Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x4a9d9835, page size 16384, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6AE3.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6BDE.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6C1C.tmp.csv
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6D45.tmp.txt
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, 61476 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Adventure_19.bmp
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\HPSUPD-Win32Exe.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Sites.UDP
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\emoji-body-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\iso_639-3.xml
|
XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lgpllibs.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\microphone-disabled-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsd7AB8.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\printer-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\svejtsers.for
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\vm3ddevapi64-debug.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Logs\waasmedic\waasmedic.20220526_155057_892.etl
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\03A7312A-3D2B-4807-84DA-352D7F06B3B6MPTelemetrySubmit\client_manifest.txt
|
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\03A7312A-3D2B-4807-84DA-352D7F06B3B6MPTelemetrySubmit\watson_manifest.txt
|
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\2C39E2B2-9640-4516-B068-8044B49E3F95\MpSigStub.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\2C39E2B2-9640-4516-B068-8044B49E3F95\mpasbase.vdm
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\2C39E2B2-9640-4516-B068-8044B49E3F95\mpasdlta.vdm
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\2C39E2B2-9640-4516-B068-8044B49E3F95\mpavbase.vdm
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\2C39E2B2-9640-4516-B068-8044B49E3F95\mpavdlta.vdm
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
modified
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\2C39E2B2-9640-4516-B068-8044B49E3F95\mpengine.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ConfigSecurityPolicy.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\DefenderCSP.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Drivers\WdBoot.sys
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Drivers\WdDevFlt.sys
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Drivers\WdFilter.sys
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Drivers\WdNisDrv.sys
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Microsoft-Antimalware-AMFilter.man
|
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Microsoft-Antimalware-NIS.man
|
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Microsoft-Antimalware-Protection.man
|
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Microsoft-Antimalware-RTP.man
|
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Microsoft-Antimalware-Service.man
|
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Microsoft-Windows-Windows
Defender.man
|
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpAsDesc.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpAzSubmit.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpClient.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpCmdRun.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpCommu.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpCopyAccelerator.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpDetours.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpDetoursCopyAccelerator.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpDlpCmd.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpEvMsg.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpOAV.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpRtp.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpSenseComm.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpSigStub.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpSvc.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpUpdate.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpUxAgent.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MsMpEng.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MsMpLics.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\NisSrv.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\Defender.psd1
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\DefenderPerformance.psd1
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\MSFT_MpComputerStatus.cdxml
|
XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\MSFT_MpPerformanceRecording.psm1
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\MSFT_MpPerformanceRecording.wprp
|
XML 1.0 document, UTF-8 Unicode (with BOM) text
|
modified
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\MSFT_MpPerformanceReport.Format.ps1xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\MSFT_MpPreference.cdxml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\MSFT_MpRollback.cdxml
|
XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\MSFT_MpScan.cdxml
|
XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\MSFT_MpSignature.cdxml
|
XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\MSFT_MpThreat.cdxml
|
XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\MSFT_MpThreatCatalog.cdxml
|
XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\MSFT_MpThreatDetection.cdxml
|
XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\MSFT_MpWDOScan.cdxml
|
XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ProtectionManagement.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ProtectionManagement.mof
|
C source, Little-endian UTF-16 Unicode text, with very long lines, with CRLF, CR line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ProtectionManagement_uninstall.mof
|
C source, Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ThirdPartyNotices.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\af-ZA\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\am-ET\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ar-SA\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ar-SA\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\as-IN\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\az-Latn-AZ\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\bg-BG\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\bg-BG\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\bn-IN\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\bs-Latn-BA\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ca-ES-valencia\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ca-ES\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ca-ES\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\com.microsoft.defender.be.chrome.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\cs-CZ\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\cs-CZ\MpEvMsg.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\cs-CZ\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\cy-GB\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\da-DK\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\da-DK\MpEvMsg.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\da-DK\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\de-DE\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\de-DE\MpEvMsg.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\de-DE\ProtectionManagement.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\de-DE\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\el-GR\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\el-GR\MpEvMsg.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\el-GR\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\en-GB\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\en-GB\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\en-US\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\en-US\MpEvMsg.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\en-US\ProtectionManagement.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\en-US\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\endpointdlp.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\es-ES\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\es-ES\MpEvMsg.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\es-ES\ProtectionManagement.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\es-ES\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\es-MX\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\es-MX\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\et-EE\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\et-EE\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\eu-ES\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\fa-IR\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\fi-FI\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\fi-FI\MpEvMsg.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\fi-FI\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\fil-PH\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\fr-CA\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\fr-CA\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\fr-FR\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\fr-FR\MpEvMsg.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\fr-FR\ProtectionManagement.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\fr-FR\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ga-IE\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\gd-GB\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\gl-ES\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\gu-IN\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\he-IL\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\he-IL\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\hi-IN\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\hr-HR\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\hr-HR\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\hu-HU\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\hu-HU\MpEvMsg.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\hu-HU\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\id-ID\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\id-ID\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\is-IS\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\it-IT\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\it-IT\MpEvMsg.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\it-IT\ProtectionManagement.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\it-IT\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ja-JP\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ja-JP\MpEvMsg.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ja-JP\ProtectionManagement.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ja-JP\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ka-GE\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\kk-KZ\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\km-KH\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\kn-IN\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ko-KR\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ko-KR\MpEvMsg.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ko-KR\ProtectionManagement.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ko-KR\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\kok-IN\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\lb-LU\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\lo-LA\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\lt-LT\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\lt-LT\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\lv-LV\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\lv-LV\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\mi-NZ\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\mk-MK\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ml-IN\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\mpextms.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\mr-IN\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ms-MY\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\mt-MT\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\nb-NO\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\nb-NO\MpEvMsg.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\nb-NO\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ne-NP\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\nl-NL\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\nl-NL\MpEvMsg.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\nl-NL\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\nn-NO\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\or-IN\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\pa-IN\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\pl-PL\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\pl-PL\MpEvMsg.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\pl-PL\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\pt-BR\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\pt-BR\MpEvMsg.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\pt-BR\ProtectionManagement.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\pt-BR\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\pt-PT\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\pt-PT\MpEvMsg.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\pt-PT\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\quz-PE\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ro-RO\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ro-RO\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ru-RU\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ru-RU\MpEvMsg.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ru-RU\ProtectionManagement.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ru-RU\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\sk-SK\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\sk-SK\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\sl-SI\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\sl-SI\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\sq-AL\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\sr-Cyrl-BA\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\sr-Cyrl-RS\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\sr-Latn-RS\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\sr-Latn-RS\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\sv-SE\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\sv-SE\MpEvMsg.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\sv-SE\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ta-IN\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\te-IN\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\th-TH\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\th-TH\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\tr-TR\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\tr-TR\MpEvMsg.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\tr-TR\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\tt-RU\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ug-CN\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\uk-UA\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\uk-UA\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ur-PK\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\vi-VN\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\vi-VN\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\x86\MpAsDesc.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\x86\MpClient.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\x86\MpCmdRun.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\x86\MpCopyAccelerator.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\x86\MpDetours.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\x86\MpDetoursCopyAccelerator.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\x86\MpOAV.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\x86\MsMpLics.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\x86\en-US\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\x86\endpointdlp.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\zh-CN\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\zh-CN\MpEvMsg.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\zh-CN\ProtectionManagement.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\zh-CN\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\zh-TW\MpAsDesc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\zh-TW\MpEvMsg.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\zh-TW\ProtectionManagement.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\zh-TW\mpuxagent.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\MpSigStub.log
|
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
|
modified
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 244 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe"
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-60574f34.exe
|
C:\Windows\SERVIC~1\NETWOR~1\AppData\Local\Temp\mpam-60574f34.exe
|
||
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2108.7-0\Drivers\WdNisDrv.sys
|
|||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-e428c3f6.exe
|
"C:\Windows\SERVIC~1\NETWOR~1\AppData\Local\Temp\mpam-e428c3f6.exe" /q WD
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\2C39E2B2-9640-4516-B068-8044B49E3F95\MpSigStub.exe
|
C:\Windows\SERVIC~1\NETWOR~1\AppData\Local\Temp\2C39E2B2-9640-4516-B068-8044B49E3F95\MpSigStub.exe /stub 1.1.18500.10 /payload
1.367.502.0 /program C:\Windows\SERVIC~1\NETWOR~1\AppData\Local\Temp\mpam-e428c3f6.exe /q WD
|
||
C:\Windows\System32\wevtutil.exe
|
C:\Windows\system32\wevtutil.exe uninstall-manifest C:\Windows\TEMP\3FCB5F68-CD33-FF2F-34AE-798C9A7026D4.man
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wevtutil.exe
|
C:\Windows\system32\wevtutil.exe install-manifest C:\Windows\TEMP\3FCB5F68-CD33-FF2F-34AE-798C9A7026D4.man "/resourceFilePath:C:\ProgramData\Microsoft\Windows
Defender\Definition Updates\StableEngineEtwLocation\mpengine_etw.dll" "/messageFilePath:C:\ProgramData\Microsoft\Windows Defender\Definition
Updates\StableEngineEtwLocation\mpengine_etw.dll" "/parameterFilePath:C:\ProgramData\Microsoft\Windows Defender\Definition
Updates\StableEngineEtwLocation\mpengine_etw.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\ProgramData\Microsoft\Windows Defender\Scans\MpPayloadData\mpengine.exe
|
C:\ProgramData\Microsoft\Windows Defender\Scans\\MpPayloadData\mpengine.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{EBBB10C2-099A-4A41-A364-F566D3127AB4}\MpKslDrv.sys
|
|||
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpSigStub.exe
|
C:\Windows\SERVIC~1\NETWOR~1\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpSigStub.exe /stub 1.1.18500.10 /payload
4.18.2203.5 /program C:\Windows\SERVIC~1\NETWOR~1\AppData\Local\Temp\mpam-60574f34.exe
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k WerSvcGroup
|
||
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2108.7-0\NisSrv.exe
|
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2108.7-0\NisSrv.exe
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
|
There are 10 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
|
unknown
|
||
http://www.certplus.com/CRL/class3.crl0
|
unknown
|
||
http://www.vmware.com/0
|
unknown
|
||
http://ocsp.suscerte.gob.ve0
|
unknown
|
||
http://crl.dhimyotis.com/certignarootca.crl0
|
unknown
|
||
http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0
|
unknown
|
||
http://www.chambersign.org1
|
unknown
|
||
http://repository.swisssign.com/0
|
unknown
|
||
http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0
|
unknown
|
||
http://crl.ssc.lt/root-c/cacrl.crl0
|
unknown
|
||
http://ca.disig.sk/ca/crl/ca_disig.crl0
|
unknown
|
||
https://github.com/Azure/azure-storage-cpp)
|
unknown
|
||
http://www.suscerte.gob.ve/dpc0
|
unknown
|
||
http://www.disig.sk/ca/crl/ca_disig.crl0
|
unknown
|
||
http://pki.registradores.org/normativa/index.htm0
|
unknown
|
||
http://policy.camerfirma.com0
|
unknown
|
||
http://www.anf.es/es/address-direccion.html
|
unknown
|
||
https://www.anf.es/address/)1(0&
|
unknown
|
||
http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?
