Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
INVOICE31401001340.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Program Files\RepairTech\LiveAgent\SyncroLive.Agent.Runner.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\SyncroLive.Service.Runner.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\System.Management.Automation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\Syncro.Service.Runner.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\Update.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Microsoft.Win32.TaskScheduler.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Telerik.Windows.Controls.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Microsoft.Win32.TaskScheduler.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Telerik.Windows.Controls.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Syncro\bin\Syncro.Overmind.Service.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Syncro.Installer.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\CSharpFunctionalExtensions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Cassia.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\DeltaCompressionDotNet.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Destructurama.Attributed.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\FluentCommandLineParser.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Flurl.Http.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Flurl.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Interop.NetFwTypeLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\JetBrains.Annotations.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Microsoft.Data.Edm.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Microsoft.Data.OData.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Microsoft.Data.Services.Client.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Microsoft.Web.XmlTransform.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Mixpanel.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Mono.Cecil.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\NuGet.Squirrel.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\OpenHardwareMonitorLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\RepairTech.Common.Tools.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\RepairTech.Common.Wpf.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\RollbarSharp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Serilog.Formatting.Compact.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Serilog.Sinks.Console.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Serilog.Sinks.File.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Serilog.Sinks.Literate.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Serilog.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SharpCompress.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SharpDX.DXGI.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SharpDX.Direct3D11.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SharpDX.Mathematics.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SharpDX.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Splat.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Squirrel.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SyncroLive.Agent.Runner.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SyncroLive.Agent.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SyncroLive.Agent.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SyncroLive.Interface.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SyncroLive.Interface.dll.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SyncroLive.Service.Runner.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SyncroLive.Service.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SyncroLive.Service.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SyncroLive.WindowsInput.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\System.Numerics.Vectors.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\System.Runtime.CompilerServices.Unsafe.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\System.Runtime.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\System.Spatial.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\System.ValueTuple.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Topshelf.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\UrlCombineLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\WebRTC.NET.SDK.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\ZetaLongPaths.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\config.json (copy)
|
JSON data
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\config.json.{83e6fab5-4386-4338-bfa9-f383adf3dcd4}
|
JSON data
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\deniszykov.WebSocketListener.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\x64\WebRTC.Native.Internal.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\x64\turbojpeg.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\x86\WebRTC.Native.Internal.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\x86\turbojpeg.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635\OpenHardwareMonitorLib.sys
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\CSharpFunctionalExtensions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Cassia.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\DeltaCompressionDotNet.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Destructurama.Attributed.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\FluentCommandLineParser.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Flurl.Http.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Flurl.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Interop.NetFwTypeLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\JetBrains.Annotations.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Microsoft.Web.XmlTransform.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Mono.Cecil.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\NuGet.Squirrel.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\OpenHardwareMonitorLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\RepairTech.Common.Tools.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\RepairTech.Common.Wpf.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\RollbarSharp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Serilog.Formatting.Compact.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Serilog.Sinks.Console.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Serilog.Sinks.File.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Serilog.Sinks.Literate.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Serilog.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SharpDX.DXGI.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SharpDX.Direct3D11.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SharpDX.Mathematics.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SharpDX.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Splat.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Squirrel.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SyncroLive.Agent.Runner.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SyncroLive.Agent.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SyncroLive.Agent.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SyncroLive.Interface.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SyncroLive.Interface.dll.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SyncroLive.Service.Runner.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SyncroLive.Service.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SyncroLive.Service.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SyncroLive.WindowsInput.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\System.Management.Automation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\System.Numerics.Vectors.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\System.Runtime.CompilerServices.Unsafe.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\System.Runtime.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\System.ValueTuple.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Topshelf.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\UrlCombineLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\WebRTC.NET.SDK.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\ZetaLongPaths.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\config.json (copy)
|
JSON data
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\config.json.{f7b140d2-12d9-49a3-9446-2dafaa3ccd88}
|
JSON data
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\deniszykov.WebSocketListener.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\x64\WebRTC.Native.Internal.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\x64\turbojpeg.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\x86\WebRTC.Native.Internal.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\x86\turbojpeg.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\LiveAgent\packages\RELEASES
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\Syncro.App.Runner.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\Syncro.Service.Runner.InstallState
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\7za-x64.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\7za-x86.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Autofac.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\CSharpFunctionalExtensions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\DeltaCompressionDotNet.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Destructurama.Attributed.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\FluentCommandLineParser.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Flurl.Http.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Flurl.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ICSharpCode.SharpZipLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Images\chat-bubbles-icon.png
|
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Images\custom-logo.png
|
PNG image data, 500 x 120, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Images\kabuto-logo.ico
|
MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Interop.IWshRuntimeLibrary.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Interop.NetFwTypeLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Interop.WUApiLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Itenso.TimePeriod.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\JetBrains.Annotations.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\MetroFramework.Fonts.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\MetroFramework.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Microsoft.Bcl.AsyncInterfaces.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Microsoft.Data.Edm.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Microsoft.Data.OData.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Microsoft.Data.Services.Client.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Microsoft.Web.XmlTransform.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Mono.Cecil.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\NuGet.Squirrel.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Phoenix.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\RepairTech.Common.Tools.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\RepairTech.Common.Wpf.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\RestSharp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\RollbarSharp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Serilog.Formatting.Compact.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Serilog.Sinks.Console.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Serilog.Sinks.File.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Serilog.Sinks.Literate.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Serilog.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\SevenZipSharp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\SharpCompress.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\SharpSnmpLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Splat.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Squirrel.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.App.Runner.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.App.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.App.dll.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Contracts.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Service.Configuration.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Service.Interfaces.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Service.Models.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Service.Runner.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Service.Services.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Service.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Service.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Tools.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Uninstaller.Tools.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Uninstaller.Tools.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Uninstaller.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Uninstaller.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\System.Net.WebSockets.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\System.Runtime.CompilerServices.Unsafe.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\System.Runtime.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\System.Security.Cryptography.Algorithms.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\System.Security.Cryptography.Encoding.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\System.Security.Cryptography.Primitives.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\System.Security.Cryptography.X509Certificates.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\System.Spatial.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\System.Threading.Tasks.Extensions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\System.ValueTuple.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Telerik.Windows.Controls.ConversationalUI.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Telerik.Windows.Controls.Input.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Telerik.Windows.Controls.Navigation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Telerik.Windows.Data.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\UrlCombineLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ar-SA\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\config.json
|
JSON data
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\cs-CZ\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\da-DK\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\de-DE\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\de\Microsoft.Data.Edm.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\de\Microsoft.Data.OData.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\de\Microsoft.Data.Services.Client.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\de\System.Spatial.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\el-GR\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\en\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\en\Syncro.Uninstaller.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\es-ES\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\es\Microsoft.Data.Edm.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\es\Microsoft.Data.OData.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\es\Microsoft.Data.Services.Client.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\es\System.Spatial.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\fi-FI\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\fr-FR\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\fr\Microsoft.Data.Edm.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\fr\Microsoft.Data.OData.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\fr\Microsoft.Data.Services.Client.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\fr\System.Spatial.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\it-IT\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\it\Microsoft.Data.Edm.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\it\Microsoft.Data.OData.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\it\Microsoft.Data.Services.Client.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\it\System.Spatial.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ja-JP\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ja\Microsoft.Data.Edm.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ja\Microsoft.Data.OData.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ja\Microsoft.Data.Services.Client.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ja\System.Spatial.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ko\Microsoft.Data.Edm.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ko\Microsoft.Data.OData.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ko\Microsoft.Data.Services.Client.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ko\System.Spatial.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\nl-NL\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\pt-BR\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ru-RU\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ru\Microsoft.Data.Edm.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ru\Microsoft.Data.OData.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ru\Microsoft.Data.Services.Client.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ru\System.Spatial.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\sl-SI\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\websocket-sharp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\zh-CHS\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\zh-Hans\Microsoft.Data.Edm.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\zh-Hans\Microsoft.Data.OData.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\zh-Hans\Microsoft.Data.Services.Client.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\zh-Hans\System.Spatial.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\zh-Hant\Microsoft.Data.Edm.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\zh-Hant\Microsoft.Data.OData.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\zh-Hant\Microsoft.Data.Services.Client.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\zh-Hant\System.Spatial.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\7za-x64.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\7za-x86.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Autofac.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\CSharpFunctionalExtensions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\DeltaCompressionDotNet.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Destructurama.Attributed.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\FluentCommandLineParser.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Flurl.Http.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Flurl.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\ICSharpCode.SharpZipLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Images\chat-bubbles-icon.png
|
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Images\custom-logo.png
|
PNG image data, 500 x 120, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Images\kabuto-logo.ico
|
MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Interop.IWshRuntimeLibrary.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Interop.NetFwTypeLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Interop.WUApiLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Itenso.TimePeriod.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\JetBrains.Annotations.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\MetroFramework.Fonts.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\MetroFramework.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Microsoft.Bcl.AsyncInterfaces.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Microsoft.Web.XmlTransform.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Mono.Cecil.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\NuGet.Squirrel.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Phoenix.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\RepairTech.Common.Tools.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\RepairTech.Common.Wpf.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\RollbarSharp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Serilog.Formatting.Compact.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Serilog.Sinks.Console.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Serilog.Sinks.File.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Serilog.Sinks.Literate.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Serilog.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\SevenZipSharp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\SharpSnmpLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Splat.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Squirrel.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.App.Runner.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.App.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.App.dll.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Contracts.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Service.Configuration.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Service.Interfaces.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Service.Models.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Service.Runner.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Service.Services.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Service.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Service.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Tools.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Uninstaller.Tools.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Uninstaller.Tools.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Uninstaller.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Uninstaller.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\System.Net.WebSockets.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\System.Runtime.CompilerServices.Unsafe.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\System.Runtime.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\System.Security.Cryptography.Algorithms.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\System.Security.Cryptography.Encoding.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\System.Security.Cryptography.Primitives.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\System.Security.Cryptography.X509Certificates.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\System.Threading.Tasks.Extensions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\System.ValueTuple.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Telerik.Windows.Controls.ConversationalUI.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Telerik.Windows.Controls.Input.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Telerik.Windows.Controls.Navigation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Telerik.Windows.Data.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\UrlCombineLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\ar-SA\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\config.json
