap
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
61D000
|
heap
|
page read and write
|
||
2239AE42000
|
heap
|
page read and write
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
636000
|
heap
|
page read and write
|
||
CA5E9FE000
|
stack
|
page read and write
|
||
2A2C000
|
heap
|
page read and write
|
||
16E58CE0000
|
heap
|
page read and write
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
2239AE30000
|
heap
|
page read and write
|
||
16E56ED2000
|
heap
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
636000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2BF6000
|
heap
|
page read and write
|
||
27A7869C000
|
heap
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
16E58E4B000
|
trusted library allocation
|
page read and write
|
||
27A786CB000
|
heap
|
page read and write
|
||
2B38000
|
heap
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
27A786A6000
|
heap
|
page read and write
|
||
27A78750000
|
heap
|
page read and write
|
||
2BFC000
|
heap
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
669000
|
heap
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
27A786C8000
|
heap
|
page read and write
|
||
4101000
|
heap
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
1F77B963000
|
heap
|
page read and write
|
||
2239AE61000
|
heap
|
page read and write
|
||
2BBE000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
1A852729000
|
heap
|
page read and write
|
||
27A7869B000
|
heap
|
page read and write
|
||
6F5000
|
heap
|
page read and write
|
||
667000
|
heap
|
page read and write
|
||
22398E00000
|
heap
|
page read and write
|
||
24344E21000
|
heap
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
8C92FFE000
|
stack
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
2239AEC0000
|
heap
|
page read and write
|
||
27A7893E000
|
heap
|
page read and write
|
||
16E58E4C000
|
trusted library allocation
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
64B000
|
heap
|
page read and write
|
||
22398E07000
|
heap
|
page read and write
|
||
1AC6D180000
|
heap
|
page read and write
|
||
16E58E46000
|
trusted library allocation
|
page read and write
|
||
1AC6EBB4000
|
heap
|
page read and write
|
||
27A786D2000
|
heap
|
page read and write
|
||
71E000
|
heap
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
669000
|
heap
|
page read and write
|
||
27A786BC000
|
heap
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
27A78D54000
|
heap
|
page read and write
|
||
65D000
|
heap
|
page read and write
|
||
55FB000
|
heap
|
page read and write
|
||
1A8541E4000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
16E57000000
|
heap
|
page read and write
|
||
55F7000
|
heap
|
page read and write
|
||
24344E26000
|
heap
|
page read and write
|
||
16E58E46000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
55F2000
|
heap
|
page read and write
|
||
54F5000
|
heap
|
page read and write
|
||
1C60FC97000
|
heap
|
page read and write
|
||
2C47000
|
heap
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
2190000
|
trusted library allocation
|
page read and write
|
||
22398E34000
|
heap
|
page read and write
|
||
61D000
|
heap
|
page read and write
|
||
7FF62F221000
|
unkown
|
page execute read
|
||
62F000
|
heap
|
page read and write
|
||
662000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
27A78869000
|
heap
|
page read and write
|
||
556B000
|
heap
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
65E000
|
heap
|
page read and write
|
||
6F5000
|
heap
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
5607000
|
heap
|
page read and write
|
||
2C47000
|
heap
|
page read and write
|
||
27A786C8000
|
heap
|
page read and write
|
||
2239AEBE000
|
heap
|
page read and write
|
||
6EF000
|
heap
|
page read and write
|
||
27A786B0000
|
heap
|
page read and write
|
||
6B1000
|
heap
|
page read and write
|
||
66E000
|
heap
|
page read and write
|
||
16E58E34000
|
trusted library allocation
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
29D2000
|
heap
|
page read and write
|
||
27A78907000
|
heap
|
page read and write
|
||
2A2D000
|
heap
|
page read and write
|
||
27A78D48000
|
heap
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
2239AEBE000
|
heap
|
page read and write
|
||
16E56F2D000
|
heap
|
page read and write
|
||
55F5000
|
heap
|
page read and write
|
||
69E000
|
heap
|
page read and write
|
||
27A786CF000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
16E58E46000
|
trusted library allocation
|
page read and write
|
||
24344E36000
|
heap
|
page read and write
|
||
27A78758000
|
heap
|
page read and write
|
||
27A78D94000
|
heap
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
7FF62F220000
|
unkown
|
page readonly
|
||
630000
|
heap
|
page read and write
|
||
2760000
|
direct allocation
|
page execute and read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
27A786B3000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
2C85000
|
heap
|
page read and write
|
||
27A786C8000
|
heap
|
page read and write
|
||
29BF000
|
heap
|
page read and write
|
||
24344D10000
|
heap
|
page read and write
|
||
662000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
55F5000
|
heap
|
page read and write
|
||
27A7891A000
|
heap
|
page read and write
|
||
6F8000
|
heap
|
page read and write
|
||
2B8B3FE000
|
stack
|
page read and write
|
||
64A000
|
heap
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
16E588F0000
|
heap
|
page read and write
|
||
641000
|
heap
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
6EE000
|
heap
|
page read and write
|
||
27959DB000
|
stack
|
page read and write
|
||
27A786A9000
|
heap
|
page read and write
|
||
2AD5000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
27960FE000
|
stack
|
page read and write
|
||
64B000
|
heap
|
page read and write
|
||
2A26000
|
heap
|
page read and write
|
||
27A7869C000
|
heap
|
page read and write
|
||
7FF62F246000
|
unkown
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
29C7000
|
heap
|
page read and write
