IOC Report
2cFFfHDG7D.msi

loading gif

Files

File Path
Type
Category
Malicious
2cFFfHDG7D.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
initial sample
malicious
C:\Config.Msi\56f4af.rbs
data
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\BouncyCastle.Crypto.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\System.ValueTuple.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI27EA.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
modified
malicious
C:\Windows\Installer\MSI27EA.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI27EA.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSID78.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSID78.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSID78.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIF644.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSIF644.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIF644.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIF924.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSIF924.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIF924.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIF9C.tmp
data
dropped
malicious
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\System32\InstallUtil.InstallLog
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Windows\Temp\~DF1D087F7A3E9CA16A.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF6A8465F9B84E5905.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF6E3B0B399A62DDDC.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF976A0F2522BB20B3.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DFB4214A4473B515E6.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DFEB3FF44FCF811A1A.TMP
data
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallState
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation.zip
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.ini
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AteraAgent.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
CSV text
dropped
C:\Windows\Installer\56f4ae.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\56f4b0.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\MSI1116.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI27EA.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI27EA.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI27EA.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSID78.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSID78.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSID78.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIF644.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSIF644.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIF644.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIF924.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSIF924.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIF924.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIF9D.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIFFB.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\SourceHash{E732A0D7-A2F2-4657-AC41-B19742648E45}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1A374813EDB1A6631387E414D3E73232
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\329B6147266C1E26CD774EA22B79EC2E
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BA74182F76F15A9CF514DEF352303C95
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
Certificate, Version=3
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
Certificate, Version=3
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1A374813EDB1A6631387E414D3E73232
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\329B6147266C1E26CD774EA22B79EC2E
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
data
modified
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BA74182F76F15A9CF514DEF352303C95
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageAgentInformation.exe.log
CSV text
dropped
C:\Windows\Temp\~DF14163CA0B260B1E9.TMP
data
dropped
C:\Windows\Temp\~DF24E6A300EFCABCAA.TMP
data
dropped
C:\Windows\Temp\~DFA1DF50E87199E3FA.TMP
data
dropped
C:\Windows\Temp\~DFA7DEFBF093EFC4B6.TMP
data
dropped
C:\Windows\Temp\~DFC1A00F68BCA0E010.TMP
data
dropped
C:\Windows\Temp\~DFF5DEE46F6D57FE24.TMP
data
dropped
\Device\ConDrv
JSON data
dropped
There are 75 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSIF644.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5699250 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSIF924.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5699937 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSID78.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5705093 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="omar.zetawi@polaris-tek.com" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000HarDhIAJ" /AgentId="7d7ca517-f825-4372-8327-c232f61880c4"
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
malicious
C:\Windows\System32\sc.exe
"C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI27EA.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5711890 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 7d7ca517-f825-4372-8327-c232f61880c4 "3205572e-b701-411c-935a-8eefcd863daa" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000HarDhIAJ
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 7d7ca517-f825-4372-8327-c232f61880c4 "e84a63c2-b176-4565-84a8-bf664a770baa" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000HarDhIAJ
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 7d7ca517-f825-4372-8327-c232f61880c4 "64e30cd7-7773-4e23-a998-f6edaea887a9" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000HarDhIAJ
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 7d7ca517-f825-4372-8327-c232f61880c4 "0a143a2b-b19b-4fce-bc04-41b81bcbcc4b" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000HarDhIAJ