|
unknown
|
||
https://owWZDyjXwQrXMrJH.org
|
unknown
|
||
http://cps.letsencrypt.org0
|
unknown
|
||
http://crl.ssc.lt/root-b/cacrl.crl0
|
unknown
|
||
http://microsoft.co
|
unknown
|
||
http://www.certicamara.com/dpc/0Z
|
unknown
|
||
http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G
|
unknown
|
||
http://crl.pki.wellsfargo.com/wsprca.crl0
|
unknown
|
||
https://wwww.certigna.fr/autorites/0m
|
unknown
|
||
http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0
|
unknown
|
||
https://account.live.com/msangcwam
|
unknown
|
||
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
|
unknown
|
||
https://owWZDyjXwQrXMrJH.or
|
unknown
|
||
https://www.anf.es/AC/ANFServerCA.crl0
|
unknown
|
||
http://passport.net/tb
|
unknown
|
||
http://www.globaltrust.info0
|
unknown
|
||
http://www.symauth.com/cps0(
|
unknown
|
||
https://owWZDyjXwQrXMrJH.orgt-
|
unknown
|
||
http://ac.economia.gob.mx/last.crl0G
|
unknown
|
||
https://doc-0g-34-docs.googleusercontent.com/
|
unknown
|
||
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
|
unknown
|
||
http://www.symauth.com/rpa00
|
unknown
|
||
http://crl.oces.trust2408.com/oces.crl0
|
unknown
|
||
https://eca.hinet.net/repository0
|
unknown
|
||
http://certs.oaticerts.com/repository/OATICA2.crl
|
unknown
|
||
http://certs.oati.net/repository/OATICA2.crt0
|
unknown
|
||
http://www.accv.es00
|
unknown
|
||
https://drive.google.com/V%-
|
unknown
|
||
http://mail.asfaltolargo.pt(
|
unknown
|
||
http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
|
unknown
|
||
http://OGHYwH.com
|
unknown
|
||
http://web.ncdc.gov.sa/crl/nrcaparta1.crl
|
unknown
|
||
http://www.datev.de/zertifikat-policy-int0
|
unknown
|
||
https://github.com/open-source-parsers/jsoncpp.git)
|
unknown
|
||
http://www.acabogacia.org0
|
unknown
|
||
http://www.firmaprofesional.com/cps0
|
unknown
|
||
http://crl.securetrust.com/SGCA.crl0
|
unknown
|
||
http://www.agesic.gub.uy/acrn/acrn.crl0)
|
unknown
|
||
http://www.rcsc.lt/repository0
|
unknown
|
||
https://web.certicamara.com/marco-legal0Z
|
unknown
|
||
http://www.quovadisglobal.com/cps0
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://www.correo.com.uy/correocert/cps.pdf0
|
unknown
|
||
http://DynDns.comDynDNSnamejidpasswordPsi/Psi
|
unknown
|
||
http://certs.oaticerts.com/repository/OATICA2.crt08
|
unknown
|
||
https://signup.live.com/signup.aspx
|
unknown
|
||
http://cps.chambersign.org/cps/chambersignroot.html0
|
unknown
|
||
https://unitedstates4.ss.wd.microsoft.us
|
unknown
|
||
https://clients2.google.com/service/check2?crx3=true&appid=%7B430FD4D0-B729-4F61-AA34-91526481799D%7
|
unknown
|
||
https://unitedstates1.ss.wd.microsoft.us
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80601
|
unknown
|
||
http://www.anf.es/AC/RC/ocsp0c
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80600
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80603
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
|
unknown
|
||
http://www.oaticerts.com/repository.
|
unknown
|
||
http://www.ancert.com/cps0
|
unknown
|
||
http://ocsp.accv.es0
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80605
|
unknown
|
||
http://crl.mV
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80604
|
unknown
|
||
http://acraiz.icpbrasil.gov.br/LCRacraizv2.crl0
|
unknown
|
||
http://www.echoworx.com/ca/root2/cps.pdf0
|
unknown
|
||
https://rca.e-szigno.hu/ocsp0-
|
unknown
|
||
http://ca.mtin.es/mtin/crl/MTINAutoridadRaiz03
|
unknown
|
||
http://eca.hinet.net/repository/CRL2/CA.crl0
|
unknown
|
||
http://www.datev.de/zertifikat-policy-std0
|
unknown
|
||
http://acraiz.icpbrasil.gov.br/LCRacraizv1.crl0
|
unknown
|
||
http://mail.asfaltolargo.pt
|
unknown
|
||
https://g.live.com/odclientsettings/Prod/C:
|
unknown
|
||
http://www.informatik.admin.ch/PKI/links/CPS_2_16_756_1_17_3_1_0.pdf0
|
unknown
|
||
http://crl.defence.gov.au/pki0
|
unknown
|
||
http://www.agesic.gub.uy/acrn/cps_acrn.pdf0
|
unknown
|
||
http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl0
|
unknown
|
||
https://www.catcert.net/verarrel05
|
unknown
|
||
http://http.fpki.gov/fcpca/caCertsIssuedByfcpca.p7c0
|
unknown
|
||
http://www.pki.gva.es/cps0%
|
unknown
|
||
http://www.cert.fnmt.es/dpcs/0
|
unknown
|
||
http://www.datev.de/zertifikat-policy-bt0
|
unknown
|
||
http://www.comsign.co.il/cps0
|
unknown
|
||
http://127.0.0.1:HTTP/1.1
|
unknown
|
There are 90 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.217.23.110
|
unknown
|
United States
|
||
94.46.30.74
|
unknown
|
Portugal
|
||
142.251.37.97
|
unknown
|
United States
|
||
192.168.11.1
|
unknown
|
unknown
|
||
127.0.0.1
|
unknown
|
unknown
|
||
209.197.3.8
|
unknown
|
United States
|
||
20.189.173.22
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\centrumpartiers\sindstilstand
|
Tiebold
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\SENGEKANTERNE\stubben
|
Roundabout87
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\dado
|
Foresprgselens98
|
||
HKEY_CURRENT_USER\SOFTWARE\metaled\Filformatets
|
Expand String Value
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{0a002690-3839-4e3a-b3b6-96d8df868d99}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{0a002690-3839-4e3a-b3b6-96d8df868d99}
|
ResourceFileName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{0a002690-3839-4e3a-b3b6-96d8df868d99}
|
MessageFileName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{0a002690-3839-4e3a-b3b6-96d8df868d99}
|
ParameterFileName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{68621c25-df8d-4a6b-aabc-19a22e296a7c}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{68621c25-df8d-4a6b-aabc-19a22e296a7c}
|
ResourceFileName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{68621c25-df8d-4a6b-aabc-19a22e296a7c}
|
MessageFileName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{68621c25-df8d-4a6b-aabc-19a22e296a7c}
|
ParameterFileName
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MpKsl1c70f6d2\Parameters\Wdf
|
WdfMajorVersion
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MpKsl1c70f6d2\Parameters\Wdf
|
WdfMinorVersion
|
||
HKEY_USERSS-1-5-20\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_USERSS-1-5-20\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_USERSS-1-5-20\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_USERSS-1-5-20\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
00184005D4FD7B30
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\Certificates\2C85006A1A028BCC349DF23C474724C055FDE8B6
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\Certificates\B68D8F953E551914324E557E6164D68B9926650C
|
Blob
|
There are 11 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1D881000
|
trusted library allocation
|
page read and write
|
||
2A10000
|
direct allocation
|
page execute and read and write
|
||
F30000
|
remote allocation
|
page execute and read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
26336AD3000
|
heap
|
page read and write
|
||
1602FB20000
|
trusted library allocation
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
1F8CDE4F000
|
heap
|
page read and write
|
||
20753000
|
trusted library allocation
|
page read and write
|
||
1F963000
|
trusted library allocation
|
page read and write
|
||
1F6DDDD4000
|
heap
|
page read and write
|
||
13AF000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F9D0000
|
trusted library allocation
|
page read and write
|
||
1F8CDD40000
|
heap
|
page read and write
|
||
16033E37000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE2E000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1C790000
|
heap
|
page read and write
|
||
16C07991000
|
heap
|
page read and write
|
||
1F6DDE04000
|
heap
|
page read and write
|
||
1602DE13000
|
heap
|
page read and write
|
||
A9F000
|
stack
|
page read and write
|
||
16C07999000
|
heap
|
page read and write
|
||
16C07996000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1F8CDE18000
|
heap
|
page read and write
|
||
1F8CDE44000
|
heap
|
page read and write
|
||
1DE0F544000
|
heap
|
page read and write
|
||
16C0798C000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1D0E1410000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDBA0000
|
heap
|
page read and write
|
||
1D443000
|
trusted library allocation
|
page execute and read and write
|
||
13087E000
|
stack
|
page read and write
|
||
1602DED1000
|
heap
|
page read and write
|
||
1F6DDDA9000
|
heap
|
page read and write
|
||
1F8CDE44000
|
heap
|
page read and write
|
||
1DE0F52D000
|
heap
|
page read and write
|
||
7FF7D3A69000
|
unkown
|
page read and write
|
||
16C07A50000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
1F8CDE46000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
2C168D3B000
|
heap
|
page read and write
|
||
2075B000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
26336480000
|
heap
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
1F9C0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDEA5000
|
heap
|
page read and write
|
||
21170000
|
trusted library allocation
|
page read and write
|
||
1DE0F52D000
|
heap
|
page read and write
|
||
2C1682A0000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
2C168160000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
1F8CEA95000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C07B40000
|
trusted library allocation
|
page read and write
|
||
16C0796D000
|
heap
|
page read and write
|
||
2C168D2F000
|
heap
|
page read and write
|
||
1F8CEA95000
|
heap
|
page read and write
|
||
1F8CDE5E000
|
heap
|
page read and write
|
||
16C079A1000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
2C168D2E000
|
heap
|
page read and write
|
||
1D7FE000
|
trusted library allocation
|
page read and write
|
||
1D472000
|
trusted library allocation
|
page read and write
|
||
1F6DDD9C000
|
heap
|
page read and write
|
||
1D0E121A000
|
heap
|
page read and write
|
||
1F8CDE69000
|
heap
|
page read and write
|
||
1DE0F547000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1DE0F4E0000
|
heap
|
page read and write
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F6DDDC9000
|
heap
|
page read and write
|
||
1F880000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1F909000
|
trusted library allocation
|
page read and write
|
||
1836E702000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FA10000
|
trusted library allocation
|
page read and write
|
||
16C07997000
|
heap
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
1836E4B0000
|
heap
|
page read and write
|
||
1F6DD900000
|
heap
|
page read and write
|
||
1602FC86000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
46D9000
|
trusted library allocation
|
page read and write
|
||
1F89E000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
46A0000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1D806000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
C2849FF000
|
stack
|
page read and write
|
||
274F000
|
stack
|
page read and write
|
||
1FEC3000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
16C0798F000
|
heap
|
page read and write
|
||
16C07999000
|
heap
|
page read and write
|
||
1836E66D000
|
heap
|
page read and write
|
||
1F8CDE4F000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
21040000
|
trusted library allocation
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
16033E27000
|
trusted library allocation
|
page read and write
|
||
431000
|
unkown
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
7FF6F452C000
|
unkown
|
page readonly
|
||
2078C000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1F8CDE18000
|
heap
|
page read and write
|
||
13E2000
|
heap
|
page read and write
|
||
19595300000
|
heap
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1836E5C0000
|
unclassified section
|
page readonly
|
||
20731000
|
trusted library allocation
|
page read and write
|
||
16C0796E000
|
heap
|
page read and write
|
||
13A3000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C07983000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
16033E77000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEB1000
|
trusted library allocation
|
page read and write
|
||
20764000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1D863000
|
heap
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
1FA20000
|
trusted library allocation
|
page read and write
|
||
AD0E56B000
|
stack
|
page read and write
|
||
1FA00000
|
trusted library allocation
|
page read and write
|
||
2633649D000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
26336ADA000
|
heap
|
page read and write
|
||
1FA00000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
1F8CDE1D000
|
heap
|
page read and write
|
||
36EB07E000
|
stack
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
2C168D7C000
|
heap
|
page read and write
|
||
16C07999000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
1F93B000
|
trusted library allocation
|
page read and write
|
||
7FA80000
|
trusted library allocation
|
page execute and read and write
|
||
7FF754151000
|
unkown
|
page readonly
|
||
1F8CDE3F000
|
heap
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
47691FC000
|
stack
|
page read and write
|
||
26336AD7000
|
heap
|
page read and write
|
||
2079C000
|
trusted library allocation
|
page read and write
|
||
1396000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
20CC0000
|
trusted library allocation
|
page read and write
|
||
1FF05000
|