|
||
16E56EEC000
|
heap
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
2BC3000
|
heap
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
F2A697F000
|
stack
|
page read and write
|
||
7FF62F237000
|
unkown
|
page readonly
|
||
1F77B956000
|
heap
|
page read and write
|
||
6B1000
|
heap
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
22398E3D000
|
heap
|
page read and write
|
||
5598000
|
heap
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
FFED0FE000
|
stack
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
27A78D94000
|
heap
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
5595000
|
heap
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
2BB5000
|
heap
|
page read and write
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
2C54000
|
heap
|
page read and write
|
||
2239AEE1000
|
heap
|
page read and write
|
||
16E56F4F000
|
heap
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
1A852750000
|
heap
|
page read and write
|
||
16E56E70000
|
heap
|
page read and write
|
||
1AC6D171000
|
heap
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
2239AE8C000
|
heap
|
page read and write
|
||
6F5000
|
heap
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
27A786CE000
|
heap
|
page read and write
|
||
64C000
|
heap
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
16E56ED7000
|
heap
|
page read and write
|
||
16E56EE8000
|
heap
|
page read and write
|
||
27A7891B000
|
heap
|
page read and write
|
||
27A7868A000
|
heap
|
page read and write
|
||
63C000
|
heap
|
page read and write
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
638000
|
heap
|
page read and write
|
||
6F9000
|
heap
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
609000
|
heap
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
243467D0000
|
heap
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
2190000
|
trusted library allocation
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
27A788C2000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
2239AEE1000
|
heap
|
page read and write
|
||
27A788DB000
|
heap
|
page read and write
|
||
1F77B920000
|
heap
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
CA5E8FE000
|
stack
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
55F9000
|
heap
|
page read and write
|
||
5550000
|
heap
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
515BAFE000
|
stack
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
1F77B820000
|
heap
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
7FF62F220000
|
unkown
|
page readonly
|
||
63D000
|
heap
|
page read and write
|
||
27A786CE000
|
heap
|
page read and write
|
||
27A7893E000
|
heap
|
page read and write
|
||
27A7869E000
|
heap
|
page read and write
|
||
27A7890F000
|
heap
|
page read and write
|
||
2C8E000
|
heap
|
page read and write
|
||
27A788C2000
|
heap
|
page read and write
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
6EF000
|
heap
|
page read and write
|
||
27A78D4D000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
55F9000
|
heap
|
page read and write
|
||
2A8E000
|
heap
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
641000
|
heap
|
page read and write
|
||
27A786CE000
|
heap
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
2230000
|
heap
|
page read and write
|
||
27A786CE000
|
heap
|
page read and write
|
||
638000
|
heap
|
page read and write
|
||
299E000
|
heap
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
2239AE61000
|
heap
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
27A7876D000
|
heap
|
page read and write
|
||
27A78D54000
|
heap
|
page read and write
|
||
5424000
|
heap
|
page read and write
|
||
66B000
|
heap
|
page read and write
|
||
27A786CB000
|
heap
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
27A79080000
|
heap
|
page read and write
|
||
6D5000
|
heap
|
page read and write
|
||
641000
|
heap
|
page read and write
|
||
44AE000
|
stack
|
page read and write
|
||
27A78681000
|
heap
|
page read and write
|
||
27A786B2000
|
heap
|
page read and write
|
||
67B000
|
heap
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
2B75000
|
heap
|
page read and write
|
||
55E2000
|
heap
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
24344C30000
|
heap
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
27A786A9000
|
heap
|
page read and write
|
||
637000
|
heap
|
page read and write
|
||
2239AED3000
|
heap
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
27A7876D000
|
heap
|
page read and write
|
||
22399045000
|
heap
|
page read and write
|
||
638000
|
heap
|
page read and write
|
||
27A78D55000
|
heap
|
page read and write
|
||
197000
|
stack
|
page read and write
|
||
27A786B3000
|
heap
|
page read and write
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
55DA000
|
heap
|
page read and write
|
||
27A786D2000
|
heap
|
page read and write
|
||
1AC6EAC0000
|
heap
|
page read and write
|
||
68D000
|
heap
|
page read and write
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
2BBB000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
660000
|
heap
|
page read and write
|
||
2A8E000
|
heap
|
page read and write
|
||
27A786B6000
|
heap
|
page read and write
|
||
703000
|
heap
|
page read and write
|
||
6FA000
|
heap
|
page read and write
|
||
2239AE3F000
|
heap
|
page read and write
|
||
27A7891F000
|
heap
|
page read and write
|
||
6EA000
|
heap
|
page read and write
|
||
27A786BC000
|
heap
|
page read and write
|
||
27A786CE000
|
heap
|
page read and write
|
||
27A786CE000
|
heap
|
page read and write
|
||
2C68000
|
heap
|
page read and write
|
||
F2A69FE000
|
stack
|
page read and write
|
||
27A786AD000
|
heap
|
page read and write
|
||
27A786CB000
|
heap
|
page read and write
|
||
2C4A000
|
heap
|
page read and write
|
||
27A7885A000
|
heap
|
page read and write
|
||
27A786D2000
|
heap
|
page read and write
|
||
27A786C8000
|
heap
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
6E2000
|
heap
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