|
JSON data
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\cs-CZ\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\da-DK\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\de-DE\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\el-GR\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\en\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\en\Syncro.Uninstaller.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\es-ES\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\fi-FI\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\fr-FR\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\it-IT\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\ja-JP\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\nl-NL\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\pt-BR\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\ru-RU\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\sl-SI\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\websocket-sharp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\zh-CHS\Syncro.App.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\install.bat
|
DOS batch file, ASCII text
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\packages\.betaId
|
Unicode text, UTF-8 (with BOM) text, with no line terminators
|
dropped
|
||
C:\Program Files\RepairTech\Syncro\packages\RELEASES
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Program Files\RepairTech\Syncro\packages\Syncro-1.0.181.14910-full.nupkg
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage user DataBase, version 0x620, checksum 0x1df5cfb6, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\ProgramData\Syncro\Images\logo.ico (copy)
|
MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Syncro\bin\FilePusher.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Syncro\bin\module.psm1
|
ASCII text
|
dropped
|
||
C:\ProgramData\Syncro\data\OsPatchState.json (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\data\OsPatchState.json~
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\live\fileIndex.db
|
data
|
dropped
|
||
C:\ProgramData\Syncro\live\jobs.json
|
Unicode text, UTF-8 (with BOM) text, with no line terminators
|
modified
|
||
C:\ProgramData\Syncro\logs\MasterInstaller.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Overmind.Service20240318.log
|
ASCII text, with very long lines (616), with CRLF, LF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Overmind.Service20240319.log
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Overmind.Service20240320.log
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Overmind.Service20240321.log
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Overmind.Service20240322.log
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Overmind.Service20240323.log
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Overmind.Service20240324.log
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Overmind.Service20240325.log
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Overmind.Service20240326.log
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Overmind.Service20240330.log
|
ASCII text, with very long lines (346), with CRLF, LF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Overmind.Service20240401.log
|
ASCII text, with very long lines (346), with CRLF, LF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Overmind.Service20240402.log
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Overmind.Service20240403.log
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\ServiceInstall.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Syncro.App.Runner20240318.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Syncro.App.Runner20240318_001.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Syncro.App.Runner20240318_002.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Syncro.App.Runner20240318_003.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Syncro.Installer20240318.log
|
ASCII text, with very long lines (314), with CRLF, LF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Syncro.Installer20240319.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Syncro.Service.Runner.OsPatching20240318.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Syncro.Service.Runner.OsPatching20240321.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Syncro.Service.Runner.OsPatching20240323.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Syncro.Service.Runner20240318.log
|
ASCII text, with very long lines (3310), with CRLF, LF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Syncro.Service.Runner20240321.log
|
ASCII text, with very long lines (3310), with CRLF, LF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Syncro.Service.Runner20240323.log
|
ASCII text, with very long lines (3310), with CRLF, LF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Syncro.Squirrel20240321.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\Syncro.Squirrel20240323.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\SyncroLive.Agent.Runner20240318.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\logs\SyncroLive.Service.Runner20240318.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Syncro\servicing\settings.json
|
JSON data
|
dropped
|
||
C:\ProgramData\Syncro\servicing\state.json
|
JSON data
|
dropped
|
||
C:\ProgramData\Syncro\servicing\syncro-live\14351\579a4ca214cab85642c04191f0f9c60a545dfe52 (copy)
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\ProgramData\Syncro\servicing\syncro-live\14351\579a4ca214cab85642c04191f0f9c60a545dfe52.{a7a99be3-713c-4f38-9392-50ab807d5dff}
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\ProgramData\Syncro\servicing\syncro-live\14351\daf9d05bc8a143caaf28a6f3fcd8b2b3ef4e8d2c (copy)
|
JSON data
|
dropped
|
||
C:\ProgramData\Syncro\servicing\syncro-live\14351\daf9d05bc8a143caaf28a6f3fcd8b2b3ef4e8d2c.{28bd2bb7-2b22-416f-a2b4-fa35c81f4b9e}
|
JSON data
|
dropped
|
||
C:\ProgramData\Syncro\servicing\syncro-live\15635\1c8b8747f6ff4443826ef247fb38a0acf65f6fd5 (copy)
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\ProgramData\Syncro\servicing\syncro-live\15635\1c8b8747f6ff4443826ef247fb38a0acf65f6fd5.{39d88cc8-edc3-4870-8524-a4d4b7b6565f}
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\ProgramData\Syncro\servicing\syncro-live\15635\d1c2d20629337d9b3497876f2cf88255468a83bc (copy)
|
JSON data
|
dropped
|
||
C:\ProgramData\Syncro\servicing\syncro-live\15635\d1c2d20629337d9b3497876f2cf88255468a83bc.{454cfae1-0675-4d4b-a40e-f324e7271b4c}
|
JSON data
|
dropped
|
||
C:\ProgramData\Syncro\servicing\syncro-main\14910\43cf91f6e057b0461972589d155b71d28edb5e3e (copy)
|
JSON data
|
dropped
|
||
C:\ProgramData\Syncro\servicing\syncro-main\14910\43cf91f6e057b0461972589d155b71d28edb5e3e.{40799c32-84c7-47c8-95b8-b0d30e3fe8e7}
|
JSON data
|
dropped
|
||
C:\ProgramData\Syncro\servicing\syncro-main\15915\326795e1b86bb2193560447e382b4458fa1d08f2 (copy)
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\ProgramData\Syncro\servicing\syncro-main\15915\326795e1b86bb2193560447e382b4458fa1d08f2.{727e79d2-4c2a-4ed0-ba95-523cd86fba19}
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\ProgramData\Syncro\servicing\syncro-main\15915\cf1c68760b94cd372a163767f9713bde6bc27f2e (copy)
|
JSON data
|
dropped
|
||
C:\ProgramData\Syncro\servicing\syncro-main\15915\cf1c68760b94cd372a163767f9713bde6bc27f2e.{4a938cb5-ccc5-4fd7-8d75-663794ae1412}
|
JSON data
|
dropped
|
||
C:\ProgramData\Syncro\servicing\targetInventory.json
|
JSON data
|
dropped
|
||
C:\ProgramData\Syncro\watchdogs\MainService.watchdog
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Syncro\watchdogs\MainServiceUpdater.watchdog
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\INVOICE31401001340.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\InstallUtil.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Syncro.Installer.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpBECD.tmp
|
MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Syncro.Overmind.Service.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Syncro.Service.Runner.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\.squirrel-lock-7A0B58A6894AA1EDC6355A09A90118E336F92621
|
ISO-8859 text, with CR line terminators
|
dropped
|
||
C:\Windows\Temp\tmp3A5F.tmp
|
MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
|
dropped
|
||
C:\Windows\Temp\tmp5D44.tmp
|
MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
|
dropped
|
||
C:\Windows\Temp\tmp6759.tmp
|
MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
|
dropped
|
||
C:\Windows\Temp\tmp89B8.tmp
|
MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
|
dropped
|
||
C:\Windows\Temp\tmpF3F9.tmp
|
MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
|
dropped
|
There are 410 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\INVOICE31401001340.exe
|
C:\Users\user\Desktop\INVOICE31401001340.exe
|
||
C:\Users\user\AppData\Local\Temp\Syncro.Installer.exe
|
"C:\Users\user\AppData\Local\Temp\Syncro.Installer.exe" --jwt-payload eyJ0eXAiOiJKV1QiLCJhbGciOiJFUzI1NiJ9.eyJ2ZXJzaW9uIjoxLCJpbnN0YWxsIjp7InNob3AiOiIycHJPZFM2MWItc1FTQXA2aV9XVnRBIiwiY3VzdG9tZXJfaWQiOjEzNzUzOTMsImZvbGRlcl9pZCI6Mzc1ODExOX0sInNlcnZpY2luZyI6eyJjaGFubmVsIjoic3luY3JvLXJ0bSIsInRhcmdldCI6InN5bmNybyJ9fQ.qpR5PqzCuyisf6IKqdUr3HoeK5bJeW3zqdyumas0geGur6RM6l2ILEri8jVBr7qw20jtv4z0BCzdaar0brhD3g
|
||
C:\Program Files\RepairTech\Syncro\Syncro.Service.Runner.exe
|
C:\Program Files\RepairTech\Syncro\Syncro.Service.Runner.exe
|
||
C:\ProgramData\Syncro\bin\Syncro.Overmind.Service.exe
|
"C:\ProgramData\Syncro\bin\Syncro.Overmind.Service.exe" install
|
||
C:\ProgramData\Syncro\bin\Syncro.Overmind.Service.exe
|
C:\ProgramData\Syncro\bin\Syncro.Overmind.Service.exe" -displayname "SyncroRecovery" -servicename "SyncroOvermind
|
||
C:\Program Files\RepairTech\LiveAgent\SyncroLive.Service.Runner.exe
|
C:\Program Files\RepairTech\LiveAgent\SyncroLive.Service.Runner.exe
|
||
C:\Program Files\RepairTech\LiveAgent\SyncroLive.Agent.Runner.exe
|
"C:\Program Files\RepairTech\LiveAgent\SyncroLive.Agent.Runner.exe"
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe" /c "C:\Program Files\RepairTech\Syncro\install.bat
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\installutil.exe" /ShowCallStack /LogFile=C:\ProgramData/Syncro/logs/ServiceInstall.log
"C:\Program Files\RepairTech\Syncro\Syncro.Service.Runner.exe
|
||
C:\Windows\System32\sc.exe
|
sc failure Syncro reset= 60 actions= restart/5000/restart/10000/restart/60000
|
||
C:\Windows\System32\sc.exe
|
sc start Syncro
|
||
C:\Program Files\RepairTech\Syncro\Syncro.App.Runner.exe
|
"C:\Program Files\RepairTech\Syncro\Syncro.App.Runner.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\RepairTech\Syncro\Syncro.App.Runner.exe
|
"C:\Program Files\RepairTech\Syncro\Syncro.App.Runner.exe"
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k smphost
|
||
C:\Program Files\RepairTech\Syncro\Syncro.App.Runner.exe
|
"C:\Program Files\RepairTech\Syncro\Syncro.App.Runner.exe"
|
||
C:\Program Files\RepairTech\Syncro\Syncro.App.Runner.exe
|
"C:\Program Files\RepairTech\Syncro\Syncro.App.Runner.exe"
|
||
C:\Windows\System32\sc.exe
|
sc" create "SyncroLive" binpath= "\"C:\Program Files\RepairTech\LiveAgent\SyncroLive.Service.Runner.exe\"" displayname= "SyncroLive"
start= "delayed-auto
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc" description "SyncroLive" "
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
"sc" failure "SyncroLive" reset= 3600 actions= restart/5000/restart/30000/restart/300000
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
"sc" failure "Syncro" reset= 3600 actions= restart/300000
|
||
C:\Windows\System32\wbem\WmiApSrv.exe
|
C:\Windows\system32\wbem\WmiApSrv.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 18 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
|
unknown
|
||
https://github.com/myuser/myrepo
|
unknown
|
||
http://schemas.datacontract.org
|
unknown
|
||
http://tempuri.org/IService/SetScreenSharingSenderId
|
unknown
|
||
https://dl.emsisoft.com/EmsisoftAntiMalwareSetup64.msi(
|
unknown
|
||
https://production.kabutoservices.com/syncro/overmind/updates
|
unknown
|
||
http://tempuri.org/
|
unknown
|
||
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
|
unknown
|
||
https://github.com/repairtech/privacy-policy
|
unknown
|
||
http://schemas.datacontract.org/2004/07/System.ServiceProcess
|
unknown
|
||
https://production.kabutoservices.com/syncro/main/updates/r
|
unknown
|
||
https://my.splashtop.com/csrs/win
|
unknown
|
||
https://dl.emsisoft.com/EmsisoftAntiMalwareSetup64.msiC
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
|
unknown
|
||
https://production.kabutoservices.com/syncro/main/upd
|
unknown
|
||
http://foo/Wpf/XamlResources/Variables.xaml
|
unknown
|
||
https://admin.syncroapi.com/(Q
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat
|
unknown
|
||
https://admin.syncroapi.com/(L
|
unknown
|
||
http://schemas.datacontract.org/2004/07/RepairTech.Common.Tools
|
unknown
|
||
https://dl.emsisoft.com/EmsisoftAntiMalwareSetup64.msia
|
unknown
|
||
https://production.kabutoservih
|
unknown
|
||
http://tempuri.org/IService/EndSession
|
unknown
|
||
https://production.kabutoservices.com/syncro/overmind/updates/P
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
|
unknown
|
||
https://admin.syncroapi.com/api/syncro_device/installers/policy_id.json?customer_id=1375393&folder_i
|
unknown
|
||
https://dl.emsisoft.com/EmsisoftAntiMalwareSetup64.msi
|
unknown
|
||
https://github.com/deniszykov/WebSocketListener
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQP0s
|
unknown
|
||
http://tempuri.org/IUserRequestService/get_WindowsPatchManagementSettingsResponse
|
unknown
|
||
http://tempuri.org/IMonitoringService/ShowPromptResponse
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
|
unknown
|
||
http://tempuri.org/IAgent/Shutdown
|
unknown
|
||
http://tempuri.org/$GetStoredScreenSharingSenderIdResultV
|
unknown
|
||
http://foo/Wpf/XamlResources/Converters/Converters.xaml
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
|
unknown
|
||
https://rmm.syncromsp.com/device_api/device/action_queue
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing
|
unknown
|
||
https://rmm.syncromsp.com//device_api/devicex
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
|
unknown
|
||
https://dl.emsisoft.com/EmsisoftAntiMalwareSetup.exe(
|
unknown
|
||
http://tempuri.org/IMonitoringService/SetSyncProgressStatusResponse
|
unknown
|
||
http://tempuri.org/IUserRequestService/get_RemoteApplications
|
unknown
|
||
https://production.kabutoservices.com/kabuto/liveagent/updates/
|
unknown
|
||
https://production.kabutoservices.com/syncro/overmind/updates/releases
|
52.40.78.72
|
||
http://temp.com/p
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
|
unknown
|
||
https://production.kabutoservices.com/syncro/agent/updates/
|
unknown
|
||
http://defaultcontainer/RepairTech.Common.Wpf;component/Wpf/XamlResources/Icons.xaml
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
|
unknown
|
||
http://tempuri.org/IMonitoringService/TriggerAlertResponse
|
unknown
|
||
http://tempuri.org/IService/GetStoredScreenSharingSenderIdResponse&GetStoredScreenSharingSenderIdRes
|
unknown
|
||
http://tempuri.org/IMonitoringService/ExecutePowerShellScriptResponse
|
unknown
|
||
https://github.com/deniszykov/WebSocketListener6
|
unknown
|
||
https://production.kabutoservices.com/syncro/main/updates/servicing.defaults.json
|
52.40.78.72
|
||
http://www.abit.com.tw/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
|
unknown
|
||
https://taskscheduler.codeplex.com/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
|
unknown
|
||
https://rmm.syncromsp.com7https://admin.syncroapi.comuhttps://production.kabutoservices.com/syncro/m
|
unknown
|
||
http://www.w3.o
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
|
unknown
|
||
http://tempuri.org/IUserRequestService/get_RemoteApplicationsResponse
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
|
unknown
|
||
https://production.kabutoservices.com/syncro/main/updates/RELEASES?id=Syncro&localVersion=1.0.181.14
|
unknown
|
||
http://tempuri.org/IMonitoringService/ClearSyncProgressStatus
|
unknown
|
||
https://production.kabutoservices.com/syncro/main/updates/P
|
unknown
|
||
https://production.kab
|
unknown
|
||
https://production.kabutoservices.com/choco/kabuto_patch_managerP
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
|
unknown
|
||
http://tempuri.org/IMonitoringService/FirstSyncShowResponse
|
unknown
|
||
https://production.kabutoservices.com/syncro/main/updates/pR
|
unknown
|
||
http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dnsh
|
unknown
|
||
https://production.kabutoservices.com/syncro/overmind/updates/Syncro.Overmind.Service-1.0.27.exe
|
52.40.78.72
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
|
unknown
|
||
http://tempuri.org/IUserRequestService/RunRemoteApplicationResponse
|
unknown
|
||
https://rmm.syncromsp.com//device_api/device/addonx
|
unknown
|
||
http://schemas.datacontract.org/2004/07/Kabuto.Contracts.Models.OsPatching.V1
|
unknown
|
||
http://ocsp.digicert.co
|
unknown
|
||
https://rmm.syncromsp.com//device_api/sync_device
|
unknown
|
||
https://rmm.syncroP
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
|
unknown
|
||
https://ld.aurelius.host/0l
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/sc
|
unknown
|
||
https://my.splashtop.com/csrs/win(
|
unknown
|
||
https://dl.emsisoft.com/EmsisoftAntiMalwareSetup32.msi(
|
unknown
|
||
https://github.com/tmenier/Flurl.git
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0Digitized
|
unknown
|
||
http://foo/app.xaml
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
wlndows.syncroapi.com
|
104.26.14.34
|
||
k8s-default-syncropr-9fed691c09-f11dcedf98c8fd64.elb.us-east-1.amazonaws.com
|
52.206.234.204
|
||
production.kabutoservices.com
|
52.40.78.72
|
||
k8s-default-freebird-1b1347a338-108e2faffb945eb3.elb.us-east-1.amazonaws.com
|
3.222.92.158
|
||
k8s-default-kabutopr-bd4dfe3aec-18d42f354d40fada.elb.us-east-1.amazonaws.com
|
54.235.117.67
|
||
ec2-54-213-117-181.us-west-2.compute.amazonaws.com
|
54.213.117.181
|
||
admin.syncroapi.com
|
172.67.70.15
|
||
realtime.kabutoservices.com
|
unknown
|
||
ld.aurelius.host
|
unknown
|
||
traversal.syncromsp.com
|
unknown
|
||
rmm.syncromsp.com
|
unknown
|
There are 1 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
52.206.234.204
|
k8s-default-syncropr-9fed691c09-f11dcedf98c8fd64.elb.us-east-1.amazonaws.com
|
United States
|
||
52.40.78.72
|
production.kabutoservices.com
|
United States
|
||
3.222.92.158
|
k8s-default-freebird-1b1347a338-108e2faffb945eb3.elb.us-east-1.amazonaws.com
|
United States
|
||
104.26.14.34
|
wlndows.syncroapi.com
|
United States
|
||
172.67.70.15
|
admin.syncroapi.com
|
United States
|
||
54.213.117.181
|
ec2-54-213-117-181.us-west-2.compute.amazonaws.com
|
United States
|
||
54.84.28.205
|
unknown
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
54.235.117.67
|
k8s-default-kabutopr-bd4dfe3aec-18d42f354d40fada.elb.us-east-1.amazonaws.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech
|
computer_uuid
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
app_crash_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
bsod_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
defrag_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
device_manager_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
firewall_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
low_hd_space_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
no_av_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
smart_failure_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
uuid
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
CompName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
OwnerName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
OwnerContact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
OwnerPhone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
shop_city
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
shop_street_address
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
shop_state
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
shop_zip
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
shop_email
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
shop_phone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
shop_hours
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
shop_name
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
shop_subdomain
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
branding_logo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
branding_icon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
uninstall_code
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
color_code
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
live_agent_enabled
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
install_date
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
customer_install_success
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
|
AutoBackupLogFiles
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\Syncro
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Syncro
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Syncro
|
ApplicationVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Syncro
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Syncro
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Syncro
|
DisplayIcon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Syncro
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Syncro
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Syncro
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Syncro
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
last_sync
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
ping_checks
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
timer_val
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
SyncroOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
KabutoOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
PolicyUninstallCodeEnabled
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
PolicyUninstallCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
remote_apps
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
last_bsod_check
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\TriggerStatuses
|
no_av_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\TriggerStatuses
|
bsod_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\TriggerStatuses
|
device_manager_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\TriggerStatuses
|
failed_logins_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\TriggerStatuses
|
firewall_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\TriggerStatuses
|
low_hd_space_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\TriggerStatuses
|
time_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-18_OvermindService
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-18_SyncroInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-18_SyncroAppRunner
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-18_SyncroServiceRunnerOsPatching