trusted library allocation
|
page read and write
|
||
26336CE1000
|
heap
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
16C07997000
|
heap
|
page read and write
|
||
16C079A1000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1602DE99000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
36EB1FF000
|
stack
|
page read and write
|
||
1F8CEAA8000
|
heap
|
page read and write
|
||
1F8CDEE0000
|
trusted library allocation
|
page read and write
|
||
26336CF9000
|
heap
|
page read and write
|
||
16C0799E000
|
heap
|
page read and write
|
||
1DE0F547000
|
heap
|
page read and write
|
||
1D850000
|
trusted library allocation
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
195951D0000
|
heap
|
page read and write
|
||
1F82E613000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
1F8CDE44000
|
heap
|
page read and write
|
||
26336CB1000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1602FC50000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
2C168D6D000
|
heap
|
page read and write
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C0798F000
|
heap
|
page read and write
|
||
1DE0F51C000
|
heap
|
page read and write
|
||
16C07996000
|
heap
|
page read and write
|
||
26336AD5000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1602DEE0000
|
heap
|
page read and write
|
||
1602DEE2000
|
heap
|
page read and write
|
||
16C07992000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FF01000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
16C0799F000
|
heap
|
page read and write
|
||
1D0E1188000
|
heap
|
page read and write
|
||
16033E02000
|
trusted library allocation
|
page read and write
|
||
7FF6F4470000
|
unkown
|
page readonly
|
||
1C451000
|
heap
|
page read and write
|
||
16C07991000
|
heap
|
page read and write
|
||
1D7EB000
|
trusted library allocation
|
page read and write
|
||
1DE0F52A000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
6F3D6000
|
unkown
|
page readonly
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
20831000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C07980000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
2C1680A0000
|
heap
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
16C07997000
|
heap
|
page read and write
|
||
26336CFC000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
16033EB0000
|
remote allocation
|
page read and write
|
||
1F8CDE44000
|
heap
|
page read and write
|
||
1F957000
|
trusted library allocation
|
page read and write
|
||
1602E713000
|
heap
|
page read and write
|
||
1602FC6E000
|
heap
|
page read and write
|
||
2C168313000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE42000
|
heap
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
1F8CDE3A000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C07986000
|
heap
|
page read and write
|
||
16C07991000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
2C168D76000
|
heap
|
page read and write
|
||
20792000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
20600000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1FD9D000
|
stack
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
16C07991000
|
heap
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
7FF74E710000
|
unkown
|
page readonly
|
||
1C451000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1F8CDE56000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1D9D4000
|
trusted library allocation
|
page read and write
|
||
16C0799F000
|
heap
|
page read and write
|
||
20738000
|
trusted library allocation
|
page read and write
|
||
C75000
|
heap
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
E40000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE99000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1F971000
|
trusted library allocation
|
page read and write
|
||
1D47B000
|
trusted library allocation
|
page execute and read and write
|
||
1F6DDDEE000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
2C168D76000
|
heap
|
page read and write
|
||
26336CED000
|
heap
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
16C07991000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1F97A000
|
trusted library allocation
|
page read and write
|
||
1D830000
|
trusted library allocation
|
page read and write
|
||
1F8CDE43000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1F82E160000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1FA90000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1D0E0F90000
|
heap
|
page read and write
|
||
1602FB30000
|
trusted library allocation
|
page read and write
|
||
1F6DDDA4000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
7FF750F51000
|
unkown
|
page readonly
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
1D850000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1D850000
|
trusted library allocation
|
page execute and read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1602E700000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
20798000
|
trusted library allocation
|
page read and write
|
||
1F971000
|
trusted library allocation
|
page read and write
|
||
F20000
|
remote allocation
|
page read and write
|
||
6BCC07E000
|
stack
|
page read and write
|
||
16C07994000
|
heap
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
20798000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
26336ADE000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
16C07992000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1D5BE000
|
stack
|
page read and write
|
||
2C168D76000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE17000
|
heap
|
page read and write
|
||
130A7C000
|
stack
|
page read and write
|
||
1F8CE4B0000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1602FCAC000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1602DECC000
|
heap
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
4768EF8000
|
stack
|
page read and write
|
||
1F82E340000
|
heap
|
page read and write
|
||
1602F5C0000
|
trusted library allocation
|
page read and write
|
||
1F8CDE3D000
|
heap
|
page read and write
|
||
2C168260000
|
heap
|
page read and write
|
||
1F963000
|
trusted library allocation
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1602DF06000
|
heap
|
page read and write
|
||
518000
|
heap
|
page read and write
|
||
26336AD7000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F6DDD9D000
|
heap
|
page read and write
|
||
20734000
|
trusted library allocation
|
page read and write
|
||
1FAB0000
|
heap
|
page execute and read and write
|
||
131E000
|
stack
|
page read and write
|
||
16C07999000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
16C07992000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1F8CDE44000
|
heap
|
page read and write
|
||
1F8CDE91000
|
heap
|
page read and write
|
||
1FEE5000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16033E30000
|
trusted library allocation
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
7FF7D3A6C000
|
unkown
|
page readonly
|
||
1DE0F513000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
26336C90000
|
heap
|
page read and write
|
||
20798000
|
trusted library allocation
|
page read and write
|
||
1D46A000
|
trusted library allocation
|
page execute and read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
3200000
|
trusted library allocation
|
page read and write
|
||
20811000
|
trusted library allocation
|
page read and write
|
||
16C0798F000
|
heap
|
page read and write
|
||
2C168D7C000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1F8CDEA4000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
1F8CDE4F000
|
heap
|
page read and write
|
||
1308FF000
|
stack
|
page read and write
|
||
16C07992000
|
heap
|
page read and write
|
||
7FF7D3A6C000
|
unkown
|
page readonly
|
||
56B000
|
heap
|
page read and write
|
||
1F82E200000
|
unkown
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEAC000
|
trusted library allocation
|
page read and write
|
||
1F6DDDB0000
|
heap
|
page read and write
|
||
16033E8A000
|
trusted library allocation
|
page read and write
|
||
1836E640000
|
heap
|
page read and write
|
||
7FF700EB1000
|
unkown
|
page execute read
|
||
1C451000
|
heap
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
140B000
|
heap
|
page read and write
|
||
2C168D4B000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
21040000
|
trusted library allocation
|
page read and write
|
||
2C1682A0000
|
heap
|
page read and write
|
||
1DE0F512000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F6DDDD4000
|
heap
|
page read and write
|
||
16C079A1000
|
heap
|
page read and write
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
1D935000
|
trusted library allocation
|
page read and write
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
1D0E1204000
|
heap
|
page read and write
|
||
1836EDC0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEB5000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1602DEFB000
|
heap
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
20600000
|
trusted library allocation
|
page read and write
|
||
7FF6F4470000
|
unkown
|
page readonly
|
||
20A7E000
|
stack
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1F6DDDAA000
|
heap
|
page read and write
|
||
1602DE8F000
|
heap
|
page read and write
|
||
1F8CEA48000
|
heap
|
page read and write
|
||
1F9C0000
|
trusted library allocation
|
page read and write
|
||
1F6DDE16000
|
heap
|
page read and write
|
||
1602FAF0000
|
trusted library allocation
|
page read and write
|
||
13A1000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
26336489000
|
heap
|
page read and write
|
||
16C07992000
|
heap
|
page read and write
|
||
7FF74E751000
|
unkown
|
page readonly
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
47690FC000
|
stack
|
page read and write
|
||
16C07994000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
19595380000
|
heap
|
page read and write
|
||
1DE0F547000
|
heap
|
page read and write
|
||
26336AD2000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
26336CD1000
|
heap
|
page read and write
|
||
16C07997000
|
heap
|
page read and write
|
||
1F93F000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
2C168C02000
|
heap
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
1DE0F525000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16033F10000
|
trusted library allocation
|
page read and write
|
||
1836E67E000
|
heap
|
page read and write
|
||
1D444000
|
trusted library allocation
|
page read and write
|
||
1F8CDE44000
|
heap
|
page read and write
|
||
26336CD5000
|
heap
|
page read and write
|
||
20600000
|
trusted library allocation
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1F980000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
140E000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
13E1000
|
heap
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
1FEB5000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE0C000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
20757000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
20D3E000
|
stack
|
page read and write
|
||
1F9C0000
|
trusted library allocation
|
page read and write
|
||
1F8CDEBE000
|
heap
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
1D9D2000
|
trusted library allocation
|
page read and write
|
||
1F8CE8F0000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
16C0798F000
|
heap
|
page read and write
|
||
55F3B7F000
|
trusted library allocation
|
page read and write
|
||
1DE0F4D0000
|
trusted library allocation
|
page read and write
|
||
26336CFC000
|
heap
|
page read and write
|
||
1F82E713000
|
heap
|
page read and write
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
205F0000
|
trusted library allocation
|
page read and write
|
||
55F3C7F000
|
trusted library allocation
|
page read and write
|
||
1F6DD7FE000
|
heap
|
page read and write
|
||
16C07996000
|
heap
|
page read and write
|
||
16C0799F000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CEA93000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1D0E1270000
|
heap
|
page read and write
|
||
1F6DD5CC000
|
heap
|
page read and write
|
||
2078F000
|
trusted library allocation
|
page read and write
|
||
26336735000
|
heap
|
page read and write
|
||
7FF700EF1000
|
unkown
|
page readonly
|
||
20670000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
210A0000
|
trusted library allocation
|
page read and write
|
||
16C079A1000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1602DF13000
|
heap
|
page read and write
|
||
2C168D70000
|
heap
|
page read and write
|
||
16C07994000
|
heap
|
page read and write
|
||
1F8CDE4C000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1F6DDDFA000
|
heap
|
page read and write
|
||
1F82E702000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1C450000
|
heap
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
1836E62A000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
20789000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C07975000
|
heap
|
page read and write
|
||
2073F000
|
trusted library allocation
|
page read and write
|
||
20700000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
7FF71C581000
|
unkown
|
page execute read
|
||
56B000
|
heap
|
page read and write
|
||
1FA00000
|
trusted library allocation
|
page read and write
|
||
7FF74FB51000
|
unkown
|
page readonly
|
||
1FA00000
|
trusted library allocation
|
page read and write
|
||
1F8CDE32000
|
heap