2BCF000
|
heap
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
6F5000
|
heap
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
1C60FC66000
|
heap
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
27A786CF000
|
heap
|
page read and write
|
||
6EA000
|
heap
|
page read and write
|
||
29E4000
|
heap
|
page read and write
|
||
2196000
|
heap
|
page read and write
|
||
2BA7000
|
heap
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
1F77B940000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
29E6000
|
heap
|
page read and write
|
||
7FF62F237000
|
unkown
|
page readonly
|
||
27A786CB000
|
heap
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
2239ADF0000
|
heap
|
page read and write
|
||
27A7876D000
|
heap
|
page read and write
|
||
F2A6876000
|
stack
|
page read and write
|
||
2239AE8A000
|
heap
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
27A786AA000
|
heap
|
page read and write
|
||
641000
|
heap
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
27A7874F000
|
heap
|
page read and write
|
||
27A788DE000
|
heap
|
page read and write
|
||
63B000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
27A78694000
|
heap
|
page read and write
|
||
1E702054000
|
heap
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
16E56EED000
|
heap
|
page read and write
|
||
1E70203D000
|
heap
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
647000
|
heap
|
page read and write
|
||
27A786A0000
|
heap
|
page read and write
|
||
2A5C000
|
heap
|
page read and write
|
||
22398E4F000
|
heap
|
page read and write
|
||
2C68000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
2BBB000
|
heap
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
64C000
|
heap
|
page read and write
|
||
658000
|
heap
|
page read and write
|
||
22398DFB000
|
heap
|
page read and write
|
||
27A786AC000
|
heap
|
page read and write
|
||
1E702044000
|
heap
|
page read and write
|
||
27A7876E000
|
heap
|
page read and write
|
||
27A78D54000
|
heap
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
55D2000
|
heap
|
page read and write
|
||
5424000
|
heap
|
page read and write
|
||
22398DC7000
|
heap
|
page read and write
|
||
559A000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
2B63000
|
heap
|
page read and write
|
||
299A000
|
heap
|
page read and write
|
||
2B8B278000
|
stack
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
27A78687000
|
heap
|
page read and write
|
||
27A78D94000
|
heap
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
27A786C8000
|
heap
|
page read and write
|
||
6E9000
|
heap
|
page read and write
|
||
1F77B929000
|
heap
|
page read and write
|
||
2A3D000
|
heap
|
page read and write
|
||
27A786D2000
|
heap
|
page read and write
|
||
6E4000
|
heap
|
page read and write
|
||
2A2D000
|
heap
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
1AC6D110000
|
heap
|
page read and write
|
||
55F7000
|
heap
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
2239AE44000
|
heap
|
page read and write
|
||
519000
|
unkown
|
page readonly
|
||
75A000
|
heap
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
2A8A000
|
heap
|
page read and write
|
||
29D1000
|
heap
|
page read and write
|
||
55F9000
|
heap
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
2B74000
|
heap
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
27A7869F000
|
heap
|
page read and write
|
||
2BBE000
|
heap
|
page read and write
|
||
55AB000
|
heap
|
page read and write
|
||
692000
|
heap
|
page read and write
|
||
547D000
|
heap
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
6CE000
|
heap
|
page read and write
|
||
27A786C8000
|
heap
|
page read and write
|
||
1E702010000
|
heap
|
page read and write
|
||
16E56EEF000
|
heap
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
27A786B6000
|
heap
|
page read and write
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
55A5000
|
heap
|
page read and write
|
||
1E702055000
|
heap
|
page read and write
|
||
16E56F3C000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
2AA8000
|
heap
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
27A786A5000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
27A78869000
|
heap
|
page read and write
|
||
27A786CB000
|
heap
|
page read and write
|
||
519000
|
unkown
|
page readonly
|
||
6DE000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
16E56E90000
|
heap
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
2999000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
22CF000
|
stack
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
16E58E4D000
|
trusted library allocation
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
29CC000
|
heap
|
page read and write
|
||
2BD5000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
16E56EED000
|
heap
|
page read and write
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
22398DC0000
|
heap
|
page read and write
|
||
7FF62F24B000
|
unkown
|
page readonly
|
||
22398E13000
|
heap
|
page read and write
|
||
7FF62F246000
|
unkown
|
page write copy
|
||
24344E00000
|
heap
|
page read and write
|
||
27A786CE000
|
heap
|
page read and write
|
||
70A000
|
heap
|
page read and write
|
||
2239AE5E000
|
heap
|
page read and write
|
||
1F77D320000
|
heap
|
page read and write
|
||
16E56D90000
|
heap
|
page read and write
|
||
1C60FC20000
|
heap
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
27A786D2000
|
heap
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
29D5000
|
heap
|
page read and write
|
||
1E702019000
|
heap
|
page read and write
|
||
6AA000
|
heap
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
CA5E4FE000
|
stack
|
page read and write
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
2239AE95000
|
heap
|
page read and write
|
||
65F000
|
heap
|
page read and write
|
||
27A78907000
|
heap
|
page read and write
|
||
5595000
|
heap
|
page read and write
|
||
29EE000
|
heap
|
page read and write
|
||
27A786BB000
|
heap
|
page read and write
|
||
2B56000
|
heap
|