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 7d7ca517-f825-4372-8327-c232f61880c4 "0a143a2b-b19b-4fce-bc04-41b81bcbcc4b" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000HarDhIAJ
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 7d7ca517-f825-4372-8327-c232f61880c4 "f7c52d87-a697-402f-9ddb-f4bd7930a959" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000HarDhIAJ
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 7d7ca517-f825-4372-8327-c232f61880c4 "34fed5af-6ccf-418e-89e6-f319c0139431" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000HarDhIAJ
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 7d7ca517-f825-4372-8327-c232f61880c4 "16f383b9-4be1-4380-b33c-f4b37a96755f" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000HarDhIAJ
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\2cFFfHDG7D.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 0F692C21F340271B8770E1FC6E93F18E
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 185C737B37B128F567DAE967E866CAE9 E Global\MSI0000
C:\Windows\SysWOW64\net.exe
"NET" STOP AteraAgent
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 STOP AteraAgent
C:\Windows\SysWOW64\taskkill.exe
"TaskKill.exe" /f /im AteraAgent.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 23 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://microsoft.co$
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517-f825-4372-8327-c232f61880c4/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=04b28964-6ef0-4a42-97e9-de0d1f8969f6&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.227
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517-f825-4372-8327-c232f61880c4/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=7232c231-fbd8-40c5-9fd4-a6b3ac2c95bc&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.227
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=6108e17e-e70c-47ee-93a9-dff9a3c5dc87&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.229
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/7d7ca517-f825-4372-8327-c232f61880c4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=644afada-5df7-4de5-b444-b1d3402ba380&tr=43&tt=17200237221481014&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.229
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=580032ce-f9f4-4e21-acd4-6e1ccc580200
unknown
http://schemas.datacontract.org
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/7d7ca517-f825-4372-8327-c232f61880c4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=8c864d9a-ab98-41ba-aa3b-cc8bfbb46040&tt=0&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.229
https://agent-api.atera.com/Production/Agent/GetCommands)
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/7d7ca517-f825-4372-8327-c232f61880c4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=3223849c-8c48-4b98-a40e-e3dd7f3726a2&tr=43&tt=17200236621884071&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.229
http://ocsp.digicert.c
unknown
https://agent-api.atera.com/Production/Agent/track-event
unknown
http://dl.google.com/googletalk/googletalk-setup.exe
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/7d7ca517-f825-4372-8327-c232f61880c4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=59ddd6fa-ec59-4c28-92e6-b21af451dd77&tt=0&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.227
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=ceac7b8a-d06f-46f6-b40d-723d7f8ecc6e&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.229
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.1/AgentPackageAg
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=4268a400-66a4-4a60-8ada-3d40a293c400&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.229
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/7d7ca517-f825-4372-8327-c232f61880c4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=357c8023-d06f-43c6-af75-ff9276fa6312&tr=43&tt=17200236682775915&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.229
https://ps.atera.com/agentpackageswin/AgentPackageAgentI
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=31d30483-1276-494b-8626-3e162b57285f
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=6e72782c-04f9-4b3f-b04c-e2bcfd8dec88
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=e3c1bb87-134a-4b79-9350-4fcf40025dd1
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=01817154-5258-48a3-85c0-e83f589a219b&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.229
https://agent-api.atera.com/Production/Agent/
unknown
http://schemas.datacontract.org/2004/07/System.ServiceProcess
unknown
https://agent-api.atera.com/Production/Agent/GetCommandsFallback)
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=272b312b-8cbb-4ed4-bd82-1f2dd3cf8d11&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.229
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517-f825-4372-8327-c232f61880c4/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=9d6606e1-8f57-49c5-9ab0-2ca887e76ed8&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.227
http://wixtoolset.org
unknown
https://agent-api.atera.com/Production
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageProgramManagement/22.9/AgentPackageProgramManage
unknown
https://ps.atera.com/agentpackagesnet45/Agent.Package.Watchdog/1.5/Agent.Package.Watchdog.zip
unknown
https://agent-api.atera.com/Production/Agent/track-event;
unknown
https://ps.atera.com/agentpackageswin/AgentPackageRuntimeInstaller/13.0/AgentPackageRuntimeInstaller
unknown
http://acontrol.atera.com/
unknown
https://ps.atera.com/agentpackagesmac/Agent
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517-f825-4372-8327-c232f61880c4/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=dbb4b35f-5f78-4ab4-bdd1-d6b922caff40&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.227
https://agent-api.atera.com/Production/Agent/AgentStarting)