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
1F82E602000
|
heap
|
page read and write
|
||
9BD118D000
|
stack
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEE5000
|
trusted library allocation
|
page read and write
|
||
16C0798F000
|
heap
|
page read and write
|
||
1F8CDE52000
|
heap
|
page read and write
|
||
16C079A1000
|
heap
|
page read and write
|
||
2C168D29000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
16C0798F000
|
heap
|
page read and write
|
||
1F9E0000
|
trusted library allocation
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
16C0799E000
|
heap
|
page read and write
|
||
1D9C7000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
207B2000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1DE0F720000
|
trusted library allocation
|
page read and write
|
||
1602DE96000
|
heap
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
1F6DDDB3000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1D7E0000
|
trusted library allocation
|
page read and write
|
||
1030000
|
unclassified section
|
page readonly
|
||
1D180000
|
remote allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
139D000
|
heap
|
page read and write
|
||
1F8CDE54000
|
heap
|
page read and write
|
||
1F9F0000
|
trusted library allocation
|
page execute and read and write
|
||
1F8CDE3D000
|
heap
|
page read and write
|
||
1C797000
|
heap
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
1F8CDE3D000
|
heap
|
page read and write
|
||
1F6DDDED000
|
heap
|
page read and write
|
||
1560000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F6DD7FA000
|
heap
|
page read and write
|
||
2075C000
|
trusted library allocation
|
page read and write
|
||
1DE0F533000
|
heap
|
page read and write
|
||
1FA10000
|
trusted library allocation
|
page read and write
|
||
16C07992000
|
heap
|
page read and write
|
||
1E8A9000
|
trusted library allocation
|
page read and write
|
||
26336CB3000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1F8CDE6A000
|
heap
|
page read and write
|
||
16033E1C000
|
trusted library allocation
|
page read and write
|
||
16033E7A000
|
trusted library allocation
|
page read and write
|
||
1F6DDDEE000
|
heap
|
page read and write
|
||
1F8CDE69000
|
heap
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
1F8CDE3B000
|
heap
|
page read and write
|
||
1F6DD5A7000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE2E000
|
heap
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
21160000
|
trusted library allocation
|
page read and write
|
||
1602FBD0000
|
trusted library allocation
|
page read and write
|
||
2C168213000
|
heap
|
page read and write
|
||
7FF71C591000
|
unkown
|
page readonly
|
||
F20000
|
remote allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1F8CDE1F000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
16C079A3000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
20739000
|
trusted library allocation
|
page read and write
|
||
1F82E315000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
1DE0F4F4000
|
heap
|
page read and write
|
||
1F8CDE41000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
16C07994000
|
heap
|
page read and write
|
||
130CFE000
|
stack
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
26336CB3000
|
heap
|
page read and write
|
||
1F8CDE42000
|
heap
|
page read and write
|
||
2C168D74000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
16C07997000
|
heap
|
page read and write
|
||
2C16827A000
|
heap
|
page read and write
|
||
1DE0F52B000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
20799000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1602FBF0000
|
trusted library allocation
|
page read and write
|
||
20731000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
205EE000
|
trusted library allocation
|
page read and write
|
||
7FF700EEE000
|
unkown
|
page write copy
|
||
1C451000
|
heap
|
page read and write
|
||
2C168D02000
|
heap
|
page read and write
|
||
1836E68A000
|
heap
|
page read and write
|
||
1FEF0000
|
trusted library allocation
|
page execute and read and write
|
||
1F6DDDE3000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
1F938000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16033E61000
|
trusted library allocation
|
page read and write
|
||
1D850000
|
trusted library allocation
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1D850000
|
trusted library allocation
|
page read and write
|
||
130AFB000
|
stack
|
page read and write
|
||
1602DF02000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1836E690000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
20680000
|
trusted library allocation
|
page read and write
|
||
1D0E12F0000
|
heap
|
page read and write
|
||
32FC000
|
stack
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1DE0F547000
|
heap
|
page read and write
|
||
1389000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F82E243000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16033E5E000
|
trusted library allocation
|
page read and write
|
||
1D986000
|
trusted library allocation
|
page read and write
|
||
1DE0F52D000
|
heap
|
page read and write
|
||
1D470000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
561000
|
heap
|
page read and write
|
||
2C168D6B000
|
heap
|
page read and write
|
||
26336CB3000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C07984000
|
heap
|
page read and write
|
||
1F97A000
|
trusted library allocation
|
page read and write
|
||
26336ADA000
|
heap
|
page read and write
|
||
1F8CDE6D000
|
heap
|
page read and write
|
||
1F8CDE6E000
|
heap
|
page read and write
|
||
1DE0F547000
|
heap
|
page read and write
|
||
20BBE000
|
stack
|
page read and write
|
||
1FA20000
|
trusted library allocation
|
page read and write
|
||
263366C0000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1D80D000
|
trusted library allocation
|
page read and write
|
||
2086A000
|
trusted library allocation
|
page read and write
|
||
1F8CDE7D000
|
heap
|
page read and write
|
||
1F8CDE7D000
|
heap
|
page read and write
|
||
1836E633000
|
heap
|
page read and write
|
||
1F8CDE3B000
|
heap
|
page read and write
|
||
1F8CDE3D000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FF14000
|
trusted library allocation
|
page read and write
|
||
1602DE93000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
4768C7C000
|
stack
|
page read and write
|
||
E80000
|
trusted library allocation
|
page read and write
|
||
13FD000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
21040000
|
trusted library allocation
|
page read and write
|
||
26336AD4000
|
heap
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
1F8CDE3B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
2C168D5B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1602E716000
|
heap
|
page read and write
|
||
1F8CDEBE000
|
heap
|
page read and write
|
||
7FF700EB1000
|
unkown
|
page execute read
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1D850000
|
trusted library allocation
|
page read and write
|
||
6F3D4000
|
unkown
|
page readonly
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
16C07B40000
|
trusted library allocation
|
page read and write
|
||
1FEB5000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
36EACDA000
|
stack
|
page read and write
|
||
1F8CDE44000
|
heap
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
16C079A1000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
26336CEE000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1DE0F517000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CEA40000
|
heap
|
page read and write
|
||
16C079A1000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1D855000
|
trusted library allocation
|
page read and write
|
||
16C07992000
|
heap
|
page read and write
|
||
1FF22000
|
trusted library allocation
|
page read and write
|
||
1F8CDE5D000
|
heap
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1D180000
|
remote allocation
|
page read and write
|
||
33FD000
|
stack
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1DE0F52C000
|
heap
|
page read and write
|
||
20866000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
7FF6F452C000
|
unkown
|
page readonly
|
||
26336C20000
|
heap
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
7FF71C581000
|
unkown
|
page execute read
|
||
1836E620000
|
heap
|
page read and write
|
||
26336CBE000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1F6DDDCF000
|
heap
|
page read and write
|
||
1F8CE580000
|
remote allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1F8CDE7D000
|
heap
|
page read and write
|
||
1D855000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1309FE000
|
stack
|
page read and write
|
||
1FA00000
|
trusted library allocation
|
page read and write
|
||
1F8CDE19000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
81E000
|
stack
|
page read and write
|
||
21030000
|
trusted library allocation
|
page read and write
|
||
F20000
|
remote allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1DE0F513000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDED0000
|
unclassified section
|
page readonly
|
||
1C451000
|
heap
|
page read and write
|
||
210A0000
|
trusted library allocation
|
page read and write
|
||
1F9C0000
|
trusted library allocation
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
1D801000
|
trusted library allocation
|
page read and write
|
||
1602FC7F000
|
heap
|
page read and write
|
||
1F6DDDFD000
|
heap
|
page read and write
|
||
1D7C0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
9BD15FE000
|
stack
|
page read and write
|
||
312B16D000
|
stack
|
page read and write
|
||
1F6DDDB3000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F6DDDBE000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1F8CDEE0000
|
trusted library allocation
|
page read and write
|
||
20728000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F941000
|
trusted library allocation
|
page read and write
|
||
26336730000
|
heap
|
page read and write
|
||
16C07999000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1F8CDE3D000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
263364A2000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FF15000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1DE0F52F000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE99000
|
heap
|
page read and write
|
||
46B000
|
unkown
|
page readonly
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
2C1682B0000
|
heap
|
page read and write
|
||
1F8CDE43000
|
heap
|
page read and write
|
||
13EA000
|
heap
|
page read and write
|
||
7FF74E74E000
|
unkown
|
page write copy
|
||
16034080000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FA10000
|
trusted library allocation
|
page read and write
|
||
1602DE44000
|
heap
|
page read and write
|
||
26336CD4000
|
heap
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
195951D8000
|
heap
|
page read and write
|
||
2C168241000
|
heap
|
page read and write
|
||
1F6DD7F4000
|
heap
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
1F9C0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1602FA41000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1F6DDE04000
|
heap
|
page read and write
|
||
1D7BE000
|
stack
|
page read and write
|
||
1FEF2000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
2C168D7C000
|
heap
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE41000
|
heap
|
page read and write
|
||
1FA01000
|
trusted library allocation
|
page read and write
|
||
1F9C0000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
2086A000
|
trusted library allocation
|
page read and write
|
||
16C07975000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDEC4000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE46000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
2C168D2D000
|
heap
|
page read and write
|
||
16C07991000
|
heap
|
page read and write
|
||
2C168D7C000
|
heap
|
page read and write
|
||
2083F000
|
trusted library allocation
|
page read and write
|
||
16033F27000
|
trusted library allocation
|
page read and write
|
||
7FF71C590000
|
unkown
|
page write copy
|
||
16C079A1000
|
heap
|
page read and write
|
||
16C07981000
|
heap
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
21020000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
2C168D40000
|
heap
|
page read and write
|
||
1F6DD7FB000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F6DDDE4000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
210A0000
|
trusted library allocation
|
page read and write
|
||
16033E67000
|
trusted library allocation
|
page read and write
|
||
20CBE000
|
stack
|
page read and write
|
||
1D855000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
21030000
|
trusted library allocation
|
page read and write
|
||
1DE0F513000
|
heap
|
page read and write
|
||
16C07992000
|
heap
|
page read and write
|
||
2C168D2B000
|
heap
|
page read and write
|
||
55F3FFE000
|
stack
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
16C079A1000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1602FBC0000
|
trusted library allocation
|
page read and write
|
||
264E000
|
stack
|
page read and write
|
||
210A0000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1602FC00000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
26336CB8000
|
heap
|
page read and write
|
||
2BA1000
|
heap
|
page read and write
|
||