page read and write
|
||
27A786C8000
|
heap
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
27A78D59000
|
heap
|
page read and write
|
||
643000
|
heap
|
page read and write
|
||
2B8B4FF000
|
stack
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
4DC000
|
unkown
|
page readonly
|
||
54C2000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
27A786B3000
|
heap
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
1A852732000
|
heap
|
page read and write
|
||
FFECDFF000
|
stack
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
559A000
|
heap
|
page read and write
|
||
2C3D000
|
heap
|
page read and write
|
||
64C000
|
heap
|
page read and write
|
||
638000
|
heap
|
page read and write
|
||
546E000
|
heap
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
27A7891A000
|
heap
|
page read and write
|
||
65B000
|
heap
|
page read and write
|
||
27A7868F000
|
heap
|
page read and write
|
||
2190000
|
trusted library allocation
|
page read and write
|
||
4B72CFF000
|
stack
|
page read and write
|
||
556B000
|
heap
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
27A7876D000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
65A000
|
heap
|
page read and write
|
||
6E2000
|
heap
|
page read and write
|
||
632000
|
heap
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
61D000
|
heap
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
27A786B2000
|
heap
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
1A852746000
|
heap
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
6E2000
|
heap
|
page read and write
|
||
2C68000
|
heap
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
2190000
|
trusted library allocation
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
2239AE3A000
|
heap
|
page read and write
|
||
16E56EF3000
|
heap
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
915000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
6F5000
|
heap
|
page read and write
|
||
27A78907000
|
heap
|
page read and write
|
||
27A78D95000
|
heap
|
page read and write
|
||
29F5000
|
heap
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
16E56ECB000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
2C68000
|
heap
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
65C000
|
heap
|
page read and write
|
||
2B63000
|
heap
|
page read and write
|
||
1C611710000
|
heap
|
page read and write
|
||
721000
|
heap
|
page read and write
|
||
2590000
|
direct allocation
|
page execute and read and write
|
||
69B000
|
heap
|
page read and write
|
||
27A78860000
|
heap
|
page read and write
|
||
7FF62F24A000
|
unkown
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
FFED2FE000
|
stack
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
2AA8000
|
heap
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
27A788D9000
|
heap
|
page read and write
|
||
27A786BB000
|
heap
|
page read and write
|
||
1AC6D159000
|
heap
|
page read and write
|
||
665000
|
heap
|
page read and write
|
||
2AB5000
|
heap
|
page read and write
|
||
16E58E46000
|
trusted library allocation
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
27A786A5000
|
heap
|
page read and write
|
||
27A786BC000
|
heap
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
70A000
|
heap
|
page read and write
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
2239AEBE000
|
heap
|
page read and write
|
||
27A786C8000
|
heap
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
27A7876A000
|
heap
|
page read and write
|
||
27A786B3000
|
heap
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
27A786D2000
|
heap
|
page read and write
|
||
22398E3F000
|
heap
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
2239AE42000
|
heap
|
page read and write
|
||
1A852740000
|
heap
|
page read and write
|
||
7FF62F237000
|
unkown
|
page readonly
|
||
6D9000
|
heap
|
page read and write
|
||
2C3D000
|
heap
|
page read and write
|
||
63A000
|
heap
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
27A78936000
|
heap
|
page read and write
|
||
1A854100000
|
heap
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
27A786A5000
|
heap
|
page read and write
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
4AE000
|
unkown
|
page readonly
|
||
7EE000
|
stack
|
page read and write
|
||
22398E02000
|
heap
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
16E56EF3000
|
heap
|
page read and write
|
||
649000
|
heap
|
page read and write
|
||
27A786B1000
|
heap
|
page read and write
|
||
45AF000
|
stack
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
16E56EEF000
|
heap
|
page read and write
|
||
16E56EEE000
|
heap
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
658000
|
heap
|
page read and write
|
||
27A7867B000
|
heap
|
page read and write
|
||
27A786D2000
|
heap
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
27A78909000
|
heap
|
page read and write
|
||
8EE000
|
stack
|
page read and write
|
||
27A78D50000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
16E56EEF000
|
heap
|
page read and write
|
||
6AE000
|
heap
|
page read and write
|
||
7FF62F221000
|
unkown
|
page execute read
|
||
27A78758000
|
heap
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
683000
|
heap
|
page read and write
|
||
6F6000
|
heap
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
2239AED3000
|
heap
|
page read and write
|
||
7FF62F246000
|
unkown
|
page write copy
|
||
661000
|
heap
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
55F5000
|
heap
|
page read and write
|
||
2239AE2C000
|
heap
|
page read and write
|
||
2A01000
|
heap
|
page read and write
|
||
2239AE87000
|
heap
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
27A786AB000
|
heap
|
page read and write
|
||
646000
|
heap
|
page read and write
|
||
42C000
|
unkown
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
27A786B3000
|
heap
|
page read and write
|
||
27A786A2000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
198000
|
stack
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