unknown
https://ps.pndsn.com
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517-f825-4372-8327-c232f61880c4/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=c089a5f6-aacc-464d-ba59-69fd86253ba9&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.227
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517-f825-4372-8327-c232f61880c4/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=139b731a-b591-4698-bfee-48cc028559cd&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.227
https://ps.atera.com/agentpackagesnet45/AgentPackageADRemote/6.0/AgentPackageADRemote.zip
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageNetworkDiscovery/23.9/AgentPackageNetworkDiscove
unknown
http://agent-api.atera.com
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=49462288-5478-4372-9693-b47681abf7af&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.227
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=e6094e12-9fa8-4d26-aa06-4e8fb7a4009c&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.227
http://schemas.datacontract.org/2004/07/
unknown
https://github.com/icsharpcode/SharpZipLib
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=01dd44b0-5151-4864-a34b-b47d9fe01029
unknown
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
unknown
https://agent-api.atera.com/Production/Agent/Acknowl
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageTaskScheduler/17.2/AgentPackageTaskScheduler.zip
unknown
https://agent-api.atera.com
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=0f6a6f9e-92dd-416b-bb7d-5bf345e8ea10&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.227
https://agent-api.atera.com/Production/Agent/AgentStarting
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517-f825-4372-8327-c232f61880c4/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=712442ef-230d-4277-b641-1839d4d8d808&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.227
http://www.w3.oh
unknown
http://schemas.datacontract.org/2004/07/System.ServiceProcess0
unknown
https://agent-api.atera.com/Production/Agent/GetCommands
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=ad2ddba0-edbb-429e-9340-5807bd34a581&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.227
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517-f825-4372-8327-c232f61880c4/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=9adb2664-b18c-43f3-856f-5709e73f6369&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.227
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517-f825-4372-8327-c232f61880c4/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=02fdafa7-0cbf-4d21-9e7c-2644b1b8a69d&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.229
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=ccd8b767-ce84-425a-a6fc-e1d295ece179&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.227
https://agent-api.atera.com/
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=6108e17e-e70c-47ee-93a9-dff9a3c5dc87
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=22cf76d8-ac1d-4e8c-a645-ddf02c4a5363&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.229
https://agent-api.atera.com/Production/Agent/GetRecurringPackages
unknown
https://ps.atera.com/agentpackageswin/Agent.Package.Availability/13.0/Agent.Package.Availability.zip
unknown
https://www.newtonsoft.com/jsonschema
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageAgentInformation/36.7/AgentPackageAgentInformati
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=272b312b-8cbb-4ed4-bd82-1f2dd3cf8d11
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageRuntimeInstaller/1.5/AgentPackageRuntimeInstaller.
unknown
https://ps.atera.com/agentpackageswin/Agent.Package.Watchdog/13.0/Agent.Package.Watchdog.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=6d71671f-ff3a-4b21-bbc6-dec364cbbb66&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.227
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=24efe0cb-37e4-4030-8040-96cc03619cbf&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.227
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=e3c1bb87-134a-4b79-9350-4fcf40025dd1&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.227
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=f70c64fb-bd8c-4b68-8d78-3a86a80f0fd6&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.227
https://ps.atera.com/agentpackagesnet45/Agent.Package.Availability/0.16/Agent.Package.Availability.z
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=28c02dc8-fc10-46f4-9892-4dca60ee91e7&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.229
https://ps.atera.com/agentpackagesnet45/AgentPackageSTRemote/21.6/AgentPackageSTRemote.zip
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageTicketing/27.5/AgentPackageTicketing.zip
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517-f825-4372-8327-c232f61880c4/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=800f1992-a163-4e95-be3a-8d7dd58c0f05&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.227
https://ps.atera.com/agentpackagesmac/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
unknown
https://ps.atera.com/agentpackagesnet45/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=28c02dc8-fc10-46f4-9892-4dca60ee91e7
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=8ca60d9f-75c2-4d80-a8a7-b05f671b9e42&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.227
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=8ca60d9f-75c2-4d80-a8a7-b05f671b9e42
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageSystemTools/26.6/AgentPackageSystemTools.zip
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02cec
unknown
https://www.newtonsoft.com/json
unknown
https://agent-api.atera.com/Production/Agent/Age
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=f70c64fb-bd8c-4b68-8d78-3a86a80f0fd6