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-18_SyncroServiceRunner
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-19_SyncroInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
UsersProfileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
LastUser
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
last_app_crash_check
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\TriggerStatuses
|
app_crash_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\TriggerStatuses
|
defrag_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\TriggerStatuses
|
smart_failure_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\TriggerStatuses
|
windows_license_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-19_OvermindService
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-21_SyncroSquirrel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-21_SyncroServiceRunnerOsPatching
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-21_SyncroServiceRunner
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-18_SyncroLiveAgentRunner
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-18_SyncroLiveServiceRunner
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-20_OvermindService
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-21_OvermindService
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-23_SyncroSquirrel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-23_SyncroServiceRunnerOsPatching
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-23_SyncroServiceRunner
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
app_crash_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
bsod_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
defrag_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
device_manager_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
firewall_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
low_hd_space_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
no_av_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
smart_failure_trigger
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
last_bsod_check
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
last_bsod_check
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-18_OvermindService
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-18_SyncroAppRunner
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-18_SyncroServiceRunnerOsPatching
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-18_SyncroServiceRunner
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
last_app_crash_check
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
last_bsod_check
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-18_SyncroServiceRunnerOsPatching
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-18_SyncroServiceRunner
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
last_app_crash_check
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
last_bsod_check
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-18_OvermindService
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-18_SyncroServiceRunner
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
last_app_crash_check
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
|
last_bsod_check
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-19_OvermindService
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
|
2024-03-21_SyncroServiceRunner
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SyncroOvermind
|
ImagePath
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\SyncroOvermind
|
EventMessageFile
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\SyncroLive
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
|
SoftwareSASGeneration
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MSDTC Bridge 3.0.0.0\Linkage
|
Export
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MSDTC Bridge 4.0.0.0\Linkage
|
Export
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ServiceModelEndpoint 3.0.0.0\Linkage
|
Export
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ServiceModelOperation 3.0.0.0\Linkage
|
Export
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ServiceModelService 3.0.0.0\Linkage
|
Export
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SMSvcHost 3.0.0.0\Linkage
|
Export
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SMSvcHost 4.0.0.0\Linkage
|
Export
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Windows Workflow Foundation 3.0.0.0\Linkage
|
Export
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Windows Workflow Foundation 4.0.0.0\Linkage
|
Export
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\.NET Memory Cache 4.0\Linkage
|
Export
|
There are 137 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
23854572000
|
unkown
|
page readonly
|
||
7FFD34DB0000
|
trusted library allocation
|
page read and write
|
||
238540A0000
|
trusted library allocation
|
page read and write
|
||
D4739CE000
|
stack
|
page read and write
|
||
22A7A79A000
|
heap
|
page read and write
|
||
23854090000
|
trusted library allocation
|
page read and write
|
||
7FFD35410000
|
trusted library allocation
|
page read and write
|
||
2386C7B0000
|
trusted library allocation
|
page read and write
|
||
21C003BA000
|
trusted library allocation
|
page read and write
|
||
229101E6000
|
trusted library allocation
|
page read and write
|
||
21C0024A000
|
trusted library allocation
|
page read and write
|
||
29B44BF1000
|
heap
|
page read and write
|
||
C9CC8F5000
|
stack
|
page read and write
|
||
20709750000
|
trusted library allocation
|
page read and write
|
||
7FFD351B0000
|
trusted library allocation
|
page execute and read and write
|
||
213567D2000
|
unkown
|
page readonly
|
||
218D62C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
7FFD35320000
|
trusted library allocation
|
page read and write
|
||
2386D2DC000
|
heap
|
page read and write
|
||
20770D80000
|
trusted library allocation
|
page read and write
|
||
41F227E000
|
stack
|
page read and write
|
||
13189000
|
trusted library allocation
|
page read and write
|
||
C2B327F000
|
stack
|
page read and write
|
||
1720664B000
|
trusted library allocation
|
page read and write
|
||
7FFD3494D000
|
trusted library allocation
|
page read and write
|
||
22A7A786000
|
heap
|
page read and write
|
||
F2B7F38000
|
stack
|
page read and write
|
||
21356D44000
|
heap
|
page read and write
|
||
229100F4000
|
trusted library allocation
|
page read and write
|
||
7FFD349A8000
|
trusted library allocation
|
page read and write
|
||
7FFD347CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34948000
|
trusted library allocation
|
page read and write
|
||
22A79E92000
|
heap
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
22A7ACD2000
|
heap
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
2071009D000
|
trusted library allocation
|
page read and write
|
||
22A60C12000
|
heap
|
page read and write
|
||
218D6FFD000
|
heap
|
page read and write
|
||
156F00CD000
|
heap
|
page read and write
|
||
213565A0000
|
unkown
|
page readonly
|
||
20770AA0000
|
heap
|
page read and write
|
||
29B44C01000
|
heap
|
page read and write
|
||
156EFFE0000
|
trusted library allocation
|
page read and write
|
||
22A60E70000
|
heap
|
page read and write
|
||
2386D5A0000
|
heap
|
page read and write
|
||
2386D449000
|
heap
|
page read and write
|
||
B823C3D000
|
stack
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
7FFD347BB000
|
trusted library allocation
|
page execute and read and write
|
||
2CB56700000
|
heap
|
page read and write
|
||
156F0400000
|
heap
|
page read and write
|
||
17205C8D000
|
heap
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
7FFD34FEC000
|
trusted library allocation
|
page read and write
|
||
2386D280000
|
heap
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
218CE327000
|
trusted library allocation
|
page read and write
|
||
15AB96FF000
|
heap
|
page read and write
|
||
7FFD34979000
|
trusted library allocation
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
2CB71395000
|
heap
|
page read and write
|
||
23C0EA8A000
|
heap
|
page read and write
|
||
1721EDE6000
|
heap
|
page read and write
|
||
23C0F6E1000
|
trusted library allocation
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
7FFD34FA0000
|
trusted library allocation
|
page read and write
|
||
22A7AC12000
|
heap
|
page read and write
|
||
218D6B20000
|
heap
|
page execute and read and write
|
||
21C0041A000
|
trusted library allocation
|
page read and write
|
||
7FFD34A3F000
|
trusted library allocation
|
page read and write
|
||
7FFD347BC000
|
trusted library allocation
|
page read and write
|
||
22900926000
|
trusted library allocation
|
page read and write
|
||
22A7A770000
|
heap
|
page read and write
|
||
22A7A3A6000
|
heap
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
7FFD34C50000
|
trusted library allocation
|
page read and write
|
||
213583D0000
|
unkown
|
page readonly
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
21356690000
|
heap
|
page read and write
|
||
7FFD34792000
|
trusted library allocation
|
page read and write
|
||
21C75DC0000
|
heap
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
22A7A49E000
|
heap
|
page read and write
|
||
22A7A660000
|
unkown
|
page readonly
|
||
7FFD3478D000
|
trusted library allocation
|
page execute and read and write
|
||
20773037000
|
heap
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
23C0EB44000
|
heap
|
page read and write
|
||
7FFD34F40000
|
trusted library allocation
|
page read and write
|
||
98C19FE000
|
stack
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
1BD4E000
|
stack
|
page read and write
|
||
22A61C76000
|
trusted library allocation
|
page read and write
|
||
207735D3000
|
heap
|
page read and write
|
||
7FFD35150000
|
trusted library allocation
|
page read and write
|
||
2133C550000
|
trusted library allocation
|
page read and write
|
||
17205C2C000
|
heap
|
page read and write
|
||
23853BE2000
|
unkown
|
page readonly
|
||
7FFD34AE7000
|
trusted library allocation
|
page read and write
|
||
229001AB000
|
trusted library allocation
|
page read and write
|
||
2AC63420000
|
heap
|
page read and write
|
||
20700251000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
3FCB4FE000
|
stack
|
page read and write
|
||
45288F9000
|
stack
|
page read and write
|
||
21C73048000
|
heap
|
page read and write
|
||
7FFD3491E000
|
trusted library allocation
|
page read and write
|
||
7FFD34EE0000
|
trusted library allocation
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
22A7AC18000
|
heap
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
5BFC4FE000
|
stack
|
page read and write
|
||
22A7AE34000
|
heap
|
page read and write
|
||
7FFD34C20000
|
trusted library allocation
|
page execute and read and write
|
||
22A7B000000
|
unkown
|
page readonly
|
||
21C00404000
|
trusted library allocation
|
page read and write
|
||
C9CC7FF000
|
stack
|
page read and write
|
||
29B44BE1000
|
heap
|
page read and write
|
||
3FCB1DB000
|
stack
|
page read and write
|
||
22A61312000
|
unkown
|
page readonly
|
||
156F0565000
|
heap
|
page read and write
|
||
7FFD34985000
|
trusted library allocation
|
page read and write
|
||
2CB585F6000
|
trusted library allocation
|
page read and write
|
||
7FFD34794000
|
trusted library allocation
|
page read and write
|
||
207097E0000
|
heap
|
page execute and read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
7FFD34949000
|
trusted library allocation
|
page read and write
|
||
C9CCDFD000
|
stack
|
page read and write
|
||
22A6177B000
|
trusted library allocation
|
page read and write
|
||
2A126710000
|
heap
|
page read and write
|
||
7FFD3479B000
|
trusted library allocation
|
page execute and read and write
|
||
22A61BEB000
|
trusted library allocation
|
page read and write
|
||
7FFD34784000
|
trusted library allocation
|
page read and write
|
||
7FFD34994000
|
trusted library allocation
|
page read and write
|
||
22A613B0000
|
unkown
|
page readonly
|
||
22A79D40000
|
unkown
|
page readonly
|
||
7FFD34B90000
|
trusted library allocation
|
page execute and read and write
|
||
21C77990000
|
trusted library allocation
|
page read and write
|
||
20709810000
|
heap
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
2CB713A0000
|
heap
|
page read and write
|
||
41F247E000
|
stack
|
page read and write
|
||
7FFD34A47000
|
trusted library allocation
|
page read and write
|
||
213566CA000
|
heap
|
page read and write
|
||
45280FE000
|
stack
|
page read and write
|
||
7FFD35170000
|
trusted library allocation
|
page read and write
|
||
7FFD349FE000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
2386D2C6000
|
heap
|
page read and write
|
||
21C7308E000
|
heap
|
page read and write
|
||
2386D47D000
|
heap
|
page read and write
|
||
D474A3E000
|
stack
|
page read and write
|
||
7FFD34797000
|
trusted library allocation
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
7FFD349FF000
|
trusted library allocation
|
page read and write
|
||
23853D90000
|
heap
|
page read and write
|
||
7FFD34C56000
|
trusted library allocation
|
page read and write
|
||
229100C0000
|
trusted library allocation
|
page read and write
|
||
2133DF8B000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34AD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34BD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
218D6C10000
|
heap
|
page execute and read and write
|
||
22A7B070000
|
unkown
|
page readonly
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
81F1D35000
|
stack
|
page read and write
|
||
23C0F220000
|
heap
|
page read and write
|
||
45289F9000
|
stack
|
page read and write
|
||
22A60BE4000
|
heap
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34B50000
|
trusted library allocation
|
page read and write
|
||
A794EFC000
|
stack
|
page read and write
|
||
F2B8036000
|
stack
|
page read and write
|
||
156F0000000
|
unkown
|
page read and write
|
||
7FFD34B07000
|
trusted library allocation
|
page read and write
|
||
2291022F000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
7FFD34D30000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34793000
|
trusted library allocation
|
page execute and read and write
|
||
5BFC1FF000
|
stack
|
page read and write
|
||
7FFD347B2000
|
trusted library allocation
|
page read and write
|
||
15AB968C000
|
heap
|
page read and write
|
||
2CB58499000
|
trusted library allocation
|
page read and write
|
||
172060A0000
|
trusted library allocation
|
page read and write
|
||
C9CD83A000
|
stack
|
page read and write
|
||
22A7A4BC000
|
heap
|
page read and write
|
||
23854530000
|
unkown
|
page readonly
|
||
7FFD349F6000
|
trusted library allocation
|
page read and write
|
||
23C0F314000
|
trusted library allocation
|
page read and write
|
||
22A7ABDA000
|
heap
|
page read and write
|
||
7FFD34982000
|
trusted library allocation
|
page read and write
|
||
22A6227B000
|
trusted library allocation
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
2134DE1E000
|
trusted library allocation
|
page read and write
|
||
23854570000
|
unkown
|
page readonly
|
||
7FFD34FFA000
|
trusted library allocation
|
page read and write
|
||
238546B2000
|
unkown
|
page readonly
|
||
15ABA191000
|
trusted library allocation
|
page read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
336E7F4000
|
stack
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page execute and read and write
|
||
20770D50000
|
trusted library allocation
|
page read and write
|
||
672000
|
unkown
|
page readonly
|
||
21C000AA000
|
trusted library allocation
|
page read and write
|
||
7FFD34B80000
|
trusted library allocation
|
page read and write
|
||
7FFD34876000
|
trusted library allocation
|
page execute and read and write
|
||
4527B7E000
|
stack
|
page read and write
|
||
7FFD34C10000
|
trusted library allocation
|
page read and write
|
||
29B44BF1000
|
heap
|
page read and write
|
||
2386CF03000
|
heap
|
page read and write
|
||
238545D0000
|
heap
|
page execute and read and write
|
||
163E000
|
stack
|
page read and write
|
||
2133C2EE000
|
heap
|
page read and write
|
||
207098E0000
|
heap
|
page execute and read and write
|
||
238542C5000
|
heap
|
page read and write
|
||
218BC7E0000
|
trusted library allocation
|
page read and write
|
||
20710098000
|
trusted library allocation
|
page read and write
|
||
7FFD34CA0000
|
trusted library allocation
|
page read and write
|
||
7FFD3499C000
|
trusted library allocation
|
page read and write
|
||
15AB9643000
|
heap
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
C9CC6EB000
|
stack
|
page read and write
|
||
7FFD349A4000
|
trusted library allocation
|
page read and write
|
||
207731B0000
|
trusted library section
|
page readonly
|
||
21356952000
|
unkown
|
page readonly
|
||
23854510000
|
unkown
|
page readonly
|
||
207735EB000
|
heap
|
page read and write
|
||
17205A10000
|
unkown
|
page readonly
|
||
22A61D16000
|
trusted library allocation
|
page read and write
|
||
B822BDE000
|
stack
|
page read and write
|
||
21C75541000
|
heap
|
page read and write
|
||
218BC560000
|
heap
|
page read and write
|
||
23C0F310000
|
trusted library allocation
|
page read and write
|
||
7FFD34FB0000
|
trusted library allocation
|
page read and write
|
||
2291017E000
|
trusted library allocation
|
page read and write
|
||
22A61302000
|
unkown
|
page readonly
|
||
21356D8C000
|
heap
|
page read and write
|
||
7FFD35020000
|
trusted library allocation
|
page read and write
|
||
98C12EE000
|
stack
|
page read and write
|
||
22A61FF0000
|
trusted library allocation
|
page read and write
|
||
2133E0DD000
|
trusted library allocation
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
7FFD34B50000
|
trusted library allocation
|
page read and write
|
||
218CE2A5000
|
trusted library allocation
|
page read and write
|
||
21C0010A000
|
trusted library allocation
|
page read and write
|
||
7FFD34F70000
|
trusted library allocation
|
page read and write
|
||
2386CFAE000
|
heap
|
page read and write
|
||
F2B73FD000
|
stack
|
page read and write
|
||
1BD50000
|
heap
|
page read and write
|
||
7FFD34876000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
15ABEE10000
|
trusted library allocation
|
page read and write
|
||
F2B7D3E000
|
stack
|
page read and write
|
||
22900269000
|
trusted library allocation
|
page read and write
|
||
23C0F52C000
|
trusted library allocation
|
page read and write
|
||
156F0078000
|
heap
|
page read and write
|
||
207735EF000
|
heap
|
page read and write
|
||
98C1EFA000
|
stack
|
page read and write
|
||
156F041B000
|
heap
|
page read and write
|
||
7FFD34793000
|
trusted library allocation
|
page read and write
|
||
7FF497860000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34A59000
|
trusted library allocation
|
page read and write
|
||
21C732E0000
|
heap
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
22A7A397000
|
heap
|
page read and write
|
||
23C0F362000
|
trusted library allocation
|
page read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page read and write
|
||
156F0013000
|
unkown
|
page read and write
|
||
22A7A4F6000
|
heap
|
page read and write
|
||
238546BE000
|
unkown
|
page readonly
|
||
22A61F20000
|
trusted library allocation
|
page read and write
|
||
156F0100000
|
trusted library allocation
|
page read and write
|
||
2133C570000
|
trusted library allocation
|
page read and write
|
||
2AC63220000
|
heap
|
page read and write
|
||
22A60B90000
|
heap
|
page read and write
|
||
5BFC5FE000
|
stack
|
page read and write
|
||
C2B307D000
|
stack
|
page read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page read and write
|
||
81F2A7A000
|
stack
|
page read and write
|
||
156F052D000
|
heap
|
page read and write
|
||
218BE106000
|
heap
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
22A7A41E000
|
heap
|
page read and write
|
||
21356890000
|
heap
|
page execute and read and write
|
||
15ABEC90000
|
trusted library allocation
|
page read and write
|
||
7FFD34B70000
|
trusted library allocation
|
page read and write
|
||
7FFD34C43000
|
trusted library allocation
|
page read and write
|
||
7FFD34B10000
|
trusted library allocation
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
7FFD34967000
|
trusted library allocation
|
page read and write
|
||
17206170000
|
heap
|
page read and write
|
||
15ABECA0000
|
trusted library allocation
|
page read and write
|
||
D4749F7000
|
stack
|
page read and write
|
||
7FFD347FC000
|
trusted library allocation
|
page execute and read and write
|
||
1B20BE99000
|
heap
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
17206175000
|
heap
|
page read and write
|
||
22A79FD0000
|
unkown
|
page readonly
|
||
7FFD3485C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34B30000
|
trusted library allocation
|
page read and write
|
||
29B44BE1000
|
heap
|
page read and write
|
||
7FFD34C66000
|
trusted library allocation
|
page read and write
|
||
D4746F8000
|
stack
|
page read and write
|
||
D473DFE000
|
stack
|
page read and write
|
||
5BFD0FA000
|
stack
|
page read and write
|
||
33707FF000
|
stack
|
page read and write
|
||
7FFD34856000
|
trusted library allocation
|
page read and write
|
||
218BE70B000
|
trusted library allocation
|
page read and write
|
||
23C0F543000
|
trusted library allocation
|
page read and write
|
||
156F00AA000
|
heap
|
page read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page execute and read and write
|
||
15ABEE10000
|
trusted library allocation
|
page read and write
|
||
2386D3E4000
|
heap
|
page read and write
|
||
81F377C000
|
stack
|
page read and write
|
||
7FFD34C00000
|
trusted library allocation
|
page read and write
|
||
21C75720000
|
heap
|
page read and write
|
||
22A7AC77000
|
heap
|
page read and write
|
||
21356870000
|
unkown
|
page readonly
|
||
2296F780000
|
heap
|
page read and write
|
||
7FFD34969000
|
trusted library allocation
|
page read and write
|
||
7FFD353B0000
|
trusted library allocation
|
page read and write
|
||
21C771E0000
|
trusted library section
|
page read and write
|
||
7FFD34836000
|
trusted library allocation
|
page read and write
|
||
21C72832000
|
unkown
|
page readonly
|
||
7FFD34973000
|
trusted library allocation
|
page read and write
|
||
181E000
|
stack
|
page read and write
|
||
7FFD35280000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34D70000
|
trusted library allocation
|
page read and write
|
||
7FFD34CA8000
|
trusted library allocation
|
page read and write
|
||
7FFD351A0000
|
trusted library allocation
|
page read and write
|
||
21C759D9000
|
heap
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
2386CF68000
|
heap
|
page read and write
|
||
7FFD3496F000
|
trusted library allocation
|
page read and write
|
||
7FFD34B60000
|
trusted library allocation
|
page read and write
|
||
4F5DA7E000
|
unkown
|
page readonly
|
||
17205A12000
|
unkown
|
page readonly
|
||
1721EC70000
|
trusted library section
|
page read and write
|
||
153E000
|
stack
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
7FFD3503A000
|
trusted library allocation
|
page read and write
|
||
23C0EC00000
|
heap
|
page read and write
|
||
2CB683B1000
|
trusted library allocation
|
page read and write
|
||
17205F85000
|
heap
|
page read and write
|
||
A3C3FFD000
|
stack
|
page read and write
|
||
20710078000
|
trusted library allocation
|
page read and write
|
||
156F0565000
|
heap
|
page read and write
|
||
22A62087000
|
trusted library allocation
|
page read and write
|
||
22A60D70000
|
heap
|