22398DF0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
27A7891B000
|
heap
|
page read and write
|
||
553F000
|
heap
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
669000
|
heap
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
16E58E39000
|
trusted library allocation
|
page read and write
|
||
70A000
|
heap
|
page read and write
|
||
65E000
|
heap
|
page read and write
|
||
220E000
|
stack
|
page read and write
|
||
6C6000
|
heap
|
page read and write
|
||
27A78869000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
22398E02000
|
heap
|
page read and write
|
||
63C000
|
heap
|
page read and write
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
27A786BB000
|
heap
|
page read and write
|
||
677000
|
heap
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
27A7868F000
|
heap
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
27A786BC000
|
heap
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
27A78758000
|
heap
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
2BCB000
|
heap
|
page read and write
|
||
27A786C8000
|
heap
|
page read and write
|
||
27A786BB000
|
heap
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
65E000
|
heap
|
page read and write
|
||
16E58AA0000
|
heap
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
665000
|
heap
|
page read and write
|
||
27A7869B000
|
heap
|
page read and write
|
||
27A786BB000
|
heap
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
2C56000
|
heap
|
page read and write
|
||
FFECCFC000
|
stack
|
page read and write
|
||
27A78758000
|
heap
|
page read and write
|
||
278F000
|
stack
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
73D000
|
heap
|
page read and write
|
||
27A7868A000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
2239AE8E000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
2239A9A0000
|
heap
|
page read and write
|
||
1F77D2B0000
|
heap
|
page read and write
|
||
2239AED0000
|
heap
|
page read and write
|
||
27A78907000
|
heap
|
page read and write
|
||
6AB000
|
heap
|
page read and write
|
||
27A786BC000
|
heap
|
page read and write
|
||
2A26000
|
heap
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
2200000
|
heap
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
24344E45000
|
heap
|
page read and write
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
27A7869B000
|
heap
|
page read and write
|
||
2B7F000
|
heap
|
page read and write
|
||
6CD000
|
heap
|
page read and write
|
||
70A000
|
heap
|
page read and write
|
||
27A78907000
|
heap
|
page read and write
|
||
2BAB000
|
heap
|
page read and write
|
||
2C4F000
|
heap
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
6F6000
|
heap
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
8F808FF000
|
stack
|
page read and write
|
||
16E56EED000
|
heap
|
page read and write
|
||
7FF62F237000
|
unkown
|
page readonly
|
||
1F77B965000
|
heap
|
page read and write
|
||
27A786D2000
|
heap
|
page read and write
|
||
22398EBC000
|
heap
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
2990000
|
trusted library allocation
|
page read and write
|
||
1F77B932000
|
heap
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
27A786B0000
|
heap
|
page read and write
|
||
27A786CE000
|
heap
|
page read and write
|
||
2239AEA7000
|
heap
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
7FF62F220000
|
unkown
|
page readonly
|
||
55A3000
|
heap
|
page read and write
|
||
2C4A000
|
heap
|
page read and write
|
||
2990000
|
trusted library allocation
|
page read and write
|
||
1AC6D120000
|
heap
|
page read and write
|
||
55DA000
|
heap
|
page read and write
|
||
4B72AFF000
|
stack
|
page read and write
|
||
CA5E7FF000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
63F000
|
heap
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
641000
|
heap
|
page read and write
|
||
16E58E38000
|
trusted library allocation
|
page read and write
|
||
55E1000
|
heap
|
page read and write
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
27A786F6000
|
heap
|
page read and write
|
||
27A786BC000
|
heap
|
page read and write
|
||
6F6000
|
heap
|
page read and write
|
||
27A786A4000
|
heap
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
22399040000
|
heap
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
2B5C000
|
heap
|
page read and write
|
||
60B000
|
heap
|
page read and write
|
||
643000
|
heap
|
page read and write
|
||
65B000
|
heap
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
27A786A9000
|
heap
|
page read and write
|
||
5595000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
268E000
|
stack
|
page read and write
|
||
2239AEBC000
|
heap
|
page read and write
|
||
27A78D5F000
|
heap
|
page read and write
|
||
27A785D0000
|
heap
|
page read and write
|
||
669000
|
heap
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
27A786A5000
|
heap
|
page read and write
|
||
2BEE000
|
heap
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
16E58B40000
|
heap
|
page read and write
|
||
16E56EED000
|
heap
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
267F000
|
stack
|
page read and write
|
||
69F000
|
heap
|
page read and write
|
||
5598000
|
heap
|
page read and write
|
||
54B000
|
heap
|
page read and write
|
||
2B38000
|
heap
|
page read and write
|
||
24344E47000
|
heap
|
page read and write
|
||
16E56EEE000
|
heap
|
page read and write
|
||
6EF000
|
heap
|
page read and write
|
||
2BBB000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
64B000
|
heap
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
695000
|
heap
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
6CD000
|
heap
|
page read and write
|
||
24344E20000
|
heap
|
page read and write
|
||
27A786BB000
|
heap
|
page read and write
|
||
6B1000
|
heap
|
page read and write
|
||
2BCB000
|
heap
|
page read and write
|
||
16E56EED000
|
heap
|
page read and write
|
||
16E58E37000
|
trusted library allocation
|
page read and write
|
||
5408000
|
heap
|
page read and write
|
||
27A786E6000
|
heap
|
page read and write