1F8CDE41000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
26336ADA000
|
heap
|
page read and write
|
||
16C07800000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDECA000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F9C0000
|
trusted library allocation
|
page read and write
|
||
21050000
|
trusted library allocation
|
page read and write
|
||
1E881000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FF24000
|
trusted library allocation
|
page read and write
|
||
1602FC79000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
2C168D7C000
|
heap
|
page read and write
|
||
1FA00000
|
trusted library allocation
|
page read and write
|
||
920000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1F8CDE35000
|
heap
|
page read and write
|
||
16C07997000
|
heap
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C0798B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C07BA1000
|
heap
|
page read and write
|
||
16C079A1000
|
heap
|
page read and write
|
||
1F82E0F0000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
476997F000
|
stack
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
549000
|
heap
|
page read and write
|
||
16C0795B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
26336CF2000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
1602DE6B000
|
heap
|
page read and write
|
||
1D850000
|
trusted library allocation
|
page read and write
|
||
56A000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1D0E124F000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE7D000
|
heap
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
1F82E202000
|
unkown
|
page read and write
|
||
1F6DD7F5000
|
heap
|
page read and write
|
||
1FA10000
|
trusted library allocation
|
page read and write
|
||
1F8CDE11000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
20761000
|
trusted library allocation
|
page read and write
|
||
E90000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
2C168D2C000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
20E7E000
|
stack
|
page read and write
|
||
2D40000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1F9C0000
|
trusted library allocation
|
page read and write
|
||
16C0798F000
|
heap
|
page read and write
|
||
20822000
|
trusted library allocation
|
page read and write
|
||
16033ECF000
|
trusted library allocation
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
16C07992000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
20789000
|
trusted library allocation
|
page read and write
|
||
1D7D0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
205DE000
|
stack
|
page read and write
|
||
1F6DDD9F000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1F6DD5A0000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1D0E1179000
|
heap
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1D30A000
|
stack
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
36EAD5F000
|
stack
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEE5000
|
trusted library allocation
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
1F6DD905000
|
heap
|
page read and write
|
||
1FF08000
|
trusted library allocation
|
page read and write
|
||
1FEC6000
|
trusted library allocation
|
page read and write
|
||
1F8C2000
|
trusted library allocation
|
page read and write
|
||
1D9BA000
|
trusted library allocation
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1F8CDE54000
|
heap
|
page read and write
|
||
1D5C8000
|
trusted library allocation
|
page read and write
|
||
16C07999000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
1836E680000
|
heap
|
page read and write
|
||
1DE0F547000
|
heap
|
page read and write
|
||
1D855000
|
trusted library allocation
|
page read and write
|
||
1F8CDE91000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CE580000
|
remote allocation
|
page read and write
|
||
1FEE5000
|
trusted library allocation
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
21040000
|
trusted library allocation
|
page read and write
|
||
16C079A1000
|
heap
|
page read and write
|
||
26336CCF000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE56000
|
heap
|
page read and write
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
16033E00000
|
trusted library allocation
|
page read and write
|
||
1836E685000
|
heap
|
page read and write
|
||
1836E600000
|
heap
|
page read and write
|
||
16034090000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1FEB5000
|
trusted library allocation
|
page read and write
|
||
16C07991000
|
heap
|
page read and write
|
||
16033E43000
|
trusted library allocation
|
page read and write
|
||
1F8CDE44000
|
heap
|
page read and write
|
||
1DE0F52A000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
AD0E8FF000
|
stack
|
page read and write
|
||
16C0798F000
|
heap
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1F8CDDF8000
|
heap
|
page read and write
|
||
1F8CDDF9000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
4DE000
|
stack
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE43000
|
heap
|
page read and write
|
||
1DE0F4EC000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1F8CDE4F000
|
heap
|
page read and write
|
||
1602DE2A000
|
heap
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
1D820000
|
trusted library allocation
|
page read and write
|
||
1FEB5000
|
trusted library allocation
|
page read and write
|
||
207B2000
|
trusted library allocation
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C07986000
|
heap
|
page read and write
|
||
1DE0F52D000
|
heap
|
page read and write
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
20811000
|
trusted library allocation
|
page read and write
|
||
1836E5D0000
|
heap
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
1D430000
|
trusted library allocation
|
page read and write
|
||
7FF7D39B1000
|
unkown
|
page execute read
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
1602E715000
|
heap
|
page read and write
|
||
16033E5B000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
7FF7D3A47000
|
unkown
|
page readonly
|
||
21040000
|
trusted library allocation
|
page read and write
|
||
2C1682A0000
|
heap
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
13E1000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEE5000
|
trusted library allocation
|
page read and write
|
||
1F8CDECA000
|
heap
|
page read and write
|
||
1F9C0000
|
trusted library allocation
|
page read and write
|
||
16C0796C000
|
heap
|
page read and write
|
||
1DE0F7B0000
|
heap
|
page read and write
|
||
207B2000
|
trusted library allocation
|
page read and write
|
||
7FF700EB0000
|
unkown
|
page readonly
|
||
56B000
|
heap
|
page read and write
|
||
1DE0F50B000
|
heap
|
page read and write
|
||
55F35DC000
|
stack
|
page read and write
|
||
16C07980000
|
heap
|
page read and write
|
||
16C07981000
|
heap
|
page read and write
|
||
16033E6A000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1F8CDE37000
|
heap
|
page read and write
|
||
1602DEA0000
|
heap
|
page read and write
|
||
2C168278000
|
heap
|
page read and write
|
||
20757000
|
trusted library allocation
|
page read and write
|
||
20798000
|
trusted library allocation
|
page read and write
|
||
207AC000
|
trusted library allocation
|
page read and write
|
||
21180000
|
trusted library allocation
|
page read and write
|
||
1F8CDE4C000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
205F0000
|
trusted library allocation
|
page execute and read and write
|
||
12DE000
|
stack
|
page read and write
|
||
26336CE4000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
E3E000
|
unkown
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F6DDE15000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8E8000
|
trusted library allocation
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
26336CC8000
|
heap
|
page read and write
|
||
1D460000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1C451000
|
heap
|
page read and write
|
||
26336C9C000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
7FF6F4529000
|
unkown
|
page write copy
|
||
1F9C0000
|
trusted library allocation
|
page read and write
|
||
16C07997000
|
heap
|
page read and write
|
||
1F9C0000
|
trusted library allocation
|
page read and write
|
||
1F8CDE07000
|
heap
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
1F8CDE44000
|
heap
|
page read and write
|
||
AD0E5EE000
|
stack
|
page read and write
|
||
207B2000
|
trusted library allocation
|
page read and write
|
||
1D0E120C000
|
heap
|
page read and write
|
||
2C1682D7000
|
heap
|
page read and write
|
||
16C07983000
|
heap
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
16C079A1000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
20798000
|
trusted library allocation
|
page read and write
|
||
1836E657000
|
heap
|
page read and write
|
||
7FF6F4471000
|
unkown
|
page execute read
|
||
1DE0F4FD000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
1F82E702000
|
heap
|
page read and write
|
||
16033E8D000
|
trusted library allocation
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1DE0F547000
|
heap
|
page read and write
|
||
16C07B30000
|
unclassified section
|
page readonly
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE3D000
|
heap
|
page read and write
|
||
6BCC27A000
|
stack
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
26336CE3000
|
heap
|
page read and write
|
||
1F971000
|
trusted library allocation
|
page read and write
|
||
16C07994000
|
heap
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F82E702000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE44000
|
heap
|
page read and write
|
||
1F8CDCD0000
|
heap
|
page read and write
|
||
55F39FF000
|
stack
|
page read and write
|
||
1836E450000
|
heap
|
page read and write
|
||
1D0E10C0000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
16C0798F000
|
heap
|
page read and write
|
||
2C168D2F000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
20792000
|
trusted library allocation
|
page read and write
|
||
1FEBA000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
16C07994000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
7FF750551000
|
unkown
|
page readonly
|
||
16C0799C000
|
heap
|
page read and write
|
||
16C079A1000
|
heap
|
page read and write
|
||
7FF74E73F000
|
unkown
|
page readonly
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
1FEB5000
|
trusted library allocation
|
page read and write
|
||
16C0798B000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE2E000
|
heap
|
page read and write
|
||
16C07980000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
E97000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C07994000
|
heap
|
page read and write
|
||
1F8CEA81000
|
heap
|
page read and write
|
||
16C07997000
|
heap
|
page read and write
|
||
42C000
|
unkown
|
page read and write
|
||
139D000
|
heap
|
page read and write
|
||
1305F7000
|
stack
|
page read and write
|
||
16C0798F000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
1D850000
|
trusted library allocation
|
page read and write
|
||
1FEF0000
|
trusted library allocation
|
page read and write
|
||
1F92C000
|
trusted library allocation
|
page read and write
|
||
1602FB00000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
36EB0FF000
|
stack
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
195951E0000
|
heap
|
page read and write
|
||
16C07996000
|
heap
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
1F6DD440000
|
heap
|
page read and write
|
||
278E000
|
stack
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C0799F000
|
heap
|
page read and write
|
||
1CE10000
|
trusted library allocation
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1CE5E000
|
stack
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
2079C000
|
trusted library allocation
|
page read and write
|
||
16C07991000
|
heap
|
page read and write
|
||
16C07992000
|
heap
|
page read and write
|
||
1F967000
|
trusted library allocation
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE53000
|
heap
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
16C07989000
|
heap
|
page read and write
|
||
1FA00000
|
trusted library allocation
|
page read and write
|
||
1F95A000
|
trusted library allocation
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
20813000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEB5000
|
trusted library allocation
|
page read and write
|
||
1DE0F4C0000
|
unclassified section
|
page readonly
|
||
1C451000
|
heap
|
page read and write
|
||
7FF6F4507000
|
unkown
|
page readonly
|
||
EA0000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1FEF0000
|
trusted library allocation
|
page read and write
|
||
1602FAF0000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
1602DDC0000
|
unclassified section
|
page readonly
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDEC0000
|
heap
|
page read and write
|
||
7FF7D39B1000
|
unkown
|
page execute read
|
||
7FF700EDF000
|
unkown
|
page readonly
|
||
16C0799C000
|
heap
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
2C168D31000
|
heap
|
page read and write
|
||
1F8CDE4F000
|
heap
|
page read and write
|
||
20819000
|
trusted library allocation
|
page read and write
|
||
16C07994000
|
heap
|
page read and write
|
||
1F8CDE91000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1602FB20000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F82E300000
|
trusted library allocation
|
page read and write