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517-f825-4372-8327-c232f61880c4/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=3da9111c-aaa7-4e08-ba06-01a1cd672c2b&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.227
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/7d7ca517-f825-4372-8327-c232f61880c4/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=c2080080-bc76-4491-ab59-0a0eabfe07a8&uuid=7d7ca517-f825-4372-8327-c232f61880c4
35.157.63.227
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=4268a400-66a4-4a60-8ada-3d40a293c400
unknown
http://wixtoolset.org/news/
unknown
https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ps.pndsn.com
35.157.63.229
bg.microsoft.map.fastly.net
199.232.214.172
d25btwd9wax8gu.cloudfront.net
3.165.136.99
fp2e7a.wpc.phicdn.net
192.229.221.95
ps.atera.com
unknown
agent-api.atera.com
unknown

IPs

IP
Domain
Country
Malicious
35.157.63.227
unknown
United States
35.157.63.229
ps.pndsn.com
United States
3.165.136.99
d25btwd9wax8gu.cloudfront.net
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\56f4af.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\56f4af.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB9EFD7FDAF9AD115987000E181661F5
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CD868C8CE5A308147ABB306D829266BC
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C32B8CE0327C1E141950B4C9C2AD4DA7
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D9B1B1F0B1FC024D9390FE4B94D97D5
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\007F59F54ACD08842B2D98A10E6D1E3A
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB25C26F7C51D3C4AA2BED5600F46956
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01010F83113E72A4C81AD77422D2F947
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01D9DC4B27DFC0340B543A11D3CEBE07
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\ATERA Networks\AteraAgent\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\ATERA Networks\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\7D0A237E2F2A7564CA141B792446E854
INSTALLFOLDER_files_Feature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Features
INSTALLFOLDER_files_Feature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
AutoBackupLogFiles
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AteraAgent
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
AccountId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
IntegratorLogin
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
CompanyId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
AgentId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
ServerName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AlphaAgent
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
FileDirectory
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_USERS.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\25\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\25\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
FileDirectory
There are 139 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
213E39E5000
heap
page read and write
malicious
24C04F52000
unkown
page readonly
malicious
19DB5D20000
heap
page read and write
malicious
1CE005DF000
trusted library allocation
page read and write
malicious
1CA906D3000
trusted library allocation
page read and write
malicious
24C04FE1000
trusted library allocation
page read and write
malicious
1CA90651000
trusted library allocation
page read and write
malicious
24297127000
trusted library allocation
page read and write
malicious
1CE7F49B000
heap
page read and write
malicious
24296857000
heap
page read and write
malicious
4C64000
trusted library allocation
page read and write
malicious
7FFD9B4A4000
trusted library allocation
page read and write
malicious
213E4297000
trusted library allocation
page read and write
malicious
1CA8FE18000
heap
page read and write
malicious
213E399D000
heap
page read and write
malicious
238EB400000
heap
page read and write
malicious
1E1B60C2000
unkown
page readonly
malicious
242970E1000
trusted library allocation
page read and write
malicious
1E1B7F42000
trusted library allocation
page read and write
malicious
213E42D3000
trusted library allocation
page read and write
malicious
19DB5AA0000
heap
page read and write
malicious
19DB5AA9000
heap
page read and write
malicious
21780422000
trusted library allocation
page read and write
malicious
1E1B6311000
heap
page read and write
malicious
427E000
heap
page read and write
malicious
169F67A0000
heap
page read and write
malicious
217FC074000
heap
page read and write
malicious
7EE0BD5000
stack
page read and write
malicious
19DB64CF000
trusted library allocation
page read and write
malicious
24296B70000
heap
page read and write
malicious
1CE005A3000
trusted library allocation
page read and write
malicious
21780692000
trusted library allocation
page read and write
malicious
1E1D0810000
heap
page read and write
malicious
24C049CB000
heap
page read and write
malicious
24C05063000
trusted library allocation
page read and write
malicious
1CE7F4A8000
heap
page read and write
malicious
238800BF000
trusted library allocation
page read and write
malicious
169F677F000
heap
page read and write
malicious
19DB5AE3000
heap
page read and write
malicious
23880001000
trusted library allocation
page read and write
malicious
1E1D0540000
heap
page read and write
malicious
1E1B7F8C000
trusted library allocation
page read and write
malicious
217806B0000
trusted library allocation
page read and write
malicious
4BC1000
trusted library allocation
page read and write
malicious
4194000
heap
page read and write
malicious
1E1B62D0000
heap
page read and write
malicious
1CE7F548000
heap
page read and write
malicious
238EA4AC000
heap
page read and write
malicious
1CA8FE10000
heap
page read and write
malicious
23880047000