|
||
7FF62F221000
|
unkown
|
page execute read
|
||
16E56F2B000
|
heap
|
page read and write
|
||
27A786C8000
|
heap
|
page read and write
|
||
639000
|
heap
|
page read and write
|
||
636000
|
heap
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
6E6000
|
heap
|
page read and write
|
||
7FF62F24B000
|
unkown
|
page readonly
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
22398E10000
|
heap
|
page read and write
|
||
27A7875A000
|
heap
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
27A786CE000
|
heap
|
page read and write
|
||
663000
|
heap
|
page read and write
|
||
5604000
|
heap
|
page read and write
|
||
2239AE9C000
|
heap
|
page read and write
|
||
27A7869B000
|
heap
|
page read and write
|
||
1A852759000
|
heap
|
page read and write
|
||
2AB2000
|
heap
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
69F000
|
heap
|
page read and write
|
||
16E57070000
|
heap
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
55AB000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
55F7000
|
heap
|
page read and write
|
||
27A786B0000
|
heap
|
page read and write
|
||
27A78767000
|
heap
|
page read and write
|
||
739000
|
heap
|
page read and write
|
||
2239AE44000
|
heap
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
1AC6D185000
|
heap
|
page read and write
|
||
632000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
55FB000
|
heap
|
page read and write
|
||
16E58E46000
|
trusted library allocation
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
552E000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
27A7885C000
|
heap
|
page read and write
|
||
2795CFF000
|
stack
|
page read and write
|
||
7FF62F220000
|
unkown
|
page readonly
|
||
27A78910000
|
heap
|
page read and write
|
||
7FF62F237000
|
unkown
|
page readonly
|
||
2BFC000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
2239AE61000
|
heap
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
2239AED0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
27A786C0000
|
heap
|
page read and write
|
||
6DC000
|
heap
|
page read and write
|
||
16E56EED000
|
heap
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
7FF62F246000
|
unkown
|
page read and write
|
||
421000
|
unkown
|
page readonly
|
||
673000
|
heap
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
27A788D9000
|
heap
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
27A786CF000
|
heap
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
2239AE43000
|
heap
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
636000
|
heap
|
page read and write
|
||
681000
|
heap
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
421000
|
unkown
|
page readonly
|
||
24344E26000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
2BEC000
|
heap
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
548F000
|
heap
|
page read and write
|
||
5606000
|
heap
|
page read and write
|
||
1C60FBE0000
|
heap
|
page read and write
|
||
27A786CE000
|
heap
|
page read and write
|
||
2239B290000
|
heap
|
page read and write
|
||
16E56F31000
|
heap
|
page read and write
|
||
6C2000
|
heap
|
page read and write
|
||
2B45000
|
heap
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
27A786CE000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
2A8D000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
22398E07000
|
heap
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
16E58E4F000
|
trusted library allocation
|
page read and write
|
||
1AC6D178000
|
heap
|
page read and write
|
||
45B0000
|
trusted library allocation
|
page read and write
|
||
661000
|
heap
|
page read and write
|
||
7FF62F220000
|
unkown
|
page readonly
|
||
7FF62F24A000
|
unkown
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
27A786B0000
|
heap
|
page read and write
|
||
64C000
|
heap
|
page read and write
|
||
27A78D57000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
1A852759000
|
heap
|
page read and write
|
||
5424000
|
heap
|
page read and write
|
||
16E58E46000
|
trusted library allocation
|
page read and write
|
||
65C000
|
heap
|
page read and write
|
||
6B1000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
2BA6000
|
heap
|
page read and write
|
||
4AE000
|
unkown
|
page readonly
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
27A786B0000
|
heap
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
27A78869000
|
heap
|
page read and write
|
||
2C55000
|
heap
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
1A85275E000
|
heap
|
page read and write
|
||
27A786D2000
|
heap
|
page read and write
|
||
27A786CB000
|
heap
|
page read and write
|
||
16E56EED000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
22398DFC000
|
heap
|
page read and write
|
||
6AB000
|
heap
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
6D9000
|
heap
|
page read and write
|
||
27A786B2000
|
heap
|
page read and write
|
||
2239DDF0000
|
trusted library allocation
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
631000
|
heap
|
page read and write
|
||
27A786A9000
|
heap
|
page read and write
|
||
65E000
|
heap
|
page read and write
|
||
6F5000
|
heap
|
page read and write
|
||
2239AE8A000
|
heap
|
page read and write
|
||
6E4000
|
heap
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
559A000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
16E58E46000
|
trusted library allocation
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
2C8E000
|
heap
|
page read and write
|
||
27A786E6000
|
heap
|
page read and write
|
||
63C000
|
heap
|
page read and write
|
||
16E58E46000
|
trusted library allocation
|
page read and write
|
||
29E3000
|
heap
|
page read and write
|
||
2239AEBE000
|
heap
|
page read and write
|
||
546E000
|
heap
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
22398D20000
|
heap
|
page read and write
|
||
1A852759000
|
heap
|
page read and write
|
||
277F000
|
stack
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
22398E01000
|
heap
|
page read and write
|
||
6A6000
|
heap
|