|
||
26336CBE000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
312B47F000
|
stack
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
13F5000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
F30000
|
remote allocation
|
page execute and read and write
|
||
16033E3A000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1DE0F6B0000
|
heap
|
page read and write
|
||
476957B000
|
stack
|
page read and write
|
||
16C07981000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F9C0000
|
trusted library allocation
|
page read and write
|
||
210A0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
2C168D29000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
2D89000
|
trusted library allocation
|
page read and write
|
||
1F8CDE3B000
|
heap
|
page read and write
|
||
26336CC0000
|
heap
|
page read and write
|
||
1F6DDDDE000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
7FF7D3A47000
|
unkown
|
page readonly
|
||
1602DED5000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
2C168150000
|
unclassified section
|
page readonly
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
2C168289000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
2078C000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F6DD710000
|
heap
|
page read and write
|
||
26336AD0000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
3240000
|
trusted library allocation
|
page read and write
|
||
16C07986000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F82E600000
|
heap
|
page read and write
|
||
1DE0F50A000
|
heap
|
page read and write
|
||
7FF753751000
|
unkown
|
page readonly
|
||
1DE0F515000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
20600000
|
trusted library allocation
|
page read and write
|
||
16033F2A000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
6F3D0000
|
unkown
|
page readonly
|
||
1F8CDE7D000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
55F3A7D000
|
stack
|
page read and write
|
||
6BCC17E000
|
stack
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
2C168D2C000
|
heap
|
page read and write
|
||
1F8CDECA000
|
heap
|
page read and write
|
||
1D855000
|
trusted library allocation
|
page read and write
|
||
1D180000
|
remote allocation
|
page read and write
|
||
55F3D7F000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
1FEB5000
|
trusted library allocation
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CE580000
|
remote allocation
|
page read and write
|
||
1F8CEA5A000
|
heap
|
page read and write
|
||
21040000
|
trusted library allocation
|
page read and write
|
||
16C07981000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
16C07997000
|
heap
|
page read and write
|
||
1D477000
|
trusted library allocation
|
page execute and read and write
|
||
7FF700EF1000
|
unkown
|
page readonly
|
||
11D4000
|
heap
|
page read and write
|
||
1F6DDDC0000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
7FF71C58B000
|
unkown
|
page readonly
|
||
1F8CDE44000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1F6DDDCE000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1DE0F547000
|
heap
|
page read and write
|
||
16C0798F000
|
heap
|
page read and write
|
||
1DE0F526000
|
heap
|
page read and write
|
||
1DE0F50F000
|
heap
|
page read and write
|
||
1F82E700000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
7FF6F4507000
|
unkown
|
page readonly
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1DE0F3D0000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
21170000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1C451000
|
heap
|
page read and write
|
||
16C07988000
|
heap
|
page read and write
|
||
16C07982000
|
heap
|
page read and write
|
||
1602DEC5000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C07989000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1F8CE5A0000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1D9BE000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE91000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1602FC43000
|
heap
|
page read and write
|
||
1F82E213000
|
unkown
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F97B000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
16C07992000
|
heap
|
page read and write
|
||
1F8CDE3D000
|
heap
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
6F3D1000
|
unkown
|
page execute read
|
||
20744000
|
trusted library allocation
|
page read and write
|
||
1D450000
|
trusted library allocation
|
page read and write
|
||
1F8CDE41000
|
heap
|
page read and write
|
||
16C0798B000
|
heap
|
page read and write
|
||
26336CB7000
|
heap
|
page read and write
|
||
16C07997000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
7FF7D3A69000
|
unkown
|
page write copy
|
||
20798000
|
trusted library allocation
|
page read and write
|
||
1FA10000
|
trusted library allocation
|
page read and write
|
||
1F9C0000
|
trusted library allocation
|
page read and write
|
||
1602FC9D000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1DE0F521000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
2C168D58000
|
heap
|
page read and write
|
||
16C079A1000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
16033E46000
|
trusted library allocation
|
page read and write
|
||
1602FBE0000
|
trusted library allocation
|
page read and write
|
||
2C168300000
|
heap
|
page read and write
|
||
1F82E713000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1602FBE0000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1F8CDE1D000
|
heap
|
page read and write
|
||
1DE0F440000
|
heap
|
page read and write
|
||
16C07AC0000
|
heap
|
page read and write
|
||
16033E1F000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
C284BFE000
|
stack
|
page read and write
|
||
7FF751951000
|
unkown
|
page readonly
|
||
1C451000
|
heap
|
page read and write
|
||
7FF71C580000
|
unkown
|
page readonly
|
||
210B0000
|
trusted library allocation
|
page execute and read and write
|
||
16C07996000
|
heap
|
page read and write
|
||
1F82E190000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1F6DDDF9000
|
heap
|
page read and write
|
||
1D855000
|
trusted library allocation
|
page read and write
|
||
26336CA5000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1CF5E000
|
stack
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1602DE00000
|
heap
|
page read and write
|
||
39DB67F000
|
stack
|
page read and write
|
||
26336CBA000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1E8E4000
|
trusted library allocation
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C07988000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
26336CC9000
|
heap
|
page read and write
|
||
1F8CDE44000
|
heap
|
page read and write
|
||
2BA1000
|
heap
|
page read and write
|
||
16C079A1000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
263363B0000
|
heap
|
page read and write
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
19595310000
|
heap
|
page read and write
|
||
1602FCA3000
|
heap
|
page read and write
|
||
1836E642000
|
heap
|
page read and write
|
||
1F8CDE7F000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F6DDD99000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1DE0F526000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F967000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
16C079A1000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F910000
|
trusted library allocation
|
page read and write
|
||
C2848FB000
|
stack
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
7FF752D51000
|
unkown
|
page readonly
|
||
39DB31B000
|
stack
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1602FC43000
|
heap
|
page read and write
|
||
210A0000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
4768FFF000
|
stack
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1F9D0000
|
trusted library allocation
|
page read and write
|
||
16C079A1000
|
heap
|
page read and write
|
||
C2847FD000
|
stack
|
page read and write
|
||
1F9C0000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16033E19000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F9C0000
|
trusted library allocation
|
page read and write
|
||
26336CA4000
|
heap
|
page read and write
|
||
1602DC40000
|
heap
|
page read and write
|
||
1F8CDE7D000
|
heap
|
page read and write
|
||
1C67E000
|
unkown
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C07983000
|
heap
|
page read and write
|
||
1602DDD0000
|
heap
|
page read and write
|
||
1FEAA000
|
trusted library allocation
|
page read and write
|
||
16033E64000
|
trusted library allocation
|
page read and write
|
||
1D466000
|
trusted library allocation
|
page execute and read and write
|
||
20837000
|
trusted library allocation
|
page read and write
|
||
1F8CDE33000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
16C0798D000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
26336C97000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
207A4000
|
trusted library allocation
|
page read and write
|
||
1367000
|
heap
|
page read and write
|
||
1F9C0000
|
trusted library allocation
|
page read and write
|
||
16C07994000
|
heap
|
page read and write
|
||
1F8CDE44000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1F8CDE58000
|
heap
|
page read and write
|
||
1F8CDE41000
|
heap
|
page read and write
|
||
7FF700EEE000
|
unkown
|
page read and write
|
||
1F6DD7F2000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1602E702000
|
heap
|
page read and write
|
||
2093E000
|
stack
|
page read and write
|
||
1127000
|
heap
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
16C0799F000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F6DD7F7000
|
heap
|
page read and write
|
||
1D409000
|
stack
|
page read and write
|
||
26336CD7000
|
heap
|
page read and write
|
||
2C1682DA000
|
heap
|
page read and write
|
||
21040000
|
trusted library allocation
|
page read and write
|
||
26336CF9000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CEA93000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FA10000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
26336CA6000
|
heap
|
page read and write
|
||
288F000
|
stack
|
page read and write
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FA10000
|
trusted library allocation
|
page read and write
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
1602DECA000
|
heap
|
page read and write
|
||
1F9D0000
|
trusted library allocation
|
page read and write
|
||
1D992000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1602E5C0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C07997000
|
heap
|
page read and write
|
||
20607000
|
trusted library allocation
|
page read and write
|
||
1D4BE000
|
stack
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1602DEC4000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
132B000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
36EADDF000
|
stack
|
page read and write
|
||
145B000
|
stack
|
page read and write
|
||
C2846FF000
|
stack
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
16C079A1000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
7FF71C580000
|
unkown
|
page readonly
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1DE0F547000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
207B2000
|
trusted library allocation
|
page read and write
|
||
1FA10000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDBA5000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C07982000
|
heap
|
page read and write
|
||
1602DEB8000
|
heap
|
page read and write
|
||
21030000
|
trusted library allocation
|
page read and write
|
||
46B000
|
unkown
|
page readonly
|
||
1F6DDDC8000
|
heap
|
page read and write
|
||
1F8CDE5D000
|
heap
|
page read and write
|
||
1D7FA000
|
trusted library allocation
|
page read and write
|
||
1F8CDE99000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
1F8CDE9F000
|
heap
|
page read and write
|
||
1D660000
|
trusted library allocation
|
page execute and read and write
|
||
1F9C0000
|
trusted library allocation
|
page read and write
|
||
16033EF8000
|
trusted library allocation
|
page read and write
|
||
2C168D0F000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
108B1AF000
|
stack
|
page read and write
|
||
1FF26000
|
trusted library allocation
|
page read and write
|
||
1836E64B000
|
heap
|
page read and write
|
||
1F8CDE42000
|
heap
|
page read and write
|
||
1602DEC9000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
20700000
|
trusted library allocation
|
page read and write
|
||
16C07997000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
16C079A1000
|
heap
|
page read and write
|
||
16C0799F000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
2C168D29000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
C284679000
|
stack
|
page read and write
|
||
553000
|
heap
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
13FF000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1602FC50000
|
heap
|
page read and write
|
||
16033E2A000
|
trusted library allocation
|
page read and write
|
||
1D9D0000
|
trusted library allocation
|
page read and write
|
||
1F6DDDC4000
|
heap
|
page read and write
|
||
1602FE00000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
1F8CDE41000
|
heap
|
page read and write
|
||
1D9D6000
|
trusted library allocation
|
page read and write
|
||
16C07983000
|
heap
|
page read and write
|
||
1F6DDDB1000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1D92F000