page read and write
|
||
22A7AD73000
|
heap
|
page read and write
|
||
7FFD347AD000
|
trusted library allocation
|
page execute and read and write
|
||
20723B00000
|
heap
|
page execute and read and write
|
||
7FFD34AF0000
|
trusted library allocation
|
page read and write
|
||
2135687C000
|
unkown
|
page readonly
|
||
7FFD3478D000
|
trusted library allocation
|
page execute and read and write
|
||
21356D4C000
|
heap
|
page read and write
|
||
F2B7B3E000
|
stack
|
page read and write
|
||
7FFD34D90000
|
trusted library allocation
|
page read and write
|
||
F2B843B000
|
stack
|
page read and write
|
||
D47397E000
|
stack
|
page read and write
|
||
7FFD347CB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD35270000
|
trusted library allocation
|
page read and write
|
||
7FFD34A64000
|
trusted library allocation
|
page read and write
|
||
2B8B8110000
|
heap
|
page read and write
|
||
7FFD35003000
|
trusted library allocation
|
page read and write
|
||
7FFD34E00000
|
trusted library allocation
|
page read and write
|
||
15AB9702000
|
heap
|
page read and write
|
||
7FFD34C30000
|
trusted library allocation
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34AD0000
|
trusted library allocation
|
page read and write
|
||
7FFD34782000
|
trusted library allocation
|
page read and write
|
||
156F0526000
|
heap
|
page read and write
|
||
2CB70CD3000
|
heap
|
page execute and read and write
|
||
20773017000
|
heap
|
page read and write
|
||
22A61B7C000
|
trusted library allocation
|
page read and write
|
||
20723950000
|
heap
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page execute and read and write
|
||
23854E8C000
|
trusted library allocation
|
page read and write
|
||
15ABA580000
|
trusted library section
|
page readonly
|
||
22A60E20000
|
trusted library allocation
|
page read and write
|
||
7FFD34C40000
|
trusted library allocation
|
page read and write
|
||
7FFD349DD000
|
trusted library allocation
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
17206510000
|
trusted library section
|
page read and write
|
||
7FFD349C4000
|
trusted library allocation
|
page read and write
|
||
21C75CB0000
|
heap
|
page read and write
|
||
156F00F9000
|
heap
|
page read and write
|
||
7FFD34A69000
|
trusted library allocation
|
page read and write
|
||
29B44BE1000
|
heap
|
page read and write
|
||
29B44BCA000
|
heap
|
page read and write
|
||
22A7ACB1000
|
heap
|
page read and write
|
||
22A7ADD9000
|
heap
|
page read and write
|
||
2296F79B000
|
heap
|
page read and write
|
||
21C74C50000
|
heap
|
page execute and read and write
|
||
22A79F52000
|
unkown
|
page readonly
|
||
23C0F376000
|
trusted library allocation
|
page read and write
|
||
22A7B040000
|
unkown
|
page readonly
|
||
218BC810000
|
heap
|
page read and write
|
||
1B20BCE0000
|
heap
|
page read and write
|
||
21C76ED2000
|
heap
|
page read and write
|
||
7FFD34A3D000
|
trusted library allocation
|
page read and write
|
||
7FFD34949000
|
trusted library allocation
|
page read and write
|
||
2071B291000
|
trusted library allocation
|
page read and write
|
||
22A79FC8000
|
unkown
|
page readonly
|
||
22A7AD71000
|
heap
|
page read and write
|
||
7FFD34866000
|
trusted library allocation
|
page execute and read and write
|
||
2CB583BC000
|
trusted library allocation
|
page read and write
|
||
2070027F000
|
trusted library allocation
|
page read and write
|
||
B823839000
|
stack
|
page read and write
|
||
218BE4E9000
|
trusted library allocation
|
page read and write
|
||
7FFD3499A000
|
trusted library allocation
|
page read and write
|
||
7FFD34E37000
|
trusted library allocation
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
20770B38000
|
heap
|
page read and write
|
||
21355D80000
|
trusted library allocation
|
page read and write
|
||
22A61450000
|
heap
|
page execute and read and write
|
||
272F2C78000
|
heap
|
page read and write
|
||
20B21D15000
|
heap
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
22A617F0000
|
trusted library allocation
|
page read and write
|
||
22A7A02C000
|
unkown
|
page readonly
|
||
22A7A282000
|
unkown
|
page readonly
|
||
7FFD34D40000
|
trusted library allocation
|
page read and write
|
||
22910015000
|
trusted library allocation
|
page read and write
|
||
7FFD34D20000
|
trusted library allocation
|
page read and write
|
||
7FFD34A95000
|
trusted library allocation
|
page read and write
|
||
2133C5C0000
|
heap
|
page read and write
|
||
22A7BA1C000
|
heap
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page execute and read and write
|
||
29B44BF1000
|
heap
|
page read and write
|
||
20709970000
|
heap
|
page read and write
|
||
21C000AE000
|
trusted library allocation
|
page read and write
|
||
23C0F366000
|
trusted library allocation
|
page read and write
|
||
A3C44F9000
|
stack
|
page read and write
|
||
81F3B7A000
|
stack
|
page read and write
|
||
21356792000
|
unkown
|
page readonly
|
||
23C0F386000
|
trusted library allocation
|
page read and write
|
||
7FFD34F60000
|
trusted library allocation
|
page read and write
|
||
20B21AE0000
|
heap
|
page read and write
|
||
22900276000
|
trusted library allocation
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
21C0009D000
|
trusted library allocation
|
page read and write
|
||
21C00433000
|
trusted library allocation
|
page read and write
|
||
7FFD347A4000
|
trusted library allocation
|
page read and write
|
||
22A612F0000
|
unkown
|
page readonly
|
||
1230000
|
heap
|
page read and write
|
||
22A7AFB0000
|
heap
|
page read and write
|
||
15ABEE20000
|
trusted library allocation
|
page read and write
|
||
23C0F35E000
|
trusted library allocation
|
page read and write
|
||
172064D0000
|
trusted library section
|
page read and write
|
||
2386CF3B000
|
heap
|
page read and write
|
||
7FFD349D6000
|
trusted library allocation
|
page read and write
|
||
D7C000
|
unkown
|
page readonly
|
||
156F0544000
|
heap
|
page read and write
|
||
7FFD34A2D000
|
trusted library allocation
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
7FFD347CB000
|
trusted library allocation
|
page execute and read and write
|
||
23854600000
|
unkown
|
page readonly
|
||
29B44C01000
|
heap
|
page read and write
|
||
129A000
|
heap
|
page read and write
|
||
238544E2000
|
unkown
|
page readonly
|
||
3FCB6FE000
|
stack
|
page read and write
|
||
81F3675000
|
stack
|
page read and write
|
||
B13E7AD000
|
stack
|
page read and write
|
||
7FFD34E22000
|
trusted library allocation
|
page read and write
|
||
2AC63315000
|
heap
|
page read and write
|
||
22900B35000
|
trusted library allocation
|
page read and write
|
||
29B44C01000
|
heap
|
page read and write
|
||
2133C222000
|
unkown
|
page readonly
|
||
218CE32C000
|
trusted library allocation
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
23854610000
|
heap
|
page read and write
|
||
A3C45FD000
|
stack
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page execute and read and write
|
||
2386D34F000
|
heap
|
page read and write
|
||
7FFD34DA0000
|
trusted library allocation
|
page read and write
|
||
20770EA5000
|
heap
|
page read and write
|
||
21C74B40000
|
trusted library section
|
page read and write
|
||
22A61DB7000
|
trusted library allocation
|
page read and write
|
||
7FFD34FF0000
|
trusted library allocation
|
page read and write
|
||
7FFD350A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34995000
|
trusted library allocation
|
page read and write
|
||
7370C7E000
|
stack
|
page read and write
|
||
20772650000
|
trusted library allocation
|
page read and write
|
||
15ABEC5B000
|
heap
|
page read and write
|
||
7FFD34E45000
|
trusted library allocation
|
page read and write
|
||
7FFD34B60000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD35070000
|
trusted library allocation
|
page read and write
|
||
A3C3CFE000
|
stack
|
page read and write
|
||
D4745FD000
|
stack
|
page read and write
|
||
7FFD34E14000
|
trusted library allocation
|
page read and write
|
||
20772FC3000
|
heap
|
page read and write
|
||
1BF4E000
|
stack
|
page read and write
|
||
2386D457000
|
heap
|
page read and write
|
||
22A7AAD0000
|
heap
|
page read and write
|
||
22A7AAF0000
|
heap
|
page read and write
|
||
17205C20000
|
heap
|
page read and write
|
||
23C0EA50000
|
heap
|
page read and write
|
||
7FFD347CC000
|
trusted library allocation
|
page execute and read and write
|
||
29B44BF1000
|
heap
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
20770B6B000
|
heap
|
page read and write
|
||
2296F6D7000
|
unkown
|
page readonly
|
||
238545F0000
|
unkown
|
page readonly
|
||
7FFD3479D000
|
trusted library allocation
|
page execute and read and write
|
||
20B21D10000
|
heap
|
page read and write
|
||
2386D2B0000
|
heap
|
page read and write
|
||
98C1AF9000
|
stack
|
page read and write
|
||
2AC63328000
|
heap
|
page read and write
|
||
C9CDA3E000
|
stack
|
page read and write
|
||
20773AC0000
|
heap
|
page read and write
|
||
F2B823D000
|
stack
|
page read and write
|
||
22A60BA6000
|
heap
|
page read and write
|
||
207735D9000
|
heap
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
21C755B3000
|
heap
|
page read and write
|
||
2CB713B0000
|
heap
|
page read and write
|
||
7FFD34AE0000
|
trusted library allocation
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
21C75765000
|
heap
|
page read and write
|
||
17216593000
|
trusted library allocation
|
page read and write
|
||
B823D7E000
|
stack
|
page read and write
|
||
20773960000
|
heap
|
page read and write
|
||
22910028000
|
trusted library allocation
|
page read and write
|
||
17205C49000
|
heap
|
page read and write
|
||
7FFD35050000
|
trusted library allocation
|
page read and write
|
||
7FFD34C40000
|
trusted library allocation
|
page read and write
|
||
B8236FA000
|
stack
|
page read and write
|
||
7FFD3477D000
|
trusted library allocation
|
page execute and read and write
|
||
B82373F000
|
stack
|
page read and write
|
||
22900A10000
|
trusted library allocation
|
page read and write
|
||
7FFD34B10000
|
trusted library allocation
|
page read and write
|
||
23C0F7B4000
|
trusted library allocation
|
page read and write
|
||
21C00447000
|
trusted library allocation
|
page read and write
|
||
2290026E000
|
trusted library allocation
|
page read and write
|
||
22900774000
|
trusted library allocation
|
page read and write
|
||
7FFD34B7E000
|
trusted library allocation
|
page read and write
|
||
7FFD34774000
|
trusted library allocation
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
81F1C3F000
|
stack
|
page read and write
|
||
22A7A562000
|
unkown
|
page readonly
|
||
2386D363000
|
heap
|
page read and write
|
||
22A7A512000
|
heap
|
page read and write
|
||
7FFD34886000
|
trusted library allocation
|
page execute and read and write
|
||
22A714E2000
|
trusted library allocation
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
213571D0000
|
heap
|
page read and write
|
||
F2B71FE000
|
stack
|
page read and write
|
||
22900929000
|
trusted library allocation
|
page read and write
|
||
7FFD34B20000
|
trusted library allocation
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
7FFD34A2E000
|
trusted library allocation
|
page read and write
|
||
7FFD34CC0000
|
trusted library allocation
|
page read and write
|
||
7FFD34C10000
|
trusted library allocation
|
page read and write
|
||
21C74AE0000
|
trusted library section
|
page read and write
|
||
22A617CC000
|
trusted library allocation
|
page read and write
|
||
41F2078000
|
stack
|
page read and write
|
||
21C73064000
|
heap
|
page read and write
|
||
2CB58741000
|
trusted library allocation
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
21C73335000
|
heap
|
page read and write
|
||
7FFD34C20000
|
trusted library allocation
|
page execute and read and write
|
||
22A60C0B000
|
heap
|
page read and write
|
||
7FFD3478D000
|
trusted library allocation
|
page execute and read and write
|
||
22A617D4000
|
trusted library allocation
|
page read and write
|
||
1721ED80000
|
trusted library section
|
page read and write
|
||
218BC540000
|
heap
|
page read and write
|
||
218BE29E000
|
trusted library allocation
|
page read and write
|
||
29B44B20000
|
heap
|
page read and write
|
||
21C76ECE000
|
heap
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
21C73220000
|
trusted library allocation
|
page read and write
|
||
29B44BF1000
|
heap
|
page read and write
|
||
2CB5681B000
|
heap
|
page read and write
|
||
29B44BF1000
|
heap
|
page read and write
|
||
7FFD34E60000
|
trusted library allocation
|
page execute and read and write
|
||
1B70C000
|
stack
|
page read and write
|
||
7FFD3498A000
|
trusted library allocation
|
page read and write
|
||
2133C490000
|
heap
|
page read and write
|
||
7FFD34D86000
|
trusted library allocation
|
page read and write
|
||
B8231FE000
|
stack
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
7FFD34C80000
|
trusted library allocation
|
page read and write
|
||
207005CC000
|
trusted library allocation
|
page read and write
|
||
C9CD3F5000
|
stack
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
7FFD349A2000
|
trusted library allocation
|
page read and write
|
||
23853DD0000
|
heap
|
page read and write
|
||
2CB70ACB000
|
heap
|
page read and write
|
||
22A79ECA000
|
heap
|
page read and write
|
||
7FFD34C45000
|
trusted library allocation
|
page read and write
|
||
4F5E27E000
|
unkown
|
page readonly
|
||
22A7A78E000
|
heap
|
page read and write
|
||
272F2BE5000
|
heap
|
page read and write
|
||
22900B40000
|
trusted library allocation
|
page read and write
|
||
7FFD35300000
|
trusted library allocation
|
page read and write
|
||
81F397A000
|
stack
|
page read and write
|
||
7FFD34922000
|
trusted library allocation
|
page read and write
|
||
218BC633000
|
heap
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
22A7ABA9000
|
heap
|
page read and write
|
||
4F5D27E000
|
unkown
|
page readonly
|
||
A7952FF000
|
stack
|
page read and write
|
||
23853DF4000
|
heap
|
page read and write
|
||
F2B6DCE000
|
stack
|
page read and write
|
||
20770E45000
|
heap
|
page read and write
|
||
7FFD351F0000
|
trusted library allocation
|
page read and write
|
||
7FFD35220000
|
trusted library allocation
|
page read and write
|
||
218BE36B000
|
trusted library allocation
|
page read and write
|
||
2290027E000
|
trusted library allocation
|
page read and write
|
||
1306000
|
heap
|
page read and write
|
||
21C75C80000
|
trusted library section
|
page read and write
|
||
238548FF000
|
trusted library allocation
|
page read and write
|
||
7FFD34B10000
|
trusted library allocation
|
page read and write
|
||
7FFD349B4000
|
trusted library allocation
|
page read and write
|
||
21C75770000
|
heap
|
page read and write
|
||
5BFBDEE000
|
stack
|
page read and write
|
||
22A6210F000
|
trusted library allocation
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
F2B7C3D000
|
stack
|
page read and write
|
||
4F5E47E000
|
unkown
|
page readonly
|
||
7FFD34C4B000
|
trusted library allocation
|
page read and write
|
||
238541AD000
|
heap
|
page read and write
|
||
3FCB7FB000
|
stack
|
page read and write
|
||
CB5336C000
|
stack
|
page read and write
|
||
22A71476000
|
trusted library allocation
|
page read and write
|
||
23C0E990000
|
heap
|
page read and write
|
||
21C74B90000
|
heap
|
page read and write
|
||
29B44C01000
|
heap
|
page read and write
|
||
2CB68428000
|
trusted library allocation
|
page read and write
|
||
7FFD34792000
|
trusted library allocation
|
page read and write
|
||
23C0F77C000
|
trusted library allocation
|
page read and write
|
||
22A61314000
|
unkown
|
page readonly
|
||
29B44BF1000
|
heap
|
page read and write
|
||
238544F0000
|
unkown
|
page readonly
|
||
C9CCAFD000
|
stack
|
page read and write
|
||
20773624000
|
heap
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
22A714D8000
|
trusted library allocation
|
page read and write
|
||
B8233FE000
|
stack
|
page read and write
|
||
129F000
|
heap
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
D4744F9000
|
stack
|
page read and write
|
||
20772FD0000
|
heap
|
page read and write
|
||
7FFD354D0000
|
trusted library allocation
|
page execute and read and write
|
||
2B8B7E50000
|
heap
|
page read and write
|
||
21356104000
|
heap
|
page read and write
|
||
2290027A000
|
trusted library allocation
|
page read and write
|
||
15ABECCB000
|
heap
|
page read and write
|
||
7FFD34C70000
|
trusted library allocation
|
page read and write
|
||
21356A90000
|
heap
|
page read and write
|
||
7FFD34920000
|
trusted library allocation
|
page read and write
|
||
23C0F776000
|
trusted library allocation
|
page read and write
|
||
16B0000
|
heap
|
page read and write
|
||
21C74C10000
|
trusted library section
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
213583C2000
|
unkown
|
page readonly
|
||
1B20BDE0000
|
heap
|
page read and write
|
||
7FFD34794000
|
trusted library allocation
|
page read and write
|
||
29B44BF1000
|
heap
|
page read and write
|
||
2133C590000
|
heap
|
page execute and read and write
|
||
7FFD34C1A000
|
trusted library allocation
|
page read and write
|
||
15ABA570000
|
trusted library section
|
page readonly
|
||
7FFD34B40000
|
trusted library allocation
|
page read and write
|
||
22A7A874000
|
unkown
|
page readonly
|
||
7FFD3497C000
|
trusted library allocation
|
page read and write
|
||
2133C2F1000
|
heap
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
22A7AD43000
|
heap
|
page read and write
|
||
2290079F000
|
trusted library allocation
|
page read and write
|
||
7FFD3478D000
|
trusted library allocation
|
page execute and read and write
|
||
238545E0000
|
unkown
|
page readonly
|
||
20770E30000
|
heap
|
page execute and read and write
|
||
15ABEB70000
|
trusted library allocation
|
page read and write
|
||
218BCAE0000
|
heap
|
page read and write
|
||
21C005C6000
|
trusted library allocation
|
page read and write
|
||
22A7AC8F000
|
heap
|
page read and write
|
||
22A79460000
|
trusted library allocation
|
page read and write
|
||
C2B337E000
|
stack
|
page read and write
|
||
15AB9613000
|
heap
|
page read and write
|
||
22A7BA34000
|
heap
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
15ABA590000
|
trusted library section
|
page readonly
|
||
22A7A77E000
|
heap
|
page read and write
|
||
21356F35000
|
trusted library allocation
|
page read and write
|
||
F2B79F1000
|
stack
|
page read and write
|
||
7FFD35380000
|
trusted library allocation
|
page read and write
|
||
23C0EAB6000
|
heap
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page execute and read and write
|
||
207735C8000
|
heap
|
page read and write
|
||
2133C560000
|
heap
|
page read and write
|
||
156F0024000
|
unkown
|
page read and write
|
||
7FF42D3D0000
|
trusted library allocation
|
page execute and read and write
|
||
218D6A3F000
|
heap
|
page read and write
|
||
2B8B8115000
|
heap
|
page read and write
|
||
15AC0000000
|
heap
|
page read and write
|
||
7FFD3497E000
|
trusted library allocation
|
page read and write
|
||
21C72F25000
|
unkown
|
page readonly
|
||
7FFD34F20000
|
trusted library allocation
|
page read and write
|
||
7FFD349C2000
|
trusted library allocation
|
page read and write
|
||
22A718CE000
|
trusted library allocation
|
page read and write
|
||
5BFC7F8000
|
stack
|
page read and write
|
||
7FFD347AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3498C000
|
trusted library allocation
|
page read and write
|
||
15ABEEE0000
|
remote allocation
|
page read and write
|
||
21C00204000
|
trusted library allocation
|
page read and write
|
||
81F357B000
|
stack
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
7FFD34773000
|
trusted library allocation
|
page execute and read and write
|
||
22A61F99000
|
trusted library allocation
|
page read and write
|
||
81F21FE000
|
stack
|
page read and write
|
||
22A7AAEB000
|
heap
|
page read and write
|
||
7FFD34D60000
|
trusted library allocation
|
page read and write
|
||
21356776000
|
heap
|
page read and write
|
||
81F3875000
|
stack
|
page read and write
|
||
156F0086000
|
heap
|
page read and write
|
||
7FFD34B00000
|
trusted library allocation
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
20709528000
|
heap
|
page read and write
|
||
218BE4E0000
|
trusted library allocation
|
page read and write
|
||
7FFD34F74000
|
trusted library allocation
|
page read and write
|
||
2CB68448000
|
trusted library allocation
|
page read and write
|
||
7FFD34A23000
|
trusted library allocation
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
2385465C000
|
unkown
|
page readonly
|
||
7FFD34C30000
|
trusted library allocation
|
page read and write
|
||
22910041000
|
trusted library allocation
|
page read and write
|
||
15ABEC2C000
|
heap
|
page read and write
|
||
5BFC2FE000
|
stack
|
page read and write
|
||
218BE4E7000
|
trusted library allocation
|
page read and write
|
||
2386CF5E000
|
heap
|
page read and write
|
||
7FFD349C5000
|
trusted library allocation
|
page read and write
|
||
7FFD34FF5000
|
trusted library allocation
|
page read and write
|
||
2072397F000
|
heap
|
page read and write
|
||
1B1B0000
|
trusted library allocation
|
page read and write
|
||
81F22ED000
|
stack
|
page read and write
|
||
2CB5848B000
|
trusted library allocation
|
page read and write
|
||
4528AF8000
|
stack
|
page read and write
|
||
15AB95C0000
|
trusted library allocation
|
page read and write
|
||
213565C0000
|
unkown
|
page readonly
|
||
218D6DF0000
|
heap
|
page read and write
|
||
21356550000
|
unkown
|
page readonly
|
||
218BC750000
|
heap
|
page read and write
|
||
21C73066000
|
heap
|
page read and write
|
||
7FFD3504F000
|
trusted library allocation
|
page read and write
|
||
22A7A2B0000
|
unkown
|
page readonly
|
||
21C75790000
|
heap
|
page execute and read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34A57000
|
trusted library allocation
|
page read and write
|
||
33703FE000
|
stack
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
22A79FF0000
|
unkown
|
page readonly
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
21C75DEA000
|
heap
|
page read and write
|
||
17206614000
|
trusted library allocation
|
page read and write
|
||
7FFD34B20000
|
trusted library allocation
|
page read and write
|
||
22A617A4000
|
trusted library allocation
|
page read and write
|
||
1721EC30000
|
trusted library section
|
page read and write
|
||
2133C530000
|
trusted library allocation
|
page read and write
|
||
7FFD34784000
|
trusted library allocation
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
2CB56A45000
|
heap
|
page read and write
|
||
23C0F318000
|
trusted library allocation
|
page read and write
|
||
3FCB8FE000
|
stack
|
page read and write
|
||
41F1CFE000
|
stack
|
page read and write
|
||
2133C2D9000
|
heap
|
page read and write
|
||
3FCB9FE000
|
stack
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
23853DD8000
|
heap
|
page read and write
|
||
22A617F6000
|
trusted library allocation
|
page read and write
|
||
207735FF000
|
heap
|
page read and write
|
||
22A620DD000
|
trusted library allocation
|
page read and write
|
||
21C75940000
|
heap
|
page read and write
|
||
15AB9580000
|
heap
|
page read and write
|
||
2070B280000
|
heap
|
page read and write
|
||
81F1FFE000
|
stack
|
page read and write
|
||
7FFD34A7B000
|
trusted library allocation
|
page read and write
|
||
29B44BE1000
|
heap
|
page read and write
|
||
D473CFF000
|
stack
|
page read and write
|
||
5BFBDAE000
|
stack
|
page read and write
|
||
22A71461000
|
trusted library allocation
|
page read and write
|
||
21C00576000
|
trusted library allocation