page read and write
|
||
2990000
|
trusted library allocation
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
4DC000
|
unkown
|
page readonly
|
||
700000
|
heap
|
page read and write
|
||
2239AE3A000
|
heap
|
page read and write
|
||
1A852680000
|
heap
|
page read and write
|
||
7FF62F237000
|
unkown
|
page readonly
|
||
2C4E000
|
heap
|
page read and write
|
||
632000
|
heap
|
page read and write
|
||
8F805FF000
|
stack
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
27A7868A000
|
heap
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
27A78769000
|
heap
|
page read and write
|
||
27A786B0000
|
heap
|
page read and write
|
||
647000
|
heap
|
page read and write
|
||
2239AE39000
|
heap
|
page read and write
|
||
22398DF8000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
6EF000
|
heap
|
page read and write
|
||
27A786B7000
|
heap
|
page read and write
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
63D000
|
heap
|
page read and write
|
||
22398E1D000
|
heap
|
page read and write
|
||
4D7000
|
unkown
|
page read and write
|
||
29E3000
|
heap
|
page read and write
|
||
27A78D94000
|
heap
|
page read and write
|
||
7FF62F221000
|
unkown
|
page execute read
|
||
27A786A5000
|
heap
|
page read and write
|
||
16E56EED000
|
heap
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
27A7893E000
|
heap
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
641000
|
heap
|
page read and write
|
||
2A9E000
|
heap
|
page read and write
|
||
27A78910000
|
heap
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
62C000
|
heap
|
page read and write
|
||
2239AEA7000
|
heap
|
page read and write
|
||
27A7890F000
|
heap
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
16E56EED000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
16E56ED7000
|
heap
|
page read and write
|
||
16E58E45000
|
trusted library allocation
|
page read and write
|
||
671000
|
heap
|
page read and write
|
||
27A786A6000
|
heap
|
page read and write
|
||
6F5000
|
heap
|
page read and write
|
||
27A78D45000
|
heap
|
page read and write
|
||
2239AE30000
|
heap
|
page read and write
|
||
63A000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
2239AE67000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
27A786A9000
|
heap
|
page read and write
|
||
2C3D000
|
heap
|
page read and write
|
||
2BFC000
|
heap
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
65C000
|
heap
|
page read and write
|
||
749000
|
heap
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
643000
|
heap
|
page read and write
|
||
686000
|
heap
|
page read and write
|
||
63D000
|
heap
|
page read and write
|
||
22398E3F000
|
heap
|
page read and write
|
||
27A786A4000
|
heap
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
16E56F01000
|
heap
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
2239AE7A000
|
heap
|
page read and write
|
||
5401000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
61A000
|
heap
|
page read and write
|
||
273C000
|
stack
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
4ED5000
|
heap
|
page read and write
|
||
27A7869F000
|
heap
|
page read and write
|
||
16E58E40000
|
trusted library allocation
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
6EF000
|
heap
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
69A000
|
heap
|
page read and write
|
||
42F000
|
unkown
|
page readonly
|
||
55DF000
|
heap
|
page read and write
|
||
659000
|
heap
|
page read and write
|
||
16E58E46000
|
trusted library allocation
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
1C60FC96000
|
heap
|
page read and write
|
||
1C60FC6C000
|
heap
|
page read and write
|
||
27A786CE000
|
heap
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
16E58E46000
|
trusted library allocation
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
27A786CF000
|
heap
|
page read and write
|
||
27A78D54000
|
heap
|
page read and write
|
||
16E58E4E000
|
trusted library allocation
|
page read and write
|
||
24344E47000
|
heap
|
page read and write
|
||
2239AE29000
|
heap
|
page read and write
|
||
27A78D40000
|
heap
|
page read and write
|
||
2239AEA7000
|
heap
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
16E58E46000
|
trusted library allocation
|
page read and write
|
||
27A786C8000
|
heap
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
2BB5000
|
heap
|
page read and write
|
||
27A7874D000
|
heap
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
27A78D41000
|
heap
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
721000
|
heap
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
6BC000
|
heap
|
page read and write
|
||
4B72BFF000
|
stack
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
24344E31000
|
heap
|
page read and write
|
||
54C5000
|
heap
|
page read and write
|
||
6D3000
|
heap
|
page read and write
|
||
42F000
|
unkown
|
page readonly
|
||
8C92BFF000
|
stack
|
page read and write
|
||
2B63000
|
heap
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
16E57024000
|
trusted library allocation
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
27A786CB000
|
heap
|
page read and write
|
||
8F806FE000
|
stack
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
638000
|
heap
|
page read and write
|
||
2239AEC4000
|
heap
|
page read and write
|
||
27A78D42000
|
heap
|
page read and write
|
||
27A789F5000
|
heap
|
page read and write
|
||
16E58E46000
|
trusted library allocation
|
page read and write
|
||
2C4D000
|
heap
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
2BCF000
|
heap
|
page read and write
|
||
553F000
|
heap
|
page read and write
|
||
16E56EED000
|
heap
|
page read and write
|
||
55AC000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
27A7890F000
|
heap
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
2239AE3A000
|
heap
|
page read and write
|
||
641000
|
heap
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
1A852746000
|
heap
|
page read and write
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
27A786B0000
|