|
trusted library allocation
|
page read and write
|
||
1F6DDDD5000
|
heap
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
312B1EE000
|
stack
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
2C168D29000
|
heap
|
page read and write
|
||
1FEF0000
|
trusted library allocation
|
page read and write
|
||
1F82E713000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1F8CDE5E000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1F8CDE43000
|
heap
|
page read and write
|
||
1F8CDE44000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
1F6DD7FE000
|
heap
|
page read and write
|
||
1F8CDE41000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
2C16827F000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
26336CA0000
|
heap
|
page read and write
|
||
1F6DDDB7000
|
heap
|
page read and write
|
||
469000
|
unkown
|
page read and write
|
||
1D0E1201000
|
heap
|
page read and write
|
||
1602E602000
|
heap
|
page read and write
|
||
1F8CDE2E000
|
heap
|
page read and write
|
||
1F8CDE0B000
|
heap
|
page read and write
|
||
26336CB0000
|
heap
|
page read and write
|
||
21050000
|
trusted library allocation
|
page read and write
|
||
1F6DDDC8000
|
heap
|
page read and write
|
||
2C168C00000
|
heap
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
BC1000
|
trusted library allocation
|
page read and write
|
||
13097E000
|
stack
|
page read and write
|
||
47697FF000
|
stack
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1F6DDDD1000
|
heap
|
page read and write
|
||
2C168D74000
|
heap
|
page read and write
|
||
2C168281000
|
heap
|
page read and write
|
||
1F8CDE44000
|
heap
|
page read and write
|
||
2C168D00000
|
heap
|
page read and write
|
||
13AF000
|
heap
|
page read and write
|
||
1F91D000
|
trusted library allocation
|
page read and write
|
||
16C07992000
|
heap
|
page read and write
|
||
16C079A1000
|
heap
|
page read and write
|
||
2C168D2C000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1F8CDE3D000
|
heap
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
1DE0F7B5000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
16033E87000
|
trusted library allocation
|
page read and write
|
||
1FF16000
|
trusted library allocation
|
page read and write
|
||
1D850000
|
trusted library allocation
|
page read and write
|
||
20837000
|
trusted library allocation
|
page read and write
|
||
16C07968000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE99000
|
heap
|
page read and write
|
||
1602FCC3000
|
heap
|
page read and write
|
||
1F8CDE18000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE5D000
|
heap
|
page read and write
|
||
1F9C0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C07997000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8F3000
|
trusted library allocation
|
page read and write
|
||
130B7E000
|
stack
|
page read and write
|
||
21050000
|
trusted library allocation
|
page read and write
|
||
2070B000
|
trusted library allocation
|
page read and write
|
||
1F6DDDB3000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
2075C000
|
trusted library allocation
|
page read and write
|
||
1D475000
|
trusted library allocation
|
page execute and read and write
|
||
1F8CDE46000
|
heap
|
page read and write
|
||
16033EB0000
|
remote allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
108B0AC000
|
stack
|
page read and write
|
||
20792000
|
trusted library allocation
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
1602DEBA000
|
heap
|
page read and write
|
||
1DE0F51E000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE52000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1F8CDE42000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
20792000
|
trusted library allocation
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1FEB5000
|
trusted library allocation
|
page read and write
|
||
1F8CDE54000
|
heap
|
page read and write
|
||
207B0000
|
trusted library allocation
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1602FBC0000
|
trusted library allocation
|
page read and write
|
||
1FEB5000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
16C07999000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
26336CDE000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDEA4000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE54000
|
heap
|
page read and write
|
||
1DE0F51B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1D850000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1602DEEC000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE05000
|
heap
|
page read and write
|
||
55F3EFF000
|
trusted library allocation
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
1F8CDE08000
|
heap
|
page read and write
|
||
1602FC69000
|
heap
|
page read and write
|
||
1F8CDE41000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1FA00000
|
trusted library allocation
|
page read and write
|
||
1DE0F532000
|
heap
|
page read and write
|
||
16C07991000
|
heap
|
page read and write
|
||
E40000
|
trusted library allocation
|
page read and write
|
||
1F8CDE44000
|
heap
|
page read and write
|
||
2C168D2C000
|
heap
|
page read and write
|
||
2070D000
|
trusted library allocation
|
page read and write
|
||
20789000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE43000
|
heap
|
page read and write
|
||
26336CC4000
|
heap
|
page read and write
|
||
1F8CDE44000
|
heap
|
page read and write
|
||
1F6DDD97000
|
heap
|
page read and write
|
||
20E3E000
|
stack
|
page read and write
|
||
16C07997000
|
heap
|
page read and write
|
||
21060000
|
trusted library allocation
|
page read and write
|
||
20738000
|
trusted library allocation
|
page read and write
|
||
21170000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1F8CEB80000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1D860000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
2C168302000
|
heap
|
page read and write
|
||
2C168D58000
|
heap
|
page read and write
|
||
1F8CDE3C000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C07989000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1602FAD0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1602FC54000
|
heap
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
1F82E224000
|
unkown
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
F20000
|
remote allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F971000
|
trusted library allocation
|
page read and write
|
||
1FEE5000
|
trusted library allocation
|
page read and write
|
||
1F6DDDB3000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDEC5000
|
heap
|
page read and write
|
||
1FEB1000
|
trusted library allocation
|
page read and write
|
||
16C07992000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1F980000
|
trusted library allocation
|
page read and write
|
||
1F8CDE38000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
16C07990000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1F8CDE43000
|
heap
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
1F8CEAB2000
|
heap
|
page read and write
|
||
16C0799F000
|
heap
|
page read and write
|
||
7FF6F4471000
|
unkown
|
page execute read
|
||
1602DEC0000
|
heap
|
page read and write
|
||
1F6DDDC8000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1C451000
|
heap
|
page read and write
|
||
20834000
|
trusted library allocation
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1D6BC000
|
stack
|
page read and write
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
7FF752351000
|
unkown
|
page readonly
|
||
7FF71C58B000
|
unkown
|
page readonly
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
1F8CDE3B000
|
heap
|
page read and write
|
||
13FD000
|
heap
|
page read and write
|
||
1FA10000
|
trusted library allocation
|
page read and write
|
||
195950A0000
|
heap
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
1602DF29000
|
heap
|
page read and write
|
||
7FF7D39B0000
|
unkown
|
page readonly
|
||
1836E655000
|
heap
|
page read and write
|
||
1D850000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
2086A000
|
trusted library allocation
|
page read and write
|
||
16C07983000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
7FF74F151000
|
unkown
|
page readonly
|
||
1FEE5000
|
trusted library allocation
|
page read and write
|
||
2C1681B0000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
26336CA9000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
7FF7D39B0000
|
unkown
|
page readonly
|
||
1C451000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDB90000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
207B2000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1F8CDE01000
|
heap
|
page read and write
|
||
1602DF17000
|
heap
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
1F8CDE52000
|
heap
|
page read and write
|
||
1602FA70000
|
trusted library allocation
|
page read and write
|
||
2C168285000
|
heap
|
page read and write
|
||
2C16827B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1F8CDE03000
|
heap
|
page read and write
|
||
20690000
|
trusted library allocation
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
F20000
|
remote allocation
|
page read and write
|
||
1602FC98000
|
heap
|
page read and write
|
||
1D0E11CF000
|
heap
|
page read and write
|
||
20B7D000
|
stack
|
page read and write
|
||
26336C99000
|
heap
|
page read and write
|
||
26336ADB000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C0798D000
|
heap
|
page read and write
|
||
22C0000
|
heap
|
page read and write
|
||
16C07B90000
|
heap
|
page read and write
|
||
16C07997000
|
heap
|
page read and write
|
||
1F82E702000
|
heap
|
page read and write
|
||
1602DE5E000
|
heap
|
page read and write
|
||
1D0E122D000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1F8CEA81000
|
heap
|
page read and write
|
||
1D0E1170000
|
heap
|
page read and write
|
||
1D0E1415000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
26336CEF000
|
heap
|
page read and write
|
||
21030000
|
trusted library allocation
|
page read and write
|
||
1F6DDD90000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEE1000
|
trusted library allocation
|
page read and write
|
||
1F8CDE3B000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1FA90000
|
trusted library allocation
|
page read and write
|
||
1DE0F547000
|
heap
|
page read and write
|
||
16C0799A000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1FA10000
|
trusted library allocation
|
page read and write
|
||
1F6DDDB8000
|
heap
|
page read and write
|
||
1C560000
|
unclassified section
|
page readonly
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDDD0000
|
heap
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CEA5A000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
1D850000
|
trusted library allocation
|
page read and write
|
||
1FA00000
|
trusted library allocation
|
page read and write
|
||
55F3F7F000
|
trusted library allocation
|
page read and write
|
||
20600000
|
trusted library allocation
|
page read and write
|
||
20F7E000
|
stack
|
page read and write
|
||
1F8CDE5D000
|
heap
|
page read and write
|
||
16C07981000
|
heap
|
page read and write
|
||
1F9C0000
|
trusted library allocation
|
page read and write
|
||
55F3E7F000
|
trusted library allocation
|
page read and write
|
||
16C07999000
|
heap
|
page read and write
|
||
2C168200000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1F82E700000
|
heap
|
page read and write
|
||
16C0796D000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1D45D000
|
trusted library allocation
|
page execute and read and write
|
||
1D870000
|
heap
|
page execute and read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C079A1000
|
heap
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1D1BE000
|
stack
|
page read and write
|
||
1F8CDE42000
|
heap
|
page read and write
|
||
21040000
|
trusted library allocation
|
page read and write
|
||
7FF74E711000
|
unkown
|
page execute read
|
||
1DE0F500000
|
heap
|
page read and write
|
||
1F82E700000
|
heap
|
page read and write
|
||
E60000
|
trusted library allocation
|
page read and write
|
||
1D855000
|
trusted library allocation
|
page read and write
|
||
26336CB3000
|
heap
|
page read and write
|
||
1602DEB3000
|
heap
|
page read and write
|
||
1F9C0000
|
trusted library allocation
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
1FEB5000
|
trusted library allocation
|
page read and write
|
||
39DB39E000
|
stack
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
1FA90000
|
trusted library allocation
|
page read and write
|
||
C284AFC000
|
stack
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1FA4C000
|
stack
|
page read and write
|
||
13AF000
|
heap
|
page read and write
|
||
7FF700EDF000
|
unkown
|
page readonly
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
1602DCB0000
|
heap
|
page read and write
|
||
7FF71C590000
|
unkown
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
26336CCF000
|
heap
|
page read and write
|
||
1F6DD7F0000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1F8CDE44000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1602E600000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
1F6DD7F7000
|
heap
|
page read and write
|
||
1D440000
|
trusted library allocation
|
page read and write
|
||
1F8CDE58000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
1D840000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
2072C000
|