|
page read and write
|
||
2070022C000
|
trusted library allocation
|
page read and write
|
||
21C005F5000
|
trusted library allocation
|
page read and write
|
||
4F5D4FE000
|
stack
|
page read and write
|
||
7FFD34B1F000
|
trusted library allocation
|
page read and write
|
||
20770B56000
|
heap
|
page read and write
|
||
15AB9600000
|
heap
|
page read and write
|
||
15ABEB70000
|
trusted library allocation
|
page read and write
|
||
C9CC9FE000
|
stack
|
page read and write
|
||
2133C227000
|
unkown
|
page readonly
|
||
29B44C01000
|
heap
|
page read and write
|
||
23853E0A000
|
heap
|
page read and write
|
||
22900A70000
|
trusted library allocation
|
page read and write
|
||
23C0EAF2000
|
heap
|
page read and write
|
||
1721EE24000
|
heap
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
2133E0D9000
|
trusted library allocation
|
page read and write
|
||
15ABED04000
|
heap
|
page read and write
|
||
29B44BE1000
|
heap
|
page read and write
|
||
218BE5CB000
|
trusted library allocation
|
page read and write
|
||
23C0EB1A000
|
heap
|
page read and write
|
||
213571C0000
|
heap
|
page read and write
|
||
7FFD34AD0000
|
trusted library allocation
|
page execute and read and write
|
||
21356882000
|
unkown
|
page readonly
|
||
45282FD000
|
stack
|
page read and write
|
||
22A79D33000
|
unkown
|
page readonly
|
||
7FFD34B40000
|
trusted library allocation
|
page read and write
|
||
C88EAFF000
|
stack
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page execute and read and write
|
||
15AB9560000
|
heap
|
page read and write
|
||
29B44BF1000
|
heap
|
page read and write
|
||
7FFD35420000
|
trusted library allocation
|
page execute and read and write
|
||
2CB56720000
|
heap
|
page read and write
|
||
22900001000
|
trusted library allocation
|
page read and write
|
||
7FFD34AD0000
|
trusted library allocation
|
page read and write
|
||
7FFD34DF0000
|
trusted library allocation
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
23C0F073000
|
heap
|
page read and write
|
||
CB5367E000
|
stack
|
page read and write
|
||
22A79EFB000
|
heap
|
page read and write
|
||
C9CCFFA000
|
stack
|
page read and write
|
||
C9CD93B000
|
stack
|
page read and write
|
||
22A62111000
|
trusted library allocation
|
page read and write
|
||
7FFD34C90000
|
trusted library allocation
|
page read and write
|
||
2070000C000
|
trusted library allocation
|
page read and write
|
||
22900665000
|
trusted library allocation
|
page read and write
|
||
23C0F6F1000
|
trusted library allocation
|
page read and write
|
||
218D7340000
|
heap
|
page read and write
|
||
207094F0000
|
heap
|
page read and write
|
||
218D6A4B000
|
heap
|
page read and write
|
||
4F5D07E000
|
unkown
|
page readonly
|
||
238546B0000
|
unkown
|
page readonly
|
||
21356D40000
|
heap
|
page read and write
|
||
218BC853000
|
heap
|
page read and write
|
||
21C0026E000
|
trusted library allocation
|
page read and write
|
||
20700258000
|
trusted library allocation
|
page read and write
|
||
2070B3CB000
|
trusted library allocation
|
page read and write
|
||
7FFD34C00000
|
trusted library allocation
|
page execute and read and write
|
||
3181000
|
trusted library allocation
|
page read and write
|
||
5BFC6FE000
|
stack
|
page read and write
|
||
5BFC3F7000
|
stack
|
page read and write
|
||
7FFD34C30000
|
trusted library allocation
|
page read and write
|
||
7FFD34BE0000
|
trusted library allocation
|
page read and write
|
||
17205B0D000
|
unkown
|
page readonly
|
||
2CB70C20000
|
heap
|
page read and write
|
||
2290015C000
|
trusted library allocation
|
page read and write
|
||
21C10001000
|
trusted library allocation
|
page read and write
|
||
7FFD34886000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34994000
|
trusted library allocation
|
page read and write
|
||
7FFD347A3000
|
trusted library allocation
|
page execute and read and write
|
||
C2B317B000
|
stack
|
page read and write
|
||
3FCB5FE000
|
stack
|
page read and write
|
||
C2B31FF000
|
stack
|
page read and write
|
||
22A60DB0000
|
heap
|
page read and write
|
||
218BE4C8000
|
trusted library allocation
|
page read and write
|
||
21C75AE0000
|
trusted library section
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34BF0000
|
trusted library allocation
|
page read and write
|
||
23C0F36E000
|
trusted library allocation
|
page read and write
|
||
22A620FD000
|
trusted library allocation
|
page read and write
|
||
15ABECF2000
|
heap
|
page read and write
|
||
21C732F0000
|
trusted library section
|
page read and write
|
||
7FFD34E34000
|
trusted library allocation
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
7FFD349E2000
|
trusted library allocation
|
page read and write
|
||
1435000
|
heap
|
page read and write
|
||
2290080F000
|
trusted library allocation
|
page read and write
|
||
7FFD34934000
|
trusted library allocation
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
22A714E8000
|
trusted library allocation
|
page read and write
|
||
7FFD34793000
|
trusted library allocation
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
21356C10000
|
unkown
|
page readonly
|
||
213568C0000
|
unkown
|
page readonly
|
||
2CB703B0000
|
trusted library allocation
|
page read and write
|
||
22A61C65000
|
trusted library allocation
|
page read and write
|
||
2386D492000
|
heap
|
page read and write
|
||
B8234FE000
|
stack
|
page read and write
|
||
218BC5E6000
|
heap
|
page read and write
|
||
336F3FE000
|
stack
|
page read and write
|
||
7FFD34AF0000
|
trusted library allocation
|
page read and write
|
||
D4743FA000
|
stack
|
page read and write
|
||
128C000
|
heap
|
page read and write
|
||
15ABEE70000
|
trusted library allocation
|
page read and write
|
||
213567CA000
|
unkown
|
page readonly
|
||
218BC730000
|
heap
|
page read and write
|
||
21C73000000
|
heap
|
page read and write
|
||
213568B2000
|
unkown
|
page readonly
|
||
7FFD34B10000
|
trusted library allocation
|
page read and write
|
||
15ABA688000
|
trusted library allocation
|
page read and write
|
||
7FFD34952000
|
trusted library allocation
|
page read and write
|
||
2B8B7D50000
|
heap
|
page read and write
|
||
7FFD34B30000
|
trusted library allocation
|
page read and write
|
||
7FFD3479D000
|
trusted library allocation
|
page execute and read and write
|
||
22A61FEE000
|
trusted library allocation
|
page read and write
|
||
218D6FD0000
|
heap
|
page read and write
|
||
207000E9000
|
trusted library allocation
|
page read and write
|
||
218BE723000
|
trusted library allocation
|
page read and write
|
||
7FFD34BF0000
|
trusted library allocation
|
page read and write
|
||
17206560000
|
heap
|
page execute and read and write
|
||
21C75550000
|
trusted library section
|
page read and write
|
||
2133E0DB000
|
trusted library allocation
|
page read and write
|
||
A3C42FE000
|
stack
|
page read and write
|
||
7FFD349EA000
|
trusted library allocation
|
page read and write
|
||
B8230FF000
|
stack
|
page read and write
|
||
2B8B7E30000
|
heap
|
page read and write
|
||
81F20FA000
|
stack
|
page read and write
|
||
218BE291000
|
trusted library allocation
|
page read and write
|
||
2386CEC5000
|
heap
|
page read and write
|
||
15ABECC2000
|
heap
|
page read and write
|
||
7FFD347AB000
|
trusted library allocation
|
page execute and read and write
|
||
D4741FE000
|
stack
|
page read and write
|
||
21C74C90000
|
trusted library allocation
|
page read and write
|
||
5BFC0FE000
|
stack
|
page read and write
|
||
D4742FE000
|
stack
|
page read and write
|
||
238544FD000
|
unkown
|
page readonly
|
||
7FFD34A53000
|
trusted library allocation
|
page read and write
|
||
15AB96B8000
|
heap
|
page read and write
|
||
238544F2000
|
unkown
|
page readonly
|
||
23854781000
|
trusted library allocation
|
page read and write
|
||
2AC63310000
|
heap
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
41F1C7D000
|
stack
|
page read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
207735CA000
|
heap
|
page read and write
|
||
15ABEEE0000
|
remote allocation
|
page read and write
|
||
7FFD34D9F000
|
trusted library allocation
|
page read and write
|
||
22A7BB4B000
|
heap
|
page read and write
|
||
2386D032000
|
unkown
|
page readonly
|
||
7FFD34B40000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347DC000
|
trusted library allocation
|
page execute and read and write
|
||
21C75450000
|
heap
|
page read and write
|
||
7FFD34A42000
|
trusted library allocation
|
page read and write
|
||
22A7BA68000
|
heap
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
156F0413000
|
heap
|
page read and write
|
||
7FFD34D94000
|
trusted library allocation
|
page read and write
|
||
7FFD3492A000
|
trusted library allocation
|
page read and write
|
||
2135673D000
|
heap
|
page read and write
|
||
2CB711E0000
|
heap
|
page read and write
|
||
218D6DB0000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page execute and read and write
|
||
20700371000
|
trusted library allocation
|
page read and write
|
||
17206571000
|
trusted library allocation
|
page read and write
|
||
F2B6D7C000
|
stack
|
page read and write
|
||
7FFD34B40000
|
trusted library allocation
|
page read and write
|
||
21355DB0000
|
trusted library allocation
|
page read and write
|
||
218BE379000
|
trusted library allocation
|
page read and write
|
||
5BFD1FF000
|
stack
|
page read and write
|
||
7FFD34D10000
|
trusted library allocation
|
page read and write
|
||
22A7A486000
|
heap
|
page read and write
|
||
21C002EF000
|
trusted library allocation
|
page read and write
|
||
21356572000
|
unkown
|
page readonly
|
||
2290005E000
|
trusted library allocation
|
page read and write
|
||
7FFD3484C000
|
trusted library allocation
|
page execute and read and write
|
||
15ABEC20000
|
heap
|
page read and write
|
||
218D7330000
|
heap
|
page read and write
|
||
7FFD34C38000
|
trusted library allocation
|
page read and write
|
||
29B44BDB000
|
heap
|
page read and write
|
||
7FFD34A37000
|
trusted library allocation
|
page read and write
|
||
2135668A000
|
unkown
|
page readonly
|
||
7FFD34792000
|
trusted library allocation
|
page read and write
|
||
7FFD34C14000
|
trusted library allocation
|
page read and write
|
||
81F2B78000
|
stack
|
page read and write
|
||
B13EAFF000
|
stack
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
22A7A3FC000
|
heap
|
page read and write
|
||
22A7AC3B000
|
heap
|
page read and write
|
||
15AB9DE1000
|
trusted library allocation
|
page read and write
|
||
21C74C30000
|
trusted library section
|
page read and write
|
||
156F0523000
|
heap
|
page read and write
|
||
22A617D8000
|
trusted library allocation
|
page read and write
|
||
2CB58609000
|
trusted library allocation
|
page read and write
|
||
23C0F4FB000
|
trusted library allocation
|
page read and write
|
||
2386D012000
|
unkown
|
page readonly
|
||
23C0E970000
|
heap
|
page read and write
|
||
7FFD34AE0000
|
trusted library allocation
|
page execute and read and write
|
||
21C00234000
|
trusted library allocation
|
page read and write
|
||
7FFD35250000
|
trusted library allocation
|
page read and write
|
||
7FFD347C4000
|
trusted library allocation
|
page read and write
|
||
2CB58632000
|
trusted library allocation
|
page read and write
|
||
3FCBAFD000
|
stack
|
page read and write
|
||
22A60E60000
|
heap
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
23853BE0000
|
unkown
|
page readonly
|
||
7FFD353BC000
|
trusted library allocation
|
page read and write
|
||
670000
|
unkown
|
page readonly
|
||
22A60E65000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
7FFD34A4D000
|
trusted library allocation
|
page read and write
|
||
15ABAAB0000
|
trusted library allocation
|
page read and write
|
||
17205BA0000
|
heap
|
page read and write
|
||
22A61B6D000
|
trusted library allocation
|
page read and write
|
||
D4747F9000
|
stack
|
page read and write
|
||
29B44BE1000
|
heap
|
page read and write
|
||
81F327E000
|
stack
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
29B44BF1000
|
heap
|
page read and write
|
||
21C004BD000
|
trusted library allocation
|
page read and write
|
||
21C0036A000
|
trusted library allocation
|
page read and write
|
||
7FFD34C40000
|
trusted library allocation
|
page read and write
|
||
7FFD34C30000
|
trusted library allocation
|
page execute and read and write
|
||
23854070000
|
trusted library allocation
|
page read and write
|
||
23C0F71F000
|
trusted library allocation
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
156F0402000
|
heap
|
page read and write
|
||
20B21B26000
|
heap
|
page read and write
|
||
21C72830000
|
unkown
|
page readonly
|
||
7FFD3493E000
|
trusted library allocation
|
page read and write
|
||
218D6FD3000
|
heap
|
page read and write
|
||
22A71797000
|
trusted library allocation
|
page read and write
|
||
22A7BA9C000
|
heap
|
page read and write
|
||
15ABEB41000
|
trusted library allocation
|
page read and write
|
||
22A61CF4000
|
trusted library allocation
|
page read and write
|
||
21FA2570000
|
heap
|
page read and write
|
||
7FFD34924000
|
trusted library allocation
|
page read and write
|
||
218CE2A9000
|
trusted library allocation
|
page read and write
|
||
2070957E000
|
heap
|
page read and write
|
||
22A60BA0000
|
heap
|
page read and write
|
||
17206540000
|
trusted library section
|
page read and write
|
||
22A7AAD8000
|
heap
|
page read and write
|
||
21C755C0000
|
trusted library section
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
207735D5000
|
heap
|
page read and write
|
||
23C0F34A000
|
trusted library allocation
|
page read and write
|
||
2070034B000
|
trusted library allocation
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page execute and read and write
|
||
21356790000
|
unkown
|
page readonly
|
||
17205C92000
|
heap
|
page read and write
|
||
1721E5A0000
|
trusted library allocation
|
page read and write
|
||
156F0502000
|
heap
|
page read and write
|
||
7FFD34955000
|
trusted library allocation
|
page read and write
|
||
15ABEB20000
|
trusted library allocation
|
page read and write
|
||
129C000
|
heap
|
page read and write
|
||
98C15FE000
|
stack
|
page read and write
|
||
15AB962B000
|
heap
|
page read and write
|
||
22A620E3000
|
trusted library allocation
|
page read and write
|
||
2133C368000
|
heap
|
page read and write
|
||
7FFD34976000
|
trusted library allocation
|
page read and write
|
||
7FFD3482C000
|
trusted library allocation
|
page execute and read and write
|
||
213569FE000
|
unkown
|
page readonly
|
||
81F3C73000
|
stack
|
page read and write
|
||
2296F760000
|
heap
|
page read and write
|
||
7FFD34A76000
|
trusted library allocation
|
page read and write
|
||
7FFD34B30000
|
trusted library allocation
|
page read and write
|
||
A3C3EFE000
|
stack
|
page read and write
|
||
2AC63440000
|
heap
|
page read and write
|
||
21356D72000
|
heap
|
page read and write
|
||
29B44BF1000
|
heap
|
page read and write
|
||
20700422000
|
trusted library allocation
|
page read and write
|
||
22900B37000
|
trusted library allocation
|
page read and write
|
||
20709520000
|
heap
|
page read and write
|
||
7FFD34A0E000
|
trusted library allocation
|
page read and write
|
||
2386D030000
|
unkown
|
page readonly
|
||
23C0F6FB000
|
trusted library allocation
|
page read and write
|
||
15AB96B4000
|
heap
|
page read and write
|
||
20773950000
|
heap
|
page read and write
|
||
C9CD63F000
|
stack
|
page read and write
|
||
A3C41FE000
|
stack
|
page read and write
|
||
7FFD34BF2000
|
trusted library allocation
|
page read and write
|
||
22910025000
|
trusted library allocation
|
page read and write
|
||
15AB965B000
|
heap
|
page read and write
|
||
17205C67000
|
heap
|
page read and write
|
||
22A7AC1D000
|
heap
|
page read and write
|
||
7FFD34E10000
|
trusted library allocation
|
page read and write
|
||
4F5D37E000
|
unkown
|
page readonly
|
||
7FFD34920000
|
trusted library allocation
|
page read and write
|
||
229001CA000
|
trusted library allocation
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
21C0048A000
|
trusted library allocation
|
page read and write
|
||
17205C63000
|
heap
|
page read and write
|
||
2CB567A5000
|
heap
|
page read and write
|
||
21C74C00000
|
trusted library section
|
page read and write
|
||
7FFD34783000
|
trusted library allocation
|
page execute and read and write
|
||
2CB70ABF000
|
heap
|
page read and write
|
||
22A7AD10000
|
heap
|
page read and write
|
||
7FFD35120000
|
trusted library allocation
|
page read and write
|
||
238540C0000
|
heap
|
page read and write
|
||
23C1F338000
|
trusted library allocation
|
page read and write
|
||
23854740000
|
heap
|
page execute and read and write
|
||
29B44BDB000
|
heap
|
page read and write
|
||
213567F2000
|
unkown
|
page readonly
|
||
7FFD34932000
|
trusted library allocation
|
page read and write
|
||
22A6177F000
|
trusted library allocation
|
page read and write
|
||
7FFD34C10000
|
trusted library allocation
|
page read and write
|
||
21C74C40000
|
trusted library section
|
page read and write
|
||
2CB585DD000
|
trusted library allocation
|
page read and write
|
||
7FFD34E39000
|
trusted library allocation
|
page read and write
|
||
7FFD34B30000
|
trusted library allocation
|
page execute and read and write
|
||
21C00572000
|
trusted library allocation
|
page read and write
|
||
23C0F7E9000
|
trusted library allocation
|
page read and write
|
||
7FFD34A43000
|
trusted library allocation
|
page read and write
|
||
737095D000
|
stack
|
page read and write
|
||
238544E4000
|
unkown
|
page readonly
|
||
7FFD34B60000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34A54000
|
trusted library allocation
|
page read and write
|
||
21356950000
|
unkown
|
page readonly
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
15ABEB60000
|
trusted library allocation
|
page read and write
|
||
218BE280000
|
heap
|
page execute and read and write
|
||
22A61340000
|
heap
|
page read and write
|
||
7FFD351D0000
|
trusted library allocation
|
page read and write
|
||
218BC820000
|
trusted library allocation
|
page read and write
|
||
156F0544000
|
heap
|
page read and write
|
||
29B44B60000
|
heap
|
page read and write
|
||
218BC915000
|
heap
|
page read and write
|
||
218D6C13000
|
heap
|
page execute and read and write
|
||
81F273E000
|
stack
|
page read and write
|
||
156EFFD0000
|
heap
|
page read and write
|
||
15ABECFB000
|
heap
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
2291020E000
|
trusted library allocation
|
page read and write
|
||
218BC910000
|
heap
|
page read and write
|
||
156F0565000
|
heap
|
page read and write
|
||
20770B96000
|
heap
|
page read and write
|
||
218BE719000
|
trusted library allocation
|
page read and write
|
||
20700001000
|
trusted library allocation
|
page read and write
|
||
2CB70CD0000
|
heap
|
page execute and read and write
|
||
22A79EC2000
|
heap
|
page read and write
|
||
218D7320000
|
heap
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
81F2C70000
|
stack
|
page read and write
|
||
98C14FE000
|
stack
|
page read and write
|
||
23853C70000
|
heap
|
page read and write
|
||
7FFD349CD000
|
trusted library allocation
|
page read and write
|
||
22A61D49000
|
trusted library allocation
|
page read and write
|
||
7FFD353A0000
|
trusted library allocation
|
page read and write
|
||
7FFD347A4000
|
trusted library allocation
|
page read and write
|
||
1BB4F000
|
stack
|
page read and write
|
||
7FFD3493A000
|
trusted library allocation
|
page read and write
|
||
238546D2000
|
unkown
|
page readonly
|
||
4F5D7FE000
|
stack
|
page read and write
|
||
15ABEC4E000
|
heap
|
page read and write
|
||
22A61F34000
|
trusted library allocation
|
page read and write
|
||
7FFD35130000
|
trusted library allocation
|
page read and write
|
||
2386CF82000
|
heap
|
page read and write
|
||
22A7A35C000
|
heap
|
page read and write
|
||
2CB725BA000
|
heap
|
page read and write
|
||
41F237A000
|
stack
|
page read and write
|
||
21356D38000
|
heap
|
page read and write
|
||
7FFD34C40000
|
trusted library allocation
|
page read and write
|
||
23853DEA000
|
heap
|
page read and write
|
||
29B44BE1000
|
heap
|
page read and write
|
||
7FFD347A4000
|
trusted library allocation
|
page read and write
|
||
22900A5D000
|
trusted library allocation
|
page read and write
|
||
15ABEE90000
|
trusted library allocation
|
page read and write
|
||
23854862000
|
trusted library allocation
|
page read and write
|
||
22A7146E000
|
trusted library allocation
|
page read and write
|
||
4528DFA000
|
stack
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349DD000
|
trusted library allocation
|
page read and write
|
||
23C0EC05000
|
heap
|
page read and write
|
||
21356582000
|
unkown
|
page readonly
|
||
23C0EA00000
|
trusted library allocation
|
page read and write
|
||
15ABA440000
|
trusted library allocation
|
page read and write
|
||
22A79E3D000
|
unkown
|
page readonly
|
||
22A7B090000
|
heap
|
page read and write
|
||
7FFD35240000
|
trusted library allocation
|
page read and write
|
||
4527BBE000
|
stack
|
page read and write
|
||
7FFD34A67000
|
trusted library allocation
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page execute and read and write
|
||
207097C0000
|
unkown
|
page readonly
|
||
336F7FB000
|
stack
|
page read and write
|
||
A3C398E000
|
stack
|
page read and write
|
||
7FFD34C77000
|
trusted library allocation
|
page read and write
|
||
4F5D77E000
|
unkown
|
page readonly
|
||
7FFD351E0000
|
trusted library allocation
|
page read and write
|
||
15ABA550000
|
trusted library section
|
page readonly
|
||
20B21A00000
|
heap
|
page read and write
|
||
B823D37000
|
stack
|
page read and write
|
||
4F5D2FE000
|
stack
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34A06000
|
trusted library allocation
|
page read and write
|
||
7FFD34A37000
|
trusted library allocation
|
page read and write
|
||
7FFD34992000
|
trusted library allocation
|
page read and write
|
||
7FFD349AE000
|
trusted library allocation
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34942000
|
trusted library allocation
|
page read and write
|
||
13181000
|
trusted library allocation
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
7FFD34987000
|
trusted library allocation
|
page read and write
|
||
23C1F34F000
|
trusted library allocation
|
page read and write
|
||
272F2C70000
|
heap
|
page read and write
|
||
7FFD34AF0000
|
trusted library allocation
|
page read and write
|
||
4F5C19B000
|
stack
|
page read and write
|
||
213583C0000
|
unkown
|
page readonly
|
||
2133C510000
|
heap
|
page read and write
|
||
7FFD347BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
7FFD34C20000
|
trusted library allocation
|
page read and write
|
||
2133DF9F000
|
trusted library allocation
|
page read and write
|
||
7FFD34A9B000
|
trusted library allocation
|
page read and write
|
||
98C18FF000
|
stack
|
page read and write
|
||
7FFD3479D000
|
trusted library allocation
|
page execute and read and write
|
||
13183000
|
trusted library allocation
|
page read and write
|
||
22A60E00000
|
trusted library allocation
|
page read and write
|
||
7FFD34B46000
|
trusted library allocation
|
page read and write
|
||
22A79E3A000
|
unkown
|
page readonly
|
||
7FFD34846000
|
trusted library allocation
|
page read and write
|
||
7FFD347B2000
|
trusted library allocation
|
page read and write
|
||
22A79CE8000
|
unkown
|
page readonly
|
||
20770B98000
|
heap
|
page read and write
|
||
22A79D42000
|
unkown
|
page readonly
|
||
23C0EAB4000
|
heap
|
page read and write
|
||
22910133000
|
trusted library allocation
|