heap
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
16E58E42000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
27A786BC000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
1E7038E0000
|
heap
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
6DA000
|
heap
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
1A85276B000
|
heap
|
page read and write
|
||
27A78766000
|
heap
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
2C7A000
|
heap
|
page read and write
|
||
2990000
|
trusted library allocation
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
16E56EF3000
|
heap
|
page read and write
|
||
509000
|
unkown
|
page readonly
|
||
2239AED3000
|
heap
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
2190000
|
trusted library allocation
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
1AC6D185000
|
heap
|
page read and write
|
||
551E000
|
heap
|
page read and write
|
||
16E57020000
|
trusted library allocation
|
page read and write
|
||
55DA000
|
heap
|
page read and write
|
||
632000
|
heap
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page read and write
|
||
2990000
|
trusted library allocation
|
page read and write
|
||
632000
|
heap
|
page read and write
|
||
2239AE5E000
|
heap
|
page read and write
|
||
7FF62F237000
|
unkown
|
page readonly
|
||
656000
|
heap
|
page read and write
|
||
27A786B0000
|
heap
|
page read and write
|
||
6B1000
|
heap
|
page read and write
|
||
27A786C4000
|
heap
|
page read and write
|
||
16E56F3E000
|
heap
|
page read and write
|
||
27A786A9000
|
heap
|
page read and write
|
||
1AC6D185000
|
heap
|
page read and write
|
||
27A78916000
|
heap
|
page read and write
|
||
6AA000
|
heap
|
page read and write
|
||
27A786E4000
|
heap
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
633000
|
heap
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
55FC000
|
heap
|
page read and write
|
||
65F000
|
heap
|
page read and write
|
||
61A000
|
heap
|
page read and write
|
||
16E56F03000
|
heap
|
page read and write
|
||
64C000
|
heap
|
page read and write
|
||
27A786B7000
|
heap
|
page read and write
|
||
7FF62F221000
|
unkown
|
page execute read
|
||
658000
|
heap
|
page read and write
|
||
16E58E43000
|
trusted library allocation
|
page read and write
|
||
27A786C8000
|
heap
|
page read and write
|
||
632000
|
heap
|
page read and write
|
||
2239AE29000
|
heap
|
page read and write
|
||
27A78909000
|
heap
|
page read and write
|
||
16E58E3B000
|
trusted library allocation
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
27A786CB000
|
heap
|
page read and write
|
||
61D000
|
heap
|
page read and write
|
||
55FB000
|
heap
|
page read and write
|
||
16E56EF1000
|
heap
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
669000
|
heap
|
page read and write
|
||
16E56EE8000
|
heap
|
page read and write
|
||
16E570A0000
|
heap
|
page read and write
|
||
29D2000
|
heap
|
page read and write
|
||
6F3000
|
heap
|
page read and write
|
||
55F5000
|
heap
|
page read and write
|
||
4A30000
|
direct allocation
|
page execute and read and write
|
||
16E58E44000
|
trusted library allocation
|
page read and write
|
||
27A78909000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
16E58E3A000
|
trusted library allocation
|
page read and write
|
||
24344E36000
|
heap
|
page read and write
|
||
22398E3F000
|
heap
|
page read and write
|
||
7FF62F221000
|
unkown
|
page execute read
|
||
6E2000
|
heap
|
page read and write
|
||
29DB000
|
heap
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
2239AECC000
|
heap
|
page read and write
|
||
658000
|
heap
|
page read and write
|
||
29BE000
|
heap
|
page read and write
|
||
7FF62F24A000
|
unkown
|
page read and write
|
||
27A7868A000
|
heap
|
page read and write
|
||
27A786CE000
|
heap
|
page read and write
|
||
16E56EF5000
|
heap
|
page read and write
|
||
2A9E000
|
heap
|
page read and write
|
||
68A000
|
heap
|
page read and write
|
||
27A786CB000
|
heap
|
page read and write
|
||
16E56F2F000
|
heap
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
27A78841000
|
heap
|
page read and write
|
||
16E58E49000
|
trusted library allocation
|
page read and write
|
||
2BCB000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
16E58B30000
|
heap
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
7FF62F24A000
|
unkown
|
page read and write
|
||
16E58E3E000
|
trusted library allocation
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
64C000
|
heap
|
page read and write
|
||
2C4D000
|
heap
|
page read and write
|
||
29CD000
|
heap
|
page read and write
|
||
27A78685000
|
heap
|
page read and write
|
||
27A786BB000
|
heap
|
page read and write
|
||
4ED0000
|
heap
|
page read and write
|
||
16E58E3D000
|
trusted library allocation
|
page read and write
|
||
61D000
|
heap
|
page read and write
|
||
7FF62F24B000
|
unkown
|
page readonly
|
||
69B000
|
heap
|
page read and write
|
||
27A786CE000
|
heap
|
page read and write
|
||
7FF62F24B000
|
unkown
|
page readonly
|
||
2740000
|
trusted library allocation
|
page read and write
|
||
73D000
|
heap
|
page read and write
|
||
2C16000
|
heap
|
page read and write
|
||
27A78D4A000
|
heap
|
page read and write
|
||
27A786C0000
|
heap
|
page read and write
|
||
1F77D324000
|
heap
|
page read and write
|
||
27A786CB000
|
heap
|
page read and write
|
||
2239AEBE000
|
heap
|
page read and write
|
||
27A7885D000
|
heap
|
page read and write
|
||
2BBD000
|
heap
|
page read and write
|
||
16E58E3F000
|
trusted library allocation
|
page read and write
|
||
45B0000
|
trusted library section
|
page read and write
|
||
27A786C8000
|
heap
|
page read and write
|
||
16E58E3C000
|
trusted library allocation
|
page read and write
|
||
29BD000
|
heap
|
page read and write
|
||
692000
|
heap
|
page read and write
|
||
16E56F2B000
|
heap
|
page read and write
|
||
16E58E41000
|
trusted library allocation
|
page read and write
|
||
27A786CB000
|
heap
|
page read and write
|
There are 2532 hidden memdumps, click here to show them.