trusted library allocation
|
page read and write
|
||
1FEB1000
|
trusted library allocation
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
7FF71C591000
|
unkown
|
page readonly
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE44000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FED1000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F82E22A000
|
heap
|
page read and write
|
||
1F8CDE5D000
|
heap
|
page read and write
|
||
1F8CDE3D000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
1F8CDDE4000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
22C4000
|
heap
|
page read and write
|
||
1F82E302000
|
trusted library allocation
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
BFD000
|
stack
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
16C07997000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
2C168D32000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDDFB000
|
heap
|
page read and write
|
||
1F8CDE5E000
|
heap
|
page read and write
|
||
16033EBB000
|
trusted library allocation
|
page read and write
|
||
13AF000
|
heap
|
page read and write
|
||
1D994000
|
trusted library allocation
|
page read and write
|
||
6BCBAEB000
|
stack
|
page read and write
|
||
20600000
|
trusted library allocation
|
page read and write
|
||
26336D15000
|
heap
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
16C07994000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE44000
|
heap
|
page read and write
|
||
21030000
|
trusted library allocation
|
page read and write
|
||
1F6DDDD7000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
26336C9D000
|
heap
|
page read and write
|
||
26336ADE000
|
heap
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F6DDDBA000
|
heap
|
page read and write
|
||
1F8CE5AB000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1FA20000
|
trusted library allocation
|
page read and write
|
||
1FEA1000
|
trusted library allocation
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1F6DDDBB000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1602FAE0000
|
trusted library allocation
|
page read and write
|
||
1DE0F527000
|
heap
|
page read and write
|
||
2C168D74000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
7DF000
|
stack
|
page read and write
|
||
1D7F2000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
26336CA5000
|
heap
|
page read and write
|
||
207A0000
|
trusted library allocation
|
page read and write
|
||
16C07991000
|
heap
|
page read and write
|
||
1F6DDDA8000
|
heap
|
page read and write
|
||
13A3000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CEAA7000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F6DDDA0000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C07988000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
20A3D000
|
stack
|
page read and write
|
||
1FEB5000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1D44D000
|
trusted library allocation
|
page execute and read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FA10000
|
trusted library allocation
|
page read and write
|
||
47692FB000
|
stack
|
page read and write
|
||
2072C000
|
trusted library allocation
|
page read and write
|
||
16C07997000
|
heap
|
page read and write
|
||
16C07969000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C07991000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
2085F000
|
trusted library allocation
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F6DDDF2000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
2C168D29000
|
heap
|
page read and write
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
1602FB34000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
16033EB0000
|
remote allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
2083C000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
1FA00000
|
trusted library allocation
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
2C16822A000
|
heap
|
page read and write
|
||
36EB17F000
|
stack
|
page read and write
|
||
16C07999000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
26336CBB000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1D670000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1D7EE000
|
trusted library allocation
|
page read and write
|
||
1F6DDDE1000
|
heap
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C0798F000
|
heap
|
page read and write
|
||
1FA10000
|
trusted library allocation
|
page read and write
|
||
1D2BE000
|
stack
|
page read and write
|
||
16C079A1000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
16C07992000
|
heap
|
page read and write
|
||
26336CD4000
|
heap
|
page read and write
|
||
20600000
|
trusted library allocation
|
page read and write
|
||
16C07989000
|
heap
|
page read and write
|
||
2C168D37000
|
heap
|
page read and write
|
||
16C07950000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1836E63C000
|
heap
|
page read and write
|
||
16C079A1000
|
heap
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
16C0797E000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
16C0798F000
|
heap
|
page read and write
|
||
1F8CDE3D000
|
heap
|
page read and write
|
||
16C07986000
|
heap
|
page read and write
|
||
1FEB5000
|
trusted library allocation
|
page read and write
|
||
E7E000
|
stack
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
1F8CDE3D000
|
heap
|
page read and write
|
||
1D0000
|
unclassified section
|
page readonly
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F6DDDA5000
|
heap
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
2C16828A000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1836EE02000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE1D000
|
heap
|
page read and write
|
||
16C07981000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
2C168D70000
|
heap
|
page read and write
|
||
1602FC8F000
|
heap
|
page read and write
|
||
26336CC8000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE52000
|
heap
|
page read and write
|
||
1FA00000
|
trusted library allocation
|
page read and write
|
||
2078C000
|
trusted library allocation
|
page read and write
|
||
54D000
|
heap
|
page read and write
|
||
263364B3000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
2C168C15000
|
heap
|
page read and write
|
||
16C079A1000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
29D0000
|
trusted library allocation
|
page read and write
|
||
1FA00000
|
trusted library allocation
|
page read and write
|
||
1F6DDDB3000
|
heap
|
page read and write
|
||
2C168D31000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
20824000
|
trusted library allocation
|
page read and write
|
||
16C07981000
|
heap
|
page read and write
|
||
2C168110000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
16C07997000
|
heap
|
page read and write
|
||
16C07994000
|
heap
|
page read and write
|
||
1F8CDE44000
|
heap
|
page read and write
|
||
1602DEAA000
|
heap
|
page read and write
|
||
1F8CDDEF000
|
heap
|
page read and write
|
||
1F951000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
16C07983000
|
heap
|
page read and write
|
||
1F6DDDCE000
|
heap
|
page read and write
|
||
1DE0F547000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1DE0F547000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE44000
|
heap
|
page read and write
|
||
1D0E11F0000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1F6DD6A0000
|
heap
|
page read and write
|
||
1602FA60000
|
trusted library allocation
|
page read and write
|
||
16C0798F000
|
heap
|
page read and write
|
||
16C07997000
|
heap
|
page read and write
|
||
16C0798F000
|
heap
|
page read and write
|
||
21170000
|
trusted library allocation
|
page read and write
|
||
1F8CDE42000
|
heap
|
page read and write
|
||
21220000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
16C07992000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
130C7E000
|
stack
|
page read and write
|
||
210A0000
|
trusted library allocation
|
page read and write
|
||
2C168D2F000
|
heap
|
page read and write
|
||
16C079A3000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1602E615000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1836E64D000
|
heap
|
page read and write
|
||
2C168D13000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F8CDE2F000
|
heap
|
page read and write
|
||
2078F000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1F8CDE41000
|
heap
|
page read and write
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
16C07997000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
26336CCD000
|
heap
|
page read and write
|
||
1D462000
|
trusted library allocation
|
page read and write
|
||
AD0E87E000
|
stack
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
39DB6FE000
|
stack
|
page read and write
|
||
1FA20000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F6DD7FA000
|
heap
|
page read and write
|
||
16C07982000
|
heap
|
page read and write
|
||
1CF70000
|
heap
|
page read and write
|
||
1F967000
|
trusted library allocation
|
page read and write
|
||
1F6DD7F3000
|
heap
|
page read and write
|
||
1D850000
|
trusted library allocation
|
page read and write
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1DE0F51E000
|
heap
|
page read and write
|
||
16033E20000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1D9AD000
|
trusted library allocation
|
page read and write
|
||
16C079A1000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
1F8CDE2E000
|
heap
|
page read and write
|
||
20792000
|
trusted library allocation
|
page read and write
|
||
1FEE0000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1836E613000
|
heap
|
page read and write
|
||
1602DEFD000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
26336CA8000
|
heap
|
page read and write
|
||
1F8CDE54000
|
heap
|
page read and write
|
||
16C07997000
|
heap
|
page read and write
|
||
1FAA0000
|
trusted library allocation
|
page execute and read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
2C168D2C000
|
heap
|
page read and write
|
||
1FEB5000
|
trusted library allocation
|
page read and write
|
||
1F8CDE91000
|
heap
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
206E0000
|
trusted library section
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
21030000
|
trusted library allocation
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
1DE0F52B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1836E651000
|
heap
|
page read and write
|
||
205E0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
26336D16000
|
heap
|
page read and write
|
||
7FF700EB0000
|
unkown
|
page readonly
|
||
16C07997000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
21180000
|
trusted library allocation
|
page read and write
|
||
20610000
|
trusted library allocation
|
page execute and read and write
|
||
7FF6F4529000
|
unkown
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
26336CC8000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
16C079B1000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
91E000
|
stack
|
page read and write
|
||
20798000
|
trusted library allocation
|
page read and write
|
||
16033E4E000
|
trusted library allocation
|
page read and write
|
||
1F6DD800000
|
heap
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
1D855000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
21030000
|
trusted library allocation
|
page read and write
|
||
1FEB0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1F6DD7FA000
|
heap
|
page read and write
|
||
1F82E23B000
|
heap
|
page read and write
|
||
26336650000
|
heap
|
page read and write
|
||
16C07994000
|
heap
|
page read and write
|
||
C2841CB000
|
stack
|
page read and write
|
||
13A3000
|
heap
|
page read and write
|
||
1FF02000
|
trusted library allocation
|
page read and write
|
||
2C168D2F000
|
heap
|
page read and write
|
||
20600000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
16C0799C000
|
heap
|
page read and write
|
||
16C0799B000
|
heap
|
page read and write
|
||
1F8CDE44000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
26336D04000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
26336C9F000
|
heap
|
page read and write
|
||
26336CAA000
|
heap
|
page read and write
|
||
1F8CDE44000
|
heap
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1602FB00000
|
trusted library allocation
|
page read and write
|
||
20764000
|
trusted library allocation
|
page read and write
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
2C168D56000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
2B11000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
155E000
|
stack
|
page read and write
|
||
9BD197B000
|
stack
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1602DE6F000
|
heap
|
page read and write
|
||
1F8CDE99000
|
heap
|
page read and write
|
||
16C07996000
|
heap
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
26336CEE000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1FA00000
|
trusted library allocation
|
page read and write
|
||
1F82E713000
|
heap
|
page read and write
|
||
13A3000
|
heap
|
page read and write
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
1F967000
|
trusted library allocation
|
page read and write
|
||
1FEA0000
|
trusted library allocation
|
page read and write
|
||
1F9C0000
|
trusted library allocation
|
page read and write
|
||
E40000
|
trusted library allocation
|
page read and write
|
There are 2480 hidden memdumps, click here to show them.