page read and write
|
||
29B44BE1000
|
heap
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
218BE29C000
|
trusted library allocation
|
page read and write
|
||
21C100F2000
|
trusted library allocation
|
page read and write
|
||
21C72FB0000
|
heap
|
page read and write
|
||
213567D0000
|
unkown
|
page readonly
|
||
21356B60000
|
heap
|
page read and write
|
||
218CE291000
|
trusted library allocation
|
page read and write
|
||
2134DD95000
|
trusted library allocation
|
page read and write
|
||
7FFD3478D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3483C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34C50000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
20773350000
|
heap
|
page read and write
|
||
29B44BDB000
|
heap
|
page read and write
|
||
22A60D90000
|
heap
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
20770AD0000
|
heap
|
page read and write
|
||
22A7AD6B000
|
heap
|
page read and write
|
||
23C0F7E6000
|
trusted library allocation
|
page read and write
|
||
21356F70000
|
heap
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
22A7AD23000
|
heap
|
page read and write
|
||
22A7AB0D000
|
heap
|
page read and write
|
||
7FFD34866000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
22A7BAE4000
|
heap
|
page read and write
|
||
7FFD34FE0000
|
trusted library allocation
|
page read and write
|
||
7FFD349BA000
|
trusted library allocation
|
page read and write
|
||
7FFD35340000
|
trusted library allocation
|
page read and write
|
||
7FFD347A3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34B00000
|
trusted library allocation
|
page read and write
|
||
336EBFE000
|
stack
|
page read and write
|
||
7FFD35080000
|
trusted library allocation
|
page read and write
|
||
21356AB0000
|
trusted library section
|
page readonly
|
||
7FFD34910000
|
trusted library allocation
|
page read and write
|
||
20770D10000
|
trusted library allocation
|
page read and write
|
||
2386D35D000
|
heap
|
page read and write
|
||
4F5D8FE000
|
stack
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
22A7ABB5000
|
heap
|
page read and write
|
||
15AB96A1000
|
heap
|
page read and write
|
||
213582DA000
|
heap
|
page read and write
|
||
207731C0000
|
heap
|
page execute and read and write
|
||
23C0E890000
|
heap
|
page read and write
|
||
7FFD34CE0000
|
trusted library allocation
|
page read and write
|
||
7FFD347BB000
|
trusted library allocation
|
page execute and read and write
|
||
98C1FF5000
|
stack
|
page read and write
|
||
23854660000
|
unkown
|
page readonly
|
||
336FBFF000
|
stack
|
page read and write
|
||
2077304F000
|
heap
|
page read and write
|
||
22A7AD3B000
|
heap
|
page read and write
|
||
7FFD34B40000
|
trusted library allocation
|
page read and write
|
||
21C72830000
|
unkown
|
page readonly
|
||
22A61A7B000
|
trusted library allocation
|
page read and write
|
||
23C0F38A000
|
trusted library allocation
|
page read and write
|
||
22A71A7C000
|
trusted library allocation
|
page read and write
|
||
207003E6000
|
trusted library allocation
|
page read and write
|
||
21C003E9000
|
trusted library allocation
|
page read and write
|
||
17216854000
|
trusted library allocation
|
page read and write
|
||
29B44BE1000
|
heap
|
page read and write
|
||
7FFD3483C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page read and write
|
||
7FFD351C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34FC0000
|
trusted library allocation
|
page execute and read and write
|
||
C9CDB39000
|
stack
|
page read and write
|
||
4F5D6FE000
|
stack
|
page read and write
|
||
7FFD34B60000
|
trusted library allocation
|
page read and write
|
||
21C75C90000
|
trusted library section
|
page read and write
|
||
7FFD34856000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347A2000
|
trusted library allocation
|
page read and write
|
||
7FFD34B20000
|
trusted library allocation
|
page read and write
|
||
2290026B000
|
trusted library allocation
|
page read and write
|
||
229005FD000
|
trusted library allocation
|
page read and write
|
||
15AB95D0000
|
trusted library section
|
page read and write
|
||
D4748FD000
|
stack
|
page read and write
|
||
22A7ABB1000
|
heap
|
page read and write
|
||
7FFD34A33000
|
trusted library allocation
|
page read and write
|
||
22A61EA9000
|
trusted library allocation
|
page read and write
|
||
3170000
|
heap
|
page read and write
|
||
238545D5000
|
heap
|
page execute and read and write
|
||
7FFD34784000
|
trusted library allocation
|
page read and write
|
||
218BCAE5000
|
heap
|
page read and write
|
||
156F0010000
|
unkown
|
page read and write
|
||
21C756C0000
|
trusted library section
|
page read and write
|
||
7FFD34DC0000
|
trusted library allocation
|
page read and write
|
||
B18887E000
|
unkown
|
page readonly
|
||
2B8B7F10000
|
heap
|
page read and write
|
||
7FFD354E0000
|
trusted library allocation
|
page read and write
|
||
2386CEDC000
|
heap
|
page read and write
|
||
4F5EA7E000
|
unkown
|
page readonly
|
||
23C0F306000
|
trusted library allocation
|
page read and write
|
||
7FFD353D0000
|
trusted library allocation
|
page read and write
|
||
7FFD347A4000
|
trusted library allocation
|
page read and write
|
||
20770AF0000
|
heap
|
page read and write
|
||
F2B72FF000
|
stack
|
page read and write
|
||
2070955E000
|
heap
|
page read and write
|
||
156F0523000
|
heap
|
page read and write
|
||
207097C2000
|
unkown
|
page readonly
|
||
2CB567A0000
|
heap
|
page read and write
|
||
29B44BE1000
|
heap
|
page read and write
|
||
23C0F342000
|
trusted library allocation
|
page read and write
|
||
7FFD35030000
|
trusted library allocation
|
page read and write
|
||
29B44BE1000
|
heap
|
page read and write
|
||
7FFD35160000
|
trusted library allocation
|
page read and write
|
||
23C1F33F000
|
trusted library allocation
|
page read and write
|
||
2134DD9D000
|
trusted library allocation
|
page read and write
|
||
7FFD3482C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
2CB56620000
|
heap
|
page read and write
|
||
229100E9000
|
trusted library allocation
|
page read and write
|
||
7FFD35210000
|
trusted library allocation
|
page execute and read and write
|
||
218BC59B000
|
heap
|
page read and write
|
||
7FFD34B10000
|
trusted library allocation
|
page read and write
|
||
23C0F382000
|
trusted library allocation
|
page read and write
|
||
218BC770000
|
heap
|
page read and write
|
||
218D7445000
|
heap
|
page read and write
|
||
22A62278000
|
trusted library allocation
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
23C0F55F000
|
trusted library allocation
|
page read and write
|
||
22A612F2000
|
unkown
|
page readonly
|
||
A3C38FE000
|
stack
|
page read and write
|
||
98C20F9000
|
stack
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
2CB56A20000
|
trusted library allocation
|
page read and write
|
||
A3C3DFE000
|
stack
|
page read and write
|
||
7FFD34AE0000
|
trusted library allocation
|
page read and write
|
||
23854690000
|
unkown
|
page readonly
|
||
7FFD34A64000
|
trusted library allocation
|
page read and write
|
||
22A62050000
|
trusted library allocation
|
page read and write
|
||
207097C6000
|
unkown
|
page readonly
|
||
22A7A280000
|
unkown
|
page readonly
|
||
21356769000
|
heap
|
page read and write
|
||
29B44BF1000
|
heap
|
page read and write
|
||
22A60C0E000
|
heap
|
page read and write
|
||
17205F80000
|
heap
|
page read and write
|
||
15AB966C000
|
heap
|
page read and write
|
||
2CB568ED000
|
heap
|
page read and write
|
||
4F5C87E000
|
unkown
|
page readonly
|
||
7FFD34DD0000
|
trusted library allocation
|
page execute and read and write
|
||
22A7A46F000
|
heap
|
page read and write
|
||
20700281000
|
trusted library allocation
|
page read and write
|
||
2CB58630000
|
trusted library allocation
|
page read and write
|
||
17205BF0000
|
heap
|
page read and write
|
||
7FFD34927000
|
trusted library allocation
|
page read and write
|
||
156F0500000
|
heap
|
page read and write
|
||
4F5D9FE000
|
stack
|
page read and write
|
||
7FFD34920000
|
trusted library allocation
|
page read and write
|
||
213568F0000
|
trusted library allocation
|
page read and write
|
||
21C75750000
|
trusted library section
|
page readonly
|
||
29B44BE1000
|
heap
|
page read and write
|
||
22A7BA00000
|
heap
|
page read and write
|
||
2CB683C9000
|
trusted library allocation
|
page read and write
|
||
207000DB000
|
trusted library allocation
|
page read and write
|
||
15AB9F1A000
|
heap
|
page read and write
|
||
2CB583A0000
|
heap
|
page read and write
|
||
7FFD34920000
|
trusted library allocation
|
page read and write
|
||
22A7AB81000
|
heap
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
20709568000
|
heap
|
page read and write
|
||
7FFD34794000
|
trusted library allocation
|
page read and write
|
||
20770B30000
|
heap
|
page read and write
|
||
22A7AEB2000
|
heap
|
page read and write
|
||
20774AEC000
|
heap
|
page read and write
|
||
29B44BF1000
|
heap
|
page read and write
|
||
156F0115000
|
trusted library allocation
|
page read and write
|
||
1B20BE97000
|
heap
|
page read and write
|
||
7FFD34A39000
|
trusted library allocation
|
page read and write
|
||
7FFD34FF3000
|
trusted library allocation
|
page read and write
|
||
7FFD34866000
|
trusted library allocation
|
page execute and read and write
|
||
20774AD0000
|
heap
|
page read and write
|
||
81F2435000
|
stack
|
page read and write
|
||
22A7B9CA000
|
heap
|
page read and write
|
||
229001A0000
|
trusted library allocation
|
page read and write
|
||
218BC7B0000
|
trusted library allocation
|
page read and write
|
||
156F00BF000
|
heap
|
page read and write
|
||
218BE856000
|
trusted library allocation
|
page read and write
|
||
15ABEB40000
|
trusted library allocation
|
page read and write
|
||
7FFD34B78000
|
trusted library allocation
|
page read and write
|
||
23C0EA15000
|
heap
|
page read and write
|
||
7FFD34AF0000
|
trusted library allocation
|
page read and write
|
||
7FFD34B6E000
|
trusted library allocation
|
page read and write
|
||
22A716CA000
|
trusted library allocation
|
page read and write
|
||
7FFD34933000
|
trusted library allocation
|
page read and write
|
||
156F041B000
|
heap
|
page read and write
|
||
22A7A3BE000
|
heap
|
page read and write
|
||
7FFD3479B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34C20000
|
trusted library allocation
|
page read and write
|
||
2071B29E000
|
trusted library allocation
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
20700245000
|
trusted library allocation
|
page read and write
|
||
29B44BF1000
|
heap
|
page read and write
|
||
156F008B000
|
heap
|
page read and write
|
||
1B20BDC0000
|
heap
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
2077362D000
|
heap
|
page read and write
|
||
B8235FE000
|
stack
|
page read and write
|
||
15AB9666000
|
heap
|
page read and write
|
||
21C0022C000
|
trusted library allocation
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
2CB58602000
|
trusted library allocation
|
page read and write
|
||
2291002E000
|
trusted library allocation
|
page read and write
|
||
229100A0000
|
trusted library allocation
|
page read and write
|
||
22900154000
|
trusted library allocation
|
page read and write
|
||
21C73090000
|
heap
|
page read and write
|
||
1721EDEA000
|
heap
|
page read and write
|
||
17205C8F000
|
heap
|
page read and write
|
||
7FFD35058000
|
trusted library allocation
|
page read and write
|
||
2386D374000
|
heap
|
page read and write
|
||
2133C2B0000
|
heap
|
page read and write
|
||
7FFD35312000
|
trusted library allocation
|
page read and write
|
||
22A79FC2000
|
unkown
|
page readonly
|
||
15AB9F00000
|
heap
|
page read and write
|
||
B82393D000
|
stack
|
page read and write
|
||
23853D70000
|
heap
|
page read and write
|
||
7FFD34945000
|
trusted library allocation
|
page read and write
|
||
2CB70AF4000
|
heap
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
2386D367000
|
heap
|
page read and write
|
||
7FFD34AE0000
|
trusted library allocation
|
page read and write
|
||
4F5E37B000
|
stack
|
page read and write
|
||
7FFD34EF0000
|
trusted library allocation
|
page read and write
|
||
20B21B20000
|
heap
|
page read and write
|
||
218D6DE0000
|
trusted library section
|
page readonly
|
||
7FFD3483C000
|
trusted library allocation
|
page execute and read and write
|
||
15AB9713000
|
heap
|
page read and write
|
||
15ABEC55000
|
heap
|
page read and write
|
||
156F0102000
|
trusted library allocation
|
page read and write
|
||
81F317D000
|
stack
|
page read and write
|
||
98C1CFD000
|
stack
|
page read and write
|
||
22A7AD0D000
|
heap
|
page read and write
|
||
22A7A3D4000
|
heap
|
page read and write
|
||
22A618DB000
|
trusted library allocation
|
page read and write
|
||
2296F6D0000
|
unkown
|
page readonly
|
||
238545BE000
|
unkown
|
page readonly
|
||
98C0FBE000
|
stack
|
page read and write
|
||
2CB5874B000
|
trusted library allocation
|
page read and write
|
||
22A79CE2000
|
unkown
|
page readonly
|
||
C9CD43E000
|
stack
|
page read and write
|
||
21FA27C5000
|
heap
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
207731C3000
|
heap
|
page execute and read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
21C00237000
|
trusted library allocation
|
page read and write
|
||
29B44BE1000
|
heap
|
page read and write
|
||
7FFD3479D000
|
trusted library allocation
|
page execute and read and write
|
||
4F5D97E000
|
unkown
|
page readonly
|
||
7FFD34DA7000
|
trusted library allocation
|
page read and write
|
||
2386D465000
|
heap
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
29B44BE1000
|
heap
|
page read and write
|
||
23854662000
|
unkown
|
page readonly
|
||
29B44BE1000
|
heap
|
page read and write
|
||
23853BE0000
|
unkown
|
page readonly
|
||
2386D660000
|
heap
|
page read and write
|
||
20773AC5000
|
heap
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
15ABEB84000
|
trusted library allocation
|
page read and write
|
||
207735CC000
|
heap
|
page read and write
|
||
81F3A73000
|
stack
|
page read and write
|
||
2CB70C23000
|
heap
|
page read and write
|
||
1289000
|
heap
|
page read and write
|
||
7FFD349FE000
|
trusted library allocation
|
page read and write
|
||
21C000B2000
|
trusted library allocation
|
page read and write
|
||
2386D636000
|
heap
|
page read and write
|
||
7FFD34965000
|
trusted library allocation
|
page read and write
|
||
22910019000
|
trusted library allocation
|
page read and write
|
||
B1886FF000
|
stack
|
page read and write
|
||
1721EC60000
|
trusted library section
|
page read and write
|
||
15ABED0A000
|
heap
|
page read and write
|
||
22A7AF70000
|
heap
|
page execute and read and write
|
||
7FFD34959000
|
trusted library allocation
|
page read and write
|
||
21356570000
|
unkown
|
page readonly
|
||
7FFD34C70000
|
trusted library allocation
|
page read and write
|
||
2386D5BE000
|
heap
|
page read and write
|
||
2CB5681D000
|
heap
|
page read and write
|
||
21C73310000
|
trusted library section
|
page read and write
|
||
21C75465000
|
heap
|
page read and write
|
||
7FFD35190000
|
trusted library allocation
|
page read and write
|
||
2133C220000
|
unkown
|
page readonly
|
||
7FFD34D00000
|
trusted library allocation
|
page read and write
|
||
21FA2690000
|
heap
|
page read and write
|
||
7FFD34F90000
|
trusted library allocation
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
272F2BE0000
|
heap
|
page read and write
|
||
B1883BD000
|
stack
|
page read and write
|
||
2070B38E000
|
trusted library allocation
|
page read and write
|
||
CB537FE000
|
unkown
|
page readonly
|
||
7FFD34BF0000
|
trusted library allocation
|
page read and write
|
||
F2B78F1000
|
stack
|
page read and write
|
||
7FFD35230000
|
trusted library allocation
|
page read and write
|
||
23C0EA40000
|
trusted library allocation
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
22A61E95000
|
trusted library allocation
|
page read and write
|
||
F2B75FF000
|
stack
|
page read and write
|
||
7FFD34C60000
|
trusted library allocation
|
page read and write
|
||
21356632000
|
unkown
|
page readonly
|
||
41F217C000
|
stack
|
page read and write
|
||
207097C9000
|
unkown
|
page readonly
|
||
21C72FE0000
|
heap
|
page read and write
|
||
207003EE000
|
trusted library allocation
|
page read and write
|
||
2CB5684B000
|
heap
|
page read and write
|
||
22A7BA6A000
|
heap
|
page read and write
|
||
2296F6D0000
|
unkown
|
page readonly
|
||
21C758E6000
|
heap
|
page read and write
|
||
2386CF19000
|
heap
|
page read and write
|
||
2070B398000
|
trusted library allocation
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
2CB583B1000
|
trusted library allocation
|
page read and write
|
||
15ABED0D000
|
heap
|
page read and write
|
||
213571B0000
|
heap
|
page read and write
|
||
7FFD34C90000
|
trusted library allocation
|
page read and write
|
||
2386D5C6000
|
heap
|
page read and write
|
||
22900761000
|
trusted library allocation
|
page read and write
|
||
29B44A20000
|
heap
|
page read and write
|
||
7FFD347AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34C0C000
|
trusted library allocation
|
page read and write
|
||
207735C0000
|
heap
|
page read and write
|
||
20700417000
|
trusted library allocation
|
page read and write
|
||
7FFD34AE0000
|
trusted library allocation
|
page read and write
|
||
7FFD353E0000
|
trusted library allocation
|
page read and write
|
||
7FFD34C10000
|
trusted library allocation
|
page read and write
|
||
21356880000
|
unkown
|
page readonly
|
||
2133C5D5000
|
heap
|
page read and write
|
||
CB5377E000
|
stack
|
page read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
238540C5000
|
heap
|
page read and write
|
||
2CB567D0000
|
trusted library allocation
|
page read and write
|
||
22A7ABC9000
|
heap
|
page read and write
|
||
7FFD347DC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34958000
|
trusted library allocation
|
page read and write
|
||
2133DFCD000
|
trusted library allocation
|
page read and write
|
||
29B44B00000
|
heap
|
page read and write
|
||
7FFD34929000
|
trusted library allocation
|
page read and write
|
||
22A7ACDD000
|
heap
|
page read and write
|
||
7FFD34773000
|
trusted library allocation
|
page execute and read and write
|
||
22A61FAE000
|
trusted library allocation
|
page read and write
|
||
7FFD34B20000
|
trusted library allocation
|
page read and write
|
||
22A7A680000
|
unkown
|
page readonly
|
||
7FFD34B57000
|
trusted library allocation
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
7FFD35400000
|
trusted library allocation
|
page read and write
|
||
21C00106000
|
trusted library allocation
|
page read and write
|
||
22A7BA7B000
|
heap
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page execute and read and write
|
||
23C0F6DB000
|
trusted library allocation
|
page read and write
|
||
7FFD34984000
|
trusted library allocation
|
page read and write
|
||
22A7A2B2000
|
unkown
|
page readonly
|
||
7FFD34AD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD354A0000
|
trusted library allocation
|
page read and write
|
||
15ABEC62000
|
heap
|
page read and write
|
||
2070041B000
|
trusted library allocation
|
page read and write
|
||
213565C2000
|
unkown
|
page readonly
|
||
20770EA0000
|
heap
|
page read and write
|
||
21C74B70000
|
trusted library section
|
page read and write
|
||
7FFD35180000
|
trusted library allocation
|
page read and write
|
||
22A613B2000
|
unkown
|
page readonly
|
||
2CB71390000
|
heap
|
page read and write
|
||
2133C31A000
|
heap
|
page read and write
|
||
7FFD3499A000
|
trusted library allocation
|
page read and write
|
||
21356F92000
|
unkown
|
page readonly
|
||
20700261000
|
trusted library allocation
|
page read and write
|
||
7FFD34DA5000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
23854770000
|
heap
|
page execute and read and write
|
||
7FFD34DA2000
|
trusted library allocation
|
page read and write
|
||
2CB567E0000
|
heap
|
page read and write
|
||
2133DFA3000
|
trusted library allocation
|
page read and write
|
||
22A7BAEA000
|
heap
|
page read and write
|
||
7FFD34CD0000
|
trusted library allocation
|
page read and write
|
||
2070B393000
|
trusted library allocation
|
page read and write
|
||
7FFD34AE0000
|
trusted library allocation
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page execute and read and write
|
||
22A60E75000
|
heap
|
page read and write
|
||
22A7A350000
|
heap
|
page read and write
|
||
7FFD34E26000
|
trusted library allocation
|
page read and write
|
||
7FFD34A52000
|
trusted library allocation
|
page read and write
|
||
7FFD34E50000
|
trusted library allocation
|
page read and write
|
||
2CB70BF0000
|
heap
|
page execute and read and write
|
||
21356ABF000
|
trusted library section
|
page readonly
|
||
22A61D75000
|
trusted library allocation
|
page read and write
|
||
7FFD347A4000
|
trusted library allocation
|
page read and write
|
||
29B44BF1000
|
heap
|
page read and write
|
||
7FFD34C00000
|
trusted library allocation
|
page execute and read and write
|
||
229007B2000
|
trusted library allocation
|
page read and write
|
||
7FFD34BF5000
|
trusted library allocation
|
page read and write
|
||
22A7A872000
|
unkown
|
page readonly
|
||
7FFD34BF7000
|
trusted library allocation
|
page read and write
|
||
B822FFE000
|
stack
|
page read and write
|
||
23853E0D000
|
heap
|
page read and write
|
||
23C0F96B000
|
trusted library allocation
|
page read and write
|
||
218CE2AD000
|
trusted library allocation
|
page read and write
|
||
2133DF97000
|
trusted library allocation
|
page read and write
|
||
21C755B0000
|
heap
|
page read and write
|
||
7FFD35390000
|
trusted library allocation
|
page read and write
|
||
15AB968F000
|
heap
|
page read and write
|
||
21C0017B000
|
trusted library allocation
|
page read and write
|
||
2CB56A40000
|
heap
|
page read and write
|
||
7FFD34A34000
|
trusted library allocation
|
page read and write
|
||
7370D7E000
|
stack
|
page read and write
|
||
7FFD34AF0000
|
trusted library allocation
|
page read and write
|
||
2296F6D4000
|
unkown
|
page readonly
|
||
7FFD34B88000
|
trusted library allocation
|
page read and write
|
||
7FFD34782000
|
trusted library allocation
|
page read and write
|
||
7FFD34B8E000
|
trusted library allocation
|
page read and write
|
||
7FFD35026000
|
trusted library allocation
|
page read and write
|
||
2133C5C3000
|
heap
|
page read and write
|
||
7FFD34919000
|
trusted library allocation
|
page read and write
|
||
7FFD35024000
|
trusted library allocation
|
page read and write
|
||
7FFD34826000
|
trusted library allocation
|
page read and write
|
||
2070B332000
|
trusted library allocation
|
page read and write
|
||
7FFD34C30000
|
trusted library allocation
|
page read and write
|
||
C9CCEFE000
|
stack
|
page read and write
|
||
B823B3A000
|
stack
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
23854C74000
|
trusted library allocation
|
page read and write
|
||
7FFD347AD000
|
trusted library allocation
|
page execute and read and write
|
||
22A7AB74000
|
heap
|
page read and write
|
||
7FFD347B4000
|
trusted library allocation
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page execute and read and write
|
||
23854E10000
|
trusted library allocation
|
page read and write
|
||
7FFD34784000
|
trusted library allocation
|
page read and write
|
||
7FFD34A72000
|
trusted library allocation
|
page read and write
|
||
7FFD34866000
|
trusted library allocation
|
page execute and read and write
|
||
2386D2FF000
|
heap
|
page read and write
|
||
15ABEB40000
|
trusted library allocation
|
page read and write
|
||
5BFC8F7000
|
stack
|
page read and write
|
||
7FFD34BF0000
|
trusted library allocation
|
page read and write
|
||
1B20C095000
|
heap
|
page read and write
|
||
2296F7E7000
|
heap
|
page read and write
|
||
15AB9590000
|
heap
|
page read and write
|
||
7FFD34B40000
|
trusted library allocation
|
page read and write
|
||
7FFD34939000
|
trusted library allocation
|
page read and write
|
||
7FFD35360000
|
trusted library allocation
|
page read and write
|
||
22A617E0000
|
trusted library allocation
|
page read and write
|
||
41F1D7E000
|
stack
|
page read and write
|
||
22A61FA4000
|
trusted library allocation
|
page read and write
|
||
218BE510000
|
trusted library allocation
|
page read and write
|
||
7FFD34BE0000
|
trusted library allocation
|
page read and write
|
||
7FFD354B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34C72000
|
trusted library allocation
|
page read and write
|
||
22900924000
|
trusted library allocation
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page execute and read and write
|
||
15ABEB80000
|
trusted library allocation
|
page read and write
|
||
2CB56740000
|
heap
|
page read and write
|
||
7FFD34C23000
|
trusted library allocation
|
page read and write
|
||
21C75CA0000
|
trusted library section
|
page read and write
|
||
22A7BA7F000
|
heap
|
page read and write
|
||
21356580000
|
unkown
|
page readonly
|
||
23C0EA8D000
|
heap
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page execute and read and write
|
||
29B44BE1000
|
heap
|
page read and write
|
||
20773330000
|
heap
|
page read and write
|
||
21356C12000
|
unkown
|
page readonly
|
||
7FFD34BC0000
|
trusted library allocation
|
page read and write
|
||
22A61783000
|
trusted library allocation
|
page read and write
|
||
22A7A4A6000
|
heap
|
page read and write
|
||
272F2B70000
|
heap
|
page read and write
|
||
7FFD349AA000
|
trusted library allocation
|
page read and write
|
||
15AB9E15000
|
heap
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
21356F75000
|
heap
|
page read and write
|
||
2CB70D90000
|
trusted library section
|
page readonly
|
||
2070B31C000
|
trusted library allocation
|
page read and write
|
||
22A61E93000
|
trusted library allocation
|
page read and write
|
||
2CB567E8000
|
heap
|
page read and write
|
||
29B44BC0000
|
heap
|
page read and write
|
||
213582C0000
|
heap
|
page read and write
|
||
22A79FF2000
|
unkown
|
page readonly
|
||
7FFD34944000
|
trusted library allocation
|
page read and write
|
||
23C0F567000
|
trusted library allocation
|
page read and write
|
||
2386D3A0000
|
heap
|
page read and write
|
||
22A7AEC6000
|
heap
|
page read and write
|
||
C9CDC3B000
|
stack
|
page read and write
|
||
7FFD347AB000
|
trusted library allocation
|
page execute and read and write
|
||
23854550000
|
unkown
|
page readonly
|
||
2CB683CD000
|
trusted library allocation
|
page read and write
|
||
7FFD34B60000
|
trusted library allocation
|
page read and write
|
||
23853D50000
|
heap
|
page read and write
|
||
7FFD34E30000
|
trusted library allocation
|
page read and write
|
||
15AB9E02000
|
heap
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
22A60C63000
|
heap
|
page read and write
|
||
1291000
|
heap
|
page read and write
|
||
21356F90000
|
unkown
|
page readonly
|
||
7FFD34A72000
|
trusted library allocation
|
page read and write
|
||
7FFD34920000
|
trusted library allocation
|
page read and write
|
||
7FFD34946000
|
trusted library allocation
|
page read and write
|
||
7FFD34E20000
|
trusted library allocation
|
page read and write
|
||
7FFD34A36000
|
trusted library allocation
|
page read and write
|
||
4F5C777000
|
stack
|
page read and write
|
||
132E000
|
heap
|
page read and write
|
||
218BE4D4000
|
trusted library allocation
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
22A7A870000
|
unkown
|
page readonly
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
15ABECA4000
|
heap
|
page read and write
|
||
21C74B60000
|
trusted library section
|
page read and write
|
||
7FFD34C80000
|
trusted library allocation
|
page read and write
|
||
23C0F54D000
|
trusted library allocation
|
page read and write
|
||
A794FFF000
|
stack
|
page read and write
|
||
21C0017D000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
1C04C000
|
stack
|
page read and write
|
||
229005FF000
|
trusted library allocation
|
page read and write
|
||
7FFD34B10000
|
trusted library allocation
|
page read and write
|
||
22A797ED000
|
heap
|
page read and write
|
||
7FFD347AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34A27000
|
trusted library allocation
|
page read and write
|
||
22A62100000
|
trusted library allocation
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
4F5E17B000
|
stack
|
page read and write
|
||
7FFD34E42000
|
trusted library allocation
|
page read and write
|
||
7FFD3497F000
|
trusted library allocation
|
page read and write
|
||
1721EDD0000
|
heap
|
page read and write
|
||
7FFD34C60000
|
trusted library allocation
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
E5B04BD000
|
stack
|
page read and write
|
||
21356630000
|
unkown
|
page readonly
|
||
F2B77FD000
|
stack
|
page read and write
|
||
2AC63360000
|
heap
|
page read and write
|
||
7FFD3478D000
|
trusted library allocation
|
page execute and read and write
|
||
F2B76FE000
|
stack
|
page read and write
|
||
7FFD34FD0000
|
trusted library allocation
|
page read and write
|
||
22A79FA0000
|
heap
|
page execute and read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
15AB966E000
|
heap
|
page read and write
|
||
15ABEB9E000
|
trusted library allocation
|
page read and write
|
||
22A60BBE000
|
heap
|
page read and write
|
||
218BE6E6000
|
trusted library allocation
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
7FFD349D2000
|
trusted library allocation
|
page read and write
|
||
7FFD34939000
|
trusted library allocation
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
7FFD3483C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347A2000
|
trusted library allocation
|
page read and write
|
||
7FFD34782000
|
trusted library allocation
|
page read and write
|
||
29B44BDB000
|
heap
|
page read and write
|
||
7FFD349AC000
|
trusted library allocation
|
page read and write
|
||
22A7AC4F000
|
heap
|
page read and write
|
||
23C0F7CB000
|
trusted library allocation
|
page read and write
|
||
2386D36C000
|
heap
|
page read and write
|
||
156F009B000
|
heap
|
page read and write
|
||
2386D583000
|
heap
|
page read and write
|
||
1267000
|
heap
|
page read and write
|
||
15ABECFD000
|
heap
|
page read and write
|
||
21C74BA0000
|
trusted library section
|
page read and write
|
||
23854620000
|
unkown
|
page readonly
|
||
7FFD34C50000
|
trusted library allocation
|
page execute and read and write
|
||
2A126AF0000
|
heap
|
page read and write
|
||
29B44BE1000
|
heap
|
page read and write
|
||
7FFD34977000
|
trusted library allocation
|
page read and write
|
||
21C73020000
|
heap
|
page read and write
|
||
20709815000
|
heap
|
page read and write
|
||
7FFD349EE000
|
trusted library allocation
|
page read and write
|
||
7FFD349DC000
|
trusted library allocation
|
page read and write
|
||
7FFD3492C000
|
trusted library allocation
|
page read and write
|
||
98C13FE000
|
stack
|
page read and write
|
||
7FFD34910000
|
trusted library allocation
|
page read and write
|
||
7FFD3509A000
|
trusted library allocation
|
page read and write
|
||
22A6210B000
|
trusted library allocation
|
page read and write
|
||
7FFD34B00000
|
trusted library allocation
|
page read and write
|
||
2386D5BA000
|
heap
|
page read and write
|
||
22A61EC8000
|
trusted library allocation
|
page read and write
|
||
2CB70A70000
|
heap
|
page read and write
|
||
7FFD34D8C000
|
trusted library allocation
|
page read and write
|
||
29B44BE1000
|
heap
|
page read and write
|
||
2133C220000
|
unkown
|
page readonly
|
||
21356D75000
|
heap
|
page read and write
|
||
21C75760000
|
heap
|
page read and write
|
||
7FFD349E6000
|
trusted library allocation
|
page read and write
|
||
2CB58747000
|
trusted library allocation
|
page read and write
|
||
2291012C000
|
trusted library allocation
|
page read and write
|
||
7FFD34B30000
|
trusted library allocation
|
page read and write
|
||
2386CF46000
|
heap
|
page read and write
|
||
7FFD34794000
|
trusted library allocation
|
page read and write
|
||
7FFD34B00000
|
trusted library allocation
|
page read and write
|
||
2A126700000
|
heap
|
page read and write
|
||
15AB9E00000
|
heap
|
page read and write
|
||
23854840000
|
trusted library allocation
|
page read and write
|
||
7FFD34C00000
|
trusted library allocation
|
page read and write
|
||
156F0544000
|
heap
|
page read and write
|
||
7FFD34C70000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34D50000
|
trusted library allocation
|
page read and write
|
||
7FFD34977000
|
trusted library allocation
|
page read and write
|
||
81F2836000
|
stack
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
2CB70F50000
|
heap
|
page read and write
|
||
23C1F231000
|
trusted library allocation
|
page read and write
|
||
22900060000
|
trusted library allocation
|
page read and write
|
||
5BFC9EE000
|
stack
|
page read and write
|
||
7FFD347FC000
|
trusted library allocation
|
page execute and read and write
|
||
5BFCDEE000
|
stack
|
page read and write
|
||
156F041B000
|
heap
|
page read and write
|
||
7FFD34C10000
|
trusted library allocation
|
page read and write
|
||
22A79E50000
|
heap
|
page read and write
|
||
2133C573000
|
trusted library allocation
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
15AB9F02000
|
heap
|
page read and write
|
||
22A7A68C000
|
unkown
|
page readonly
|
||
98C16FD000
|
stack
|
page read and write
|
||
98C1DF8000
|
stack
|
page read and write
|
||
20710015000
|
trusted library allocation
|
page read and write
|
||
20773970000
|
heap
|
page read and write
|
||
7FFD34C50000
|
trusted library allocation
|
page read and write
|
||
7FFD34C60000
|
trusted library allocation
|
page read and write
|
||
2CB56848000
|
heap
|
page read and write
|
||
21C74FEA000
|
heap
|
page read and write
|
||
20772F70000
|
heap
|
page execute and read and write
|
||
7FFD35352000
|
trusted library allocation
|
page read and write
|
||
22900655000
|
trusted library allocation
|
page read and write
|
||
1C14E000
|
stack
|
page read and write
|
||
2386D3C9000
|
heap
|
page read and write
|
||
7FFD34783000
|
trusted library allocation
|
page execute and read and write
|
||
22A7BA96000
|
heap
|
page read and write
|
||
21C76EB0000
|
heap
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
21C770F0000
|
trusted library section
|
page read and write
|
||
22A714DE000
|
trusted library allocation
|
page read and write
|
||
45281FE000
|
stack
|
page read and write
|
||
17205C4C000
|
heap
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
21FA27C0000
|
heap
|
page read and write
|
||
229100ED000
|
trusted library allocation
|
page read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
2386D469000
|
heap
|
page read and write
|
||
2AC63320000
|
heap
|
page read and write
|
||
21C758E0000
|
heap
|
page read and write
|
||
2134DD99000
|
trusted library allocation
|
page read and write
|
||
7FFD34969000
|
trusted library allocation
|
page read and write
|
||
238647E9000
|
trusted library allocation
|
page read and write
|
||
2CB6844D000
|
trusted library allocation
|
page read and write
|
||
7FFD34BB0000
|
trusted library allocation
|
page read and write
|
||
7FFD34942000
|
trusted library allocation
|
page read and write
|
||
2386D480000
|
heap
|
page read and write
|
||
7FFD34927000
|
trusted library allocation
|
page read and write
|
||
218D6979000
|
heap
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34AF5000
|
trusted library allocation
|
page read and write
|
||
29B44BE1000
|
heap
|
page read and write
|
||
4527FFF000
|
stack
|
page read and write
|
||
7FFD34B70000
|
trusted library allocation
|
page execute and read and write
|
||
2386D40A000
|
heap
|
page read and write
|
||
4528BF7000
|
stack
|
page read and write
|
||
7FFD3494C000
|
trusted library allocation
|
page read and write
|
||
2386D2A6000
|
heap
|
page read and write
|
||
2386CF72000
|
heap
|
page read and write
|
||
5BFCEF8000
|
stack
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
2386D5CA000
|
heap
|
page read and write
|
||
7FFD34A32000
|
trusted library allocation
|
page read and write
|
||
21356560000
|
unkown
|
page readonly
|
||
22A79D30000
|
unkown
|
page readonly
|
||
23C1F245000
|
trusted library allocation
|
page read and write
|
||
21C002E9000
|
trusted library allocation
|
page read and write
|
||
45285FE000
|
stack
|
page read and write
|
||
5BFCBFB000
|
stack
|
page read and write
|
||
23C0EA43000
|
trusted library allocation
|
page read and write
|
||
7FFD34BC7000
|
trusted library allocation
|
page read and write
|
||
23C0F6E7000
|
trusted library allocation
|
page read and write
|
||
7FFD349B2000
|
trusted library allocation
|
page read and write
|
||
22A617EC000
|
trusted library allocation
|
page read and write
|
||
207729D2000
|
heap
|
page read and write
|
||
B823A3D000
|
stack
|
page read and write
|
||
29B44BF1000
|
heap
|
page read and write
|
||
7FFD34B5E000
|
trusted library allocation
|
page read and write
|
||
22A7A560000
|
unkown
|
page readonly
|
||
22A79F50000
|
unkown
|
page readonly
|
||
81F2973000
|
stack
|
page read and write
|
||
218BC7E3000
|
trusted library allocation
|
page read and write
|
||
22A6169F000
|
trusted library allocation
|
page read and write
|
||
7FFD34928000
|
trusted library allocation
|
page read and write
|
||
20770AB0000
|
heap
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
156F041B000
|
heap
|
page read and write
|
||
23C0F231000
|
trusted library allocation
|
page read and write
|
||
22A7A302000
|
unkown
|
page readonly
|
||
7FFD34E09000
|
trusted library allocation
|
page read and write
|
||
7FFD34E0B000
|
trusted library allocation
|
page read and write
|
||
22A7B971000
|
heap
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
7FFD35028000
|
trusted library allocation
|
page read and write
|
||
7FFD34B20000
|
trusted library allocation
|
page read and write
|
||
17206661000
|
trusted library allocation
|
page read and write
|
||
218BC850000
|
heap
|
page read and write
|
||
2CB58907000
|
trusted library allocation
|
page read and write
|
||
213567F4000
|
unkown
|
page readonly
|
||
22A621F3000
|
trusted library allocation
|
page read and write
|
||
21C00001000
|
trusted library allocation
|
page read and write
|
||
218BC5D5000
|
heap
|
page read and write
|
||
7FFD34783000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
22A7AB5B000
|
heap
|
page read and write
|
||
7FFD34F50000
|
trusted library allocation
|
page read and write
|
||
2070000E000
|
trusted library allocation
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
15ABED02000
|
heap
|
page read and write
|
||
2070956A000
|
heap
|
page read and write
|
||
2291001D000
|
trusted library allocation
|
page read and write
|
||
7FFD34C18000
|
trusted library allocation
|
page read and write
|
||
5BFD3FB000
|
stack
|
page read and write
|
||
7FFD3485C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34A8B000
|
trusted library allocation
|
page read and write
|
||
2133C4B0000
|
heap
|
page read and write
|
||
2386D010000
|
unkown
|
page readonly
|
||
2386D427000
|
heap
|
page read and write
|
||
2133C3B0000
|
heap
|
page read and write
|
||
7FFD34C00000
|
trusted library allocation
|
page read and write
|
||
2CB58580000
|
trusted library allocation
|
page read and write
|
||
2070B319000
|
trusted library allocation
|
page read and write
|
||
7FFD34C35000
|
trusted library allocation
|
page read and write
|
||
7FFD34AF0000
|
trusted library allocation
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
C9CCCFE000
|
stack
|
page read and write
|
||
2CB56A10000
|
heap
|
page execute and read and write
|
||
E5B05BE000
|
stack
|
page read and write
|
||
7FFD3499D000
|
trusted library allocation
|
page read and write
|
||
213568B0000
|
unkown
|
page readonly
|
||
2CB567D3000
|
trusted library allocation
|
page read and write
|
||
7FFD347EC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34C50000
|
trusted library allocation
|
page read and write
|
||
15ABEC8C000
|
heap
|
page read and write
|
||
15ABECE8000
|
heap
|
page read and write
|
||
29B44BF1000
|
heap
|
page read and write
|
||
7FFD34936000
|
trusted library allocation
|
page read and write
|
||
22A7AB03000
|
heap
|
page read and write
|
||
22A61E62000
|
trusted library allocation
|
page read and write
|
||
15AB9696000
|
heap
|
page read and write
|
||
23C0EB47000
|
heap
|
page read and write
|
||
98C1BFE000
|
stack
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
21C101D7000
|
trusted library allocation
|
page read and write
|
||
1B20BE90000
|
heap
|
page read and write
|
||
22A612F6000
|
unkown
|
page readonly
|
||
7FFD34AD0000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
22900653000
|
trusted library allocation
|
page read and write
|
||
22A61CF1000
|
trusted library allocation
|
page read and write
|
||
2CB70B4F000
|
heap
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
20772FC0000
|
heap
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
23C0EB90000
|
heap
|
page execute and read and write
|
||
41F257F000
|
stack
|
page read and write
|
||
238544E0000
|
unkown
|
page readonly
|
||
22900659000
|
trusted library allocation
|
page read and write
|
||
4F5D17B000
|
stack
|
page read and write
|
||
15ABEB30000
|
trusted library allocation
|
page read and write
|
||
218BC5C9000
|
heap
|
page read and write
|
||
22A62206000
|
trusted library allocation
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
81F263E000
|
stack
|
page read and write
|
||
20772680000
|
trusted library allocation
|
page read and write
|
||
5BFD2FA000
|
stack
|
page read and write
|
||
22A7A3D8000
|
heap
|
page read and write
|
||
22A61F08000
|
trusted library allocation
|
page read and write
|
||
238540A3000
|
trusted library allocation
|
page read and write
|
||
22A7AD06000
|
heap
|
page read and write
|
||
7FFD34AEA000
|
trusted library allocation
|
page read and write
|
||
23854DB6000
|
trusted library allocation
|
page read and write
|
||
218BE700000
|
trusted library allocation
|
page read and write
|
||
22A617E4000
|
trusted library allocation
|
page read and write
|
||
2133C2B6000
|
heap
|
page read and write
|
||
7FFD34B58000
|
trusted library allocation
|
page read and write
|
||
23854C1A000
|
trusted library allocation
|
page read and write
|
||
2CB5897A000
|
trusted library allocation
|
page read and write
|
||
A3C43FA000
|
stack
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
2386CF54000
|
heap
|
page read and write
|
||
218BE7E6000
|
trusted library allocation
|
page read and write
|
||
22A61F0B000
|
trusted library allocation
|
page read and write
|
||
7FFD347DC000
|
trusted library allocation
|
page execute and read and write
|
||
22A7A408000
|
heap
|
page read and write
|
||
22A62049000
|
trusted library allocation
|
page read and write
|
||
23C0F6EE000
|
trusted library allocation
|
page read and write
|
||
21C7545C000
|
heap
|
page read and write
|
||
22A7BA9A000
|
heap
|
page read and write
|
||
15ABEAB0000
|
trusted library allocation
|
page read and write
|
||
1BC4E000
|
stack
|
page read and write
|
||
22900B3C000
|
trusted library allocation
|
page read and write
|
||
2290092D000
|
trusted library allocation
|
page read and write
|
||
2133E312000
|
trusted library allocation
|
page read and write
|
||
7FFD34783000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34846000
|
trusted library allocation
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
238544FA000
|
unkown
|
page readonly
|
||
156F00B2000
|
heap
|
page read and write
|
||
22A61C57000
|
trusted library allocation
|
page read and write
|
||
7FFD35330000
|
trusted library allocation
|
page read and write
|
||
22A7A2BE000
|
unkown
|
page readonly
|
||
7FFD34A5D000
|
trusted library allocation
|
page read and write
|
||
2CB70AAA000
|
heap
|
page read and write
|
||
22A7A3E3000
|
heap
|
page read and write
|
||
21C72FC0000
|
heap
|
page read and write
|
||
22A60E6E000
|
heap
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
21C005E5000
|
trusted library allocation
|
page read and write
|
||
45287F4000
|
stack
|
page read and write
|
||
7FFD349CA000
|
trusted library allocation
|
page read and write
|
||
20709770000
|
trusted library allocation
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34CAC000
|
trusted library allocation
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
22910001000
|
trusted library allocation
|
page read and write
|
||
22A617C8000
|
trusted library allocation
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page execute and read and write
|
||
A3C48FF000
|
stack
|
page read and write
|
||
2133E09B000
|
trusted library allocation
|
page read and write
|
||
336FFFE000
|
stack
|
page read and write
|
||
22A7A682000
|
unkown
|
page readonly
|
||
207095A6000
|
heap
|
page read and write
|
||
23C0F7FD000
|
trusted library allocation
|
page read and write
|
||
7FFD353C0000
|
trusted library allocation
|
page read and write
|
||
22A7A404000
|
heap
|
page read and write
|
||
7FFD3498E000
|
trusted library allocation
|
page read and write
|
||
2134DDFE000
|
trusted library allocation
|
page read and write
|
||
2386D5B4000
|
heap
|
page read and write
|
||
22A60B00000
|
unkown
|
page readonly
|
||
F2B70FE000
|
stack
|
page read and write
|
||
C9CD53E000
|
stack
|
page read and write
|
||
2CB583BE000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
7FFD34946000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
156EFFB0000
|
heap
|
page read and write
|
||
98C0F7F000
|
stack
|
page read and write
|
||
30BF000
|
stack
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
218CE307000
|
trusted library allocation
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
22900272000
|
trusted library allocation
|
page read and write
|
||
2386D580000
|
heap
|
page read and write
|
||
C2B32FF000
|
stack
|
page read and write
|
||
7FFD34B02000
|
trusted library allocation
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
4F5D47E000
|
unkown
|
page readonly
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
4527EEE000
|
stack
|
page read and write
|
||
21C732E5000
|
heap
|
page read and write
|
||
22A61310000
|
unkown
|
page readonly
|
||
7FFD34836000
|
trusted library allocation
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
7FFD34B00000
|
trusted library allocation
|
page read and write
|
||
22A7ADA4000
|
heap
|
page read and write
|
||
7FFD35090000
|
trusted library allocation
|
page read and write
|
||
22A61348000
|
heap
|
page read and write
|
||
7FFD34C48000
|
trusted library allocation
|
page read and write
|
||
7FFD34A85000
|
trusted library allocation
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
2133DF7F000
|
trusted library allocation
|
page read and write
|
||
2CB703E0000
|
trusted library allocation
|
page read and write
|
||
218BC59F000
|
heap
|
page read and write
|
||
22A714A3000
|
trusted library allocation
|
page read and write
|
||
23C0F7C6000
|
trusted library allocation
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
2CB724A0000
|
heap
|
page read and write
|
||
156F0419000
|
heap
|
page read and write
|
||
7FFD347C4000
|
trusted library allocation
|
page read and write
|
||
218D6290000
|
trusted library allocation
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
15ABA680000
|
trusted library allocation
|
page read and write
|
||
23854622000
|
unkown
|
page readonly
|
||
156F00D8000
|
heap
|
page read and write
|
||
7FFD34B10000
|
trusted library allocation
|
page read and write
|
||
22A61300000
|
unkown
|
page readonly
|
||
29B44BE1000
|
heap
|
page read and write
|
||
7FFD349BC000
|
trusted library allocation
|
page read and write
|
||
7FFD349E6000
|
trusted library allocation
|
page read and write
|
||
2386D0A4000
|
unkown
|
page readonly
|
||
7FFD34ADA000
|
trusted library allocation
|
page read and write
|
||
2A126730000
|
heap
|
page read and write
|
||
C88E8FB000
|
stack
|
page read and write
|
||
7FFD34CA0000
|
trusted library allocation
|
page read and write
|
||
7FFD34920000
|
trusted library allocation
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
7FFD34922000
|
trusted library allocation
|
page read and write
|
||
2A126AF5000
|
heap
|
page read and write
|
||
C9CDD36000
|
stack
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
2386CEB0000
|
heap
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
21FA2480000
|
heap
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34B30000
|
trusted library allocation
|
page read and write
|
||
21C00431000
|
trusted library allocation
|
page read and write
|
||
7FFD34C30000
|
trusted library allocation
|
page read and write
|
||
22A7A300000
|
unkown
|
page readonly
|
||
7FFD34DE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
20710019000
|
trusted library allocation
|
page read and write
|
||
7FFD347CD000
|
trusted library allocation
|
page execute and read and write
|
||
21C101C6000
|
trusted library allocation
|
page read and write
|
||
17206490000
|
trusted library section
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page execute and read and write
|
||
29B44BF1000
|
heap
|
page read and write
|
||
22A7A5E0000
|
unkown
|
page readonly
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
7FFD3500A000
|
trusted library allocation
|
page read and write
|
||
7FFD34A3C000
|
trusted library allocation
|
page read and write
|
||
21FA2578000
|
heap
|
page read and write
|
||
1B20C090000
|
heap
|
page read and write
|
||
7FFD347BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34C4F000
|
trusted library allocation
|
page read and write
|
||
2133DF72000
|
trusted library allocation
|
page read and write
|
||
C9CC3EE000
|
stack
|
page read and write
|
||
2CB725A0000
|
heap
|
page read and write
|
||
21C75900000
|
heap
|
page read and write
|
||
7FFD34B20000
|
trusted library allocation
|
page read and write
|
||
21356A60000
|
heap
|
page execute and read and write
|
||
7FFD347EC000
|
trusted library allocation
|
page execute and read and write
|
||
2CB5897C000
|
trusted library allocation
|
page read and write
|
||
218BE6F4000
|
trusted library allocation
|
page read and write
|
||
5BFCCEE000
|
stack
|
page read and write
|
||
C9CD736000
|
stack
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page execute and read and write
|
||
22A7BA4A000
|
heap
|
page read and write
|
||
B13EBFE000
|
stack
|
page read and write
|
||
22900B3A000
|
trusted library allocation
|
page read and write
|
||
81F3D77000
|
stack
|
page read and write
|
||
22A7A3E9000
|
heap
|
page read and write
|
||
22A617DC000
|
trusted library allocation
|
page read and write
|
||
2070B291000
|
trusted library allocation
|
page read and write
|
||
17205C61000
|
heap
|
page read and write
|
||
29B44BE1000
|
heap
|
page read and write
|
||
7FFD3499E000
|
trusted library allocation
|
page read and write
|
||
21C75793000
|
heap
|
page execute and read and write
|
||
23854730000
|
trusted library allocation
|
page read and write
|
||
7FFD34942000
|
trusted library allocation
|
page read and write
|
||
29B44CC0000
|
heap
|
page read and write
|
||
F2B7AFE000
|
stack
|
page read and write
|
||
15ABEEE0000
|
remote allocation
|
page read and write
|
||
22A61771000
|
trusted library allocation
|
page read and write
|
||
218BE6D5000
|
trusted library allocation
|
page read and write
|
||
22A79E9E000
|
heap
|
page read and write
|
||
7FFD3479D000
|
trusted library allocation
|
page execute and read and write
|
||
5BFBD1F000
|
stack
|
page read and write
|
||
22A61D6F000
|
trusted library allocation
|
page read and write
|
||
7FFD34774000
|
trusted library allocation
|
page read and write
|
||
22A79490000
|
trusted library allocation
|
page read and write
|
||
2CB70B5A000
|
heap
|
page read and write
|
||
23853E37000
|
heap
|
page read and write
|
||
13A0000
|
trusted library allocation
|
page read and write
|
||
7FFD35056000
|
trusted library allocation
|
page read and write
|
||
22A62159000
|
trusted library allocation
|
page read and write
|
||
17205BB0000
|
heap
|
page read and write
|
||
7FFD34A54000
|
trusted library allocation
|
page read and write
|
||
22A79FD2000
|
unkown
|
page readonly
|
||
7FFD347DC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34B80000
|
trusted library allocation
|
page execute and read and write
|
||
2296F7EB000
|
heap
|
page read and write
|
||
22A7A33E000
|
unkown
|
page readonly
|
||
22900B42000
|
trusted library allocation
|
page read and write
|
||
22A62220000
|
trusted library allocation
|
page read and write
|
||
21C101C3000
|
trusted library allocation
|
page read and write
|
||
2133C515000
|
heap
|
page read and write
|
||
22A616A7000
|
trusted library allocation
|
page read and write
|
||
7FFD34C40000
|
trusted library allocation
|
page execute and read and write
|
||
23C1F23D000
|
trusted library allocation
|
page read and write
|
||
20B21B00000
|
heap
|
page read and write
|
||
7FFD34B50000
|
trusted library allocation
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
22A617D0000
|
trusted library allocation
|
page read and write
|
||
7FFD353F0000
|
trusted library allocation
|
page read and write
|
||
21357160000
|
trusted library section
|
page read and write
|
||
218D84D0000
|
heap
|
page read and write
|
||
272F2B90000
|
heap
|
page read and write
|
||
17205BD0000
|
heap
|
page read and write
|
||
7FFD34CB0000
|
trusted library allocation
|
page read and write
|
||
23854520000
|
unkown
|
page readonly
|
||
7FFD35045000
|
trusted library allocation
|
page read and write
|
||
C9CD2F0000
|
stack
|
page read and write
|
||
41F23FE000
|
stack
|
page read and write
|
||
2296F7BE000
|
heap
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
213567F0000
|
unkown
|
page readonly
|
||
218BC7D0000
|
trusted library allocation
|
page read and write
|
||
7FFD3479D000
|
trusted library allocation
|
page execute and read and write
|
||
2CB586FD000
|
trusted library allocation
|
page read and write
|
||
7FFD34836000
|
trusted library allocation
|
page read and write
|
||
21C73240000
|
trusted library allocation
|
page read and write
|
||
2133C31E000
|
heap
|
page read and write
|
||
22A617E8000
|
trusted library allocation
|
page read and write
|
||
2CB683C5000
|
trusted library allocation
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
21FA2670000
|
heap
|
page read and write
|
||
7FFD34C36000
|
trusted library allocation
|
page read and write
|
||
7FFD3492D000
|
trusted library allocation
|
page read and write
|
||
207001C4000
|
trusted library allocation
|
page read and write
|
||
15ABEAC0000
|
trusted library allocation
|
page read and write
|
||
7FFD34B32000
|
trusted library allocation
|
page read and write
|
||
15ABEE80000
|
trusted library allocation
|
page read and write
|
||
22A7AC41000
|
heap
|
page read and write
|
||
23C0F372000
|
trusted library allocation
|
page read and write
|
||
7FFD34C20000
|
trusted library allocation
|
page read and write
|
||
21C75C60000
|
trusted library section
|
page read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
22A61430000
|
trusted library allocation
|
page read and write
|
||
21C772E0000
|
trusted library section
|
page read and write
|
||
21C00581000
|
trusted library allocation
|
page read and write
|
||
7FFD34944000
|
trusted library allocation
|
page read and write
|
||
15AB9F13000
|
heap
|
page read and write
|
||
218D7440000
|
heap
|
page read and write
|
||
7FFD34B67000
|
trusted library allocation
|
page read and write
|
||
2386CF10000
|
heap
|
page read and write
|
||
7FFD34B50000
|
trusted library allocation
|
page read and write
|
||
22A7AC5B000
|
heap
|
page read and write
|
||
7FFD34A6B000
|
trusted library allocation
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
2290074E000
|
trusted library allocation
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page execute and read and write
|
||
4F5CF79000
|
stack
|
page read and write
|
||
22A7AB97000
|
heap
|
page read and write
|
||
22A7B002000
|
unkown
|
page readonly
|
||
7FFD34C40000
|
trusted library allocation
|
page read and write
|
||
C9CCBFF000
|
stack
|
page read and write
|
||
218BE4BB000
|
trusted library allocation
|
page read and write
|
||
7FFD35140000
|
trusted library allocation
|
page execute and read and write
|
||
207094E0000
|
heap
|
page read and write
|
||
23C0E9B0000
|
heap
|
page read and write
|
||
7FFD34856000
|
trusted library allocation
|
page read and write
|
||
21356872000
|
unkown
|
page readonly
|
||
7FFD3497A000
|
trusted library allocation
|
page read and write
|
||
7FFD34A6D000
|
trusted library allocation
|
page read and write
|
||
C9CD0F1000
|
stack
|
page read and write
|
||
7FFD34B20000
|
trusted library allocation
|
page read and write
|
||
7FFD35260000
|
trusted library allocation
|
page read and write
|
||
7FFD34A65000
|
trusted library allocation
|
page read and write
|
||
218BE6DF000
|
trusted library allocation
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
20770E40000
|
heap
|
page read and write
|
||
22A7A54A000
|
heap
|
page read and write
|
||
B1887FE000
|
stack
|
page read and write
|
||
7FFD34A57000
|
trusted library allocation
|
page read and write
|
||
207095AB000
|
heap
|
page read and write
|
||
22A7AE39000
|
heap
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
2386CF07000
|
heap
|
page read and write
|
||
1715000
|
heap
|
page read and write
|
||
2A126900000
|
heap
|
page read and write
|
||
7FFD34954000
|
trusted library allocation
|
page read and write
|
||
2133DD81000
|
trusted library allocation
|
page read and write
|
||
22A7ADBF000
|
heap
|
page read and write
|
||
7FFD34C70000
|
trusted library allocation
|
page read and write
|
||
5BFCFEE000
|
stack
|
page read and write
|
||
7FFD34AE0000
|
trusted library allocation
|
page read and write
|
||
22900A37000
|
trusted library allocation
|
page read and write
|
||
22A61D22000
|
trusted library allocation
|
page read and write
|
||
238542CE000
|
heap
|
page read and write
|
||
29B44BE1000
|
heap
|
page read and write
|
||
23C0EA10000
|
heap
|
page read and write
|
||
20770B4B000
|
heap
|
page read and write
|
||
7FFD34A62000
|
trusted library allocation
|
page read and write
|
||
C2B30FF000
|
stack
|
page read and write
|
||
2B8B7F18000
|
heap
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
17216571000
|
trusted library allocation
|
page read and write
|
||
22A61653000
|
trusted library allocation
|
page read and write
|
||
45284FE000
|
stack
|
page read and write
|
||
2386D299000
|
heap
|
page read and write
|
||
1721EDF3000
|
heap
|
page read and write
|
||
2135675B000
|
heap
|
page read and write
|
||
21356F58000
|
trusted library allocation
|
page read and write
|
||
22A61461000
|
trusted library allocation
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
F2B813D000
|
stack
|
page read and write
|
||
21356562000
|
unkown
|
page readonly
|
||
7FFD34E05000
|
trusted library allocation
|
page read and write
|
||
7FFD34B70000
|
trusted library allocation
|
page read and write
|
||
156F0544000
|
heap
|
page read and write
|
||
81F337D000
|
stack
|
page read and write
|
||
218BE6ED000
|
trusted library allocation
|
page read and write
|
||
7FFD34C20000
|
trusted library allocation
|
page read and write
|
||
22A7BA74000
|
heap
|
page read and write
|
||
D4740FE000
|
stack
|
page read and write
|
||
D473EFC000
|
stack
|
page read and write
|
||
2296F7BC000
|
heap
|
page read and write
|
||
22A7B072000
|
unkown
|
page readonly
|
||
7FFD349C6000
|
trusted library allocation
|
page read and write
|
||
7FFD34793000
|
trusted library allocation
|
page execute and read and write
|
||
21C003D3000
|
trusted library allocation
|
page read and write
|
||
20B21B29000
|
heap
|
page read and write
|
||
670000
|
unkown
|
page readonly
|
||
20709547000
|
heap
|
page read and write
|
||
20770D30000
|
trusted library allocation
|
page read and write
|
||
4F5D87E000
|
unkown
|
page readonly
|
||
22A61CF7000
|
trusted library allocation
|
page read and write
|
||
2CB567C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
17205A10000
|
unkown
|
page readonly
|
||
21356A63000
|
heap
|
page execute and read and write
|
||
22A7ADF0000
|
heap
|
page read and write
|
||
21C755A0000
|
trusted library allocation
|
page read and write
|
||
7FFD34B0C000
|
trusted library allocation
|
page read and write
|
||
7FFD35412000
|
trusted library allocation
|
page read and write
|
||
7FFD34975000
|
trusted library allocation
|
page read and write
|
||
21C7591B000
|
heap
|
page read and write
|
||
7FFD34C74000
|
trusted library allocation
|
page read and write
|
||
7FFD34B50000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34F10000
|
trusted library allocation
|
page read and write
|
||
20700239000
|
trusted library allocation
|
page read and write
|
||
17206080000
|
trusted library allocation
|
page read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
12C8000
|
heap
|
page read and write
|
||
3FCBBFE000
|
stack
|
page read and write
|
||
7FFD34C83000
|
trusted library allocation
|
page read and write
|
||
218BC568000
|
heap
|
page read and write
|
||
7FFD34A44000
|
trusted library allocation
|
page read and write
|
||
A3C40FE000
|
stack
|
page read and write
|
||
2386CF14000
|
heap
|
page read and write
|
||
2291009E000
|
trusted library allocation
|
page read and write
|
||
7FFD34AD0000
|
trusted library allocation
|
page read and write
|
||
2133DE58000
|
trusted library allocation
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
7FFD34F00000
|
trusted library allocation
|
page read and write
|
||
21356D30000
|
heap
|
page read and write
|
||
2CB70B49000
|
heap
|
page read and write
|
||
7FFD34AC6000
|
trusted library allocation
|
page read and write
|
||
4F5E9FE000
|
stack
|
page read and write
|
||
7FFD34C35000
|
trusted library allocation
|
page read and write
|
||
22A7ABB9000
|
heap
|
page read and write
|
||
22A60BE1000
|
heap
|
page read and write
|
||
7FFD35200000
|
trusted library allocation
|
page read and write
|
||
7FFD34F80000
|
trusted library allocation
|
page read and write
|
||
5BFBD6F000
|
stack
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
81F287F000
|
stack
|
page read and write
|
||
21C00102000
|
trusted library allocation
|
page read and write
|
||
81F19D5000
|
stack
|
page read and write
|
||
7FFD34947000
|
trusted library allocation
|
page read and write
|
||
20770D40000
|
heap
|
page read and write
|
||
23C0F798000
|
trusted library allocation
|
page read and write
|
||
7FFD349B2000
|
trusted library allocation
|
page read and write
|
||
22A7ABA5000
|
heap
|
page read and write
|
||
15ABA560000
|
trusted library section
|
page readonly
|
||
22A7A5E2000
|
unkown
|
page readonly
|
||
15AB96BD000
|
heap
|
page read and write
|
||
2077300F000
|
heap
|
page read and write
|
||
F2B74FE000
|
stack
|
page read and write
|
||
213567B2000
|
unkown
|
page readonly
|
||
2386D439000
|
heap
|
page read and write
|
||
213567B0000
|
unkown
|
page readonly
|
||
22A61ACF000
|
trusted library allocation
|
page read and write
|
||
17206130000
|
heap
|
page read and write
|
||
156F00D5000
|
heap
|
page read and write
|
||
207735B0000
|
heap
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page execute and read and write
|
||
336EFFE000
|
stack
|
page read and write
|
||
21C75430000
|
trusted library section
|
page read and write
|
||
7FFD35060000
|
trusted library allocation
|
page read and write
|
||
207096F0000
|
heap
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
22A7A522000
|
heap
|
page read and write
|
||
22A7AE91000
|
heap
|
page read and write
|
||
21C00318000
|
trusted library allocation
|
page read and write
|
||
4F5CA7E000
|
unkown
|
page readonly
|
||
22A7B930000
|
heap
|
page read and write
|
||
10F5000
|
stack
|
page read and write
|
||
2CB70F30000
|
heap
|
page read and write
|
||
21C754D2000
|
heap
|
page read and write
|
||
4F5C97E000
|
stack
|
page read and write
|
||
21C73029000
|
heap
|
page read and write
|
||
23C0F6DE000
|
trusted library allocation
|
page read and write
|
||
20709710000
|
heap
|
page read and write
|
||
7FFD34C60000
|
trusted library allocation
|
page execute and read and write
|
||
22A7AD0B000
|
heap
|
page read and write
|
||
B822EFE000
|
stack
|
page read and write
|
||
45283FE000
|
stack
|
page read and write
|
||
7FFD349C8000
|
trusted library allocation
|
page read and write
|
||
2386D2C1000
|
heap
|
page read and write
|
||
21C75DD6000
|
heap
|
page read and write
|
||
4F5D57E000
|
unkown
|
page readonly
|
||
17205C26000
|
heap
|
page read and write
|
||
2133DFCF000
|
trusted library allocation
|
page read and write
|
||
7FFD34C15000
|
trusted library allocation
|
page read and write
|
||
22A7BB2B000
|
heap
|
page read and write
|
||
22A7A568000
|
unkown
|
page readonly
|
||
81F253E000
|
stack
|
page read and write
|
||
C88E9FF000
|
unkown
|
page read and write
|
||
23864781000
|
trusted library allocation
|
page read and write
|
||
2134DD81000
|
trusted library allocation
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page execute and read and write
|
||
22A617C4000
|
trusted library allocation
|
page read and write
|
||
20709975000
|
heap
|
page read and write
|
||
29B44BF1000
|
heap
|
page read and write
|
||
15ABA540000
|
trusted library section
|
page readonly
|
||
22A79CE0000
|
unkown
|
page readonly
|
||
7FFD34856000
|
trusted library allocation
|
page execute and read and write
|
||
23C0F6EB000
|
trusted library allocation
|
page read and write
|
||
7FFD34CF1000
|
trusted library allocation
|
page read and write
|
||
23854680000
|
unkown
|
page readonly
|
||
23C0EA30000
|
trusted library allocation
|
page read and write
|
||
41F1F7D000
|
stack
|
page read and write
|
||
20B21B33000
|
heap
|
page read and write
|
||
7FFD34B70000
|
trusted library allocation
|
page execute and read and write
|
||
238542C0000
|
heap
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page execute and read and write
|
||
22A60B00000
|
unkown
|
page readonly
|
||
172165C9000
|
trusted library allocation
|
page read and write
|
||
C9CD1FE000
|
stack
|
page read and write
|
||
22A61FFB000
|
trusted library allocation
|
page read and write
|
||
7FFD354C0000
|
trusted library allocation
|
page read and write
|
||
21C0031E000
|
trusted library allocation
|
page read and write
|
||
2386D601000
|
heap
|
page read and write
|
||
1380000
|
trusted library allocation
|
page read and write
|
||
22A79FC0000
|
unkown
|
page readonly
|
||
2135716A000
|
trusted library section
|
page read and write
|
||
1721ECB0000
|
trusted library section
|
page read and write
|
||
20770D53000
|
trusted library allocation
|
page read and write
|
||
1721EDC0000
|
heap
|
page execute and read and write
|
||
218D6950000
|
heap
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page execute and read and write
|
||
22A7ACCC000
|
heap
|
page read and write
|
||
4F5D3FE000
|
stack
|
page read and write
|
||
7FFD34F30000
|
trusted library allocation
|
page read and write
|
||
22A61ECB000
|
trusted library allocation
|
page read and write
|
||
98C17FE000
|
stack
|
page read and write
|
||
7FFD347AB000
|
trusted library allocation
|
page execute and read and write
|
||
15AB9F1A000
|
heap
|
page read and write
|
||
7FFD34AC2000
|
trusted library allocation
|
page read and write
|
||
7FFD34C10000
|
trusted library allocation
|
page read and write
|
||
23C0F308000
|
trusted library allocation
|
page read and write
|
||
7FFD3484C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
156F0040000
|
heap
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
22A7A532000
|
heap
|
page read and write
|
||
22900A23000
|
trusted library allocation
|
page read and write
|
||
D473FFE000
|
stack
|
page read and write
|
||
15ABEC41000
|
heap
|
page read and write
|
||
7FFD34826000
|
trusted library allocation
|
page read and write
|
||
2071001D000
|
trusted library allocation
|
page read and write
|
||
F2B833E000
|
stack
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
2CB585EA000
|
trusted library allocation
|
page read and write
|
||
22910099000
|
trusted library allocation
|
page read and write
|
||
7FFD34A48000
|
trusted library allocation
|
page read and write
|
||
2CB56790000
|
trusted library allocation
|
page read and write
|
||
2A126738000
|
heap
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
7FFD347A2000
|
trusted library allocation
|
page read and write
|
||
7FFD34B50000
|
trusted library allocation
|
page read and write
|
||
7FFD34E4B000
|
trusted library allocation
|
page read and write
|
||
7FFD34A75000
|
trusted library allocation
|
page read and write
|
||
2133E0D3000
|
trusted library allocation
|
page read and write
|
||
7FFD34A29000
|
trusted library allocation
|
page read and write
|
||
21C770C0000
|
heap
|
page execute and read and write
|
||
1BD6E000
|
heap
|
page read and write
|
||
23C0F6F4000
|
trusted library allocation
|
page read and write
|
||
B8232FD000
|
stack
|
page read and write
|
||
1721657D000
|
trusted library allocation
|
page read and write
|
||
238546D0000
|
unkown
|
page readonly
|
||
21C775B2000
|
trusted library allocation
|
page read and write
|
||
F2B7E3E000
|
stack
|
page read and write
|
||
21C7596A000
|
heap
|
page read and write
|
||
5BFCAFB000
|
stack
|
page read and write
|
||
22A79F72000
|
unkown
|
page readonly
|
||
23854848000
|
trusted library allocation
|
page read and write
|
||
218BE50E000
|
trusted library allocation
|
page read and write
|
||
F2B853B000
|
stack
|
page read and write
|
||
81F347F000
|
stack
|
page read and write
|
||
2133C5D0000
|
heap
|
page read and write
|
||
15ABEC00000
|
heap
|
page read and write
|
||
207735D1000
|
heap
|
page read and write
|
||
20710001000
|
trusted library allocation
|
page read and write
|
||
7FFD34C53000
|
trusted library allocation
|
page read and write
|
||
23C0F7CD000
|
trusted library allocation
|
page read and write
|
||
21C73330000
|
heap
|
page read and write
|
||
7FFD34D83000
|
trusted library allocation
|
page read and write
|
||
7FFD35370000
|
trusted library allocation
|
page read and write
|
||
2133C4D0000
|
heap
|
page read and write
|
||
21C00583000
|
trusted library allocation
|
page read and write
|
||
21356552000
|
unkown
|
page readonly
|
||
7FFD3477D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
7FFD347AB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34A62000
|
trusted library allocation
|
page read and write
|
||
272F2A90000
|
heap
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
1710000
|
heap
|
page read and write
|
||
22A7A52D000
|
heap
|
page read and write
|
||
21C75DB0000
|
heap
|
page read and write
|
||
7FFD34B00000
|
trusted library allocation
|
page read and write
|
There are 2498 hidden memdumps, click here to show them.