trusted library allocation
page read and write
malicious
2178013E000
trusted library allocation
page read and write
malicious
217809A0000
trusted library allocation
page read and write
malicious
1E1B7E9C000
trusted library allocation
page read and write
malicious
169F6682000
unkown
page readonly
malicious
19DB6493000
trusted library allocation
page read and write
malicious
238EA490000
heap
page read and write
malicious
1E1B630E000
heap
page read and write
malicious
1E1D05BE000
heap
page read and write
malicious
1E1B7ECA000
trusted library allocation
page read and write
malicious
21780305000
trusted library allocation
page read and write
malicious
1CE18D0A000
heap
page read and write
malicious
1CA8FE9B000
heap
page read and write
malicious
169F6760000
heap
page read and write
malicious
43FB000
heap
page read and write
malicious
16980083000
trusted library allocation
page read and write
malicious
24296819000
heap
page read and write
malicious
1CA8FE5C000
heap
page read and write
malicious
1CE7F460000
heap
page read and write
malicious
1E1B7ED9000
trusted library allocation
page read and write
malicious
24296896000
heap
page read and write
malicious
217801FD000
trusted library allocation
page read and write
malicious
1E1B6260000
heap
page read and write
malicious
213E430F000
trusted library allocation
page read and write
malicious
217FC08B000
heap
page read and write
malicious
238EA4CC000
heap
page read and write
malicious
19DB5B26000
heap
page read and write
malicious
217FC0D5000
heap
page read and write
malicious
2178094C000
trusted library allocation
page read and write
malicious
21780232000
trusted library allocation
page read and write
malicious
24C049EC000
heap
page read and write
malicious
16980001000
trusted library allocation
page read and write
malicious
24C04A36000
heap
page read and write
malicious
2429684D000
heap
page read and write
malicious
24297163000
trusted library allocation
page read and write
malicious
21780001000
trusted library allocation
page read and write
malicious
213E3960000
heap
page read and write
malicious
217FAB90000
heap
page read and write
malicious
1CE00521000
trusted library allocation
page read and write
malicious
217808E4000
trusted library allocation
page read and write
malicious
21780914000
trusted library allocation
page read and write
malicious
213E3AE0000
heap
page read and write
malicious
43E7000
trusted library allocation
page read and write
malicious
24C049FA000
heap
page read and write
malicious
217FABA0000
heap
page read and write
malicious
1E1B635F000
heap
page read and write
malicious
24C0509F000
trusted library allocation
page read and write
malicious
24C05027000
trusted library allocation
page read and write
malicious
1E1B7EC4000
trusted library allocation
page read and write
malicious
19DB6411000
trusted library allocation
page read and write
malicious
1CA9070F000
trusted library allocation
page read and write
malicious
1E1B6359000
heap
page read and write
malicious
1E1B7E11000
trusted library allocation
page read and write
malicious
1E1B7EC2000
trusted library allocation
page read and write
malicious
1CE7F4E8000
heap
page read and write
malicious
169F67AD000
heap
page read and write
malicious
19DB5ADD000
heap
page read and write
malicious
2429719F000
trusted library allocation
page read and write
malicious
4929000
heap
page read and write
malicious
169F69F0000
heap
page read and write
malicious
1E1B62D6000
heap
page read and write
malicious
213E3969000
heap
page read and write
malicious
213E4251000
trusted library allocation
page read and write
malicious
217FABA8000
heap
page read and write
malicious
24C1D961000
heap
page read and write
malicious
238EA568000
heap
page read and write
malicious
4341000
trusted library allocation
page read and write
malicious
1CE00567000
trusted library allocation
page read and write
malicious
23880083000
trusted library allocation
page read and write
malicious
1CE7F469000
heap
page read and write
malicious
238EA3F0000
heap
page read and write
malicious
1CE7F7C0000
heap
page read and write
malicious
24C049B0000
heap
page read and write
malicious
1CA90697000
trusted library allocation
page read and write
malicious
19DCEAD0000
heap
page read and write
malicious
217FADB0000
heap
page read and write
malicious
217FABDC000
heap
page read and write
malicious
238EA499000
heap
page read and write
malicious
24296810000
heap
page read and write
malicious
1CA90080000
heap
page read and write
malicious
238EA4DC000
heap
page read and write
malicious
19DB6457000
trusted library allocation
page read and write
malicious
1E1B7E99000
trusted library allocation
page read and write
malicious
217FBC0E000
heap
page read and write
malicious
24C049B8000
heap
page read and write
malicious
1E1B62EE000
heap
page read and write
malicious
217FAC24000
heap
page read and write
malicious
217806CE000
trusted library allocation
page read and write
malicious
217808ED000
trusted library allocation
page read and write
malicious
213E399F000
heap
page read and write
malicious
24C04970000
heap
page read and write
malicious
169F67ED000
heap
page read and write
malicious
217802B2000
trusted library allocation
page read and write
malicious
19DB5B61000
heap
page read and write
malicious
238EA517000
heap
page read and write
malicious
2178006E000
trusted library allocation
page read and write
malicious
21790084000
trusted library allocation
page read and write
7FFD9B472000
trusted library allocation
page read and write
7810AFD000
stack
page read and write
7FFD9B520000
trusted library allocation
page execute and read and write
2CFA000
heap
page read and write
67D0000
trusted library allocation
page read and write
48E0000
trusted library allocation
page read and write
5AE000
stack
page read and write
4920000
trusted library allocation
page read and write
7FFD9B4BD000
trusted library allocation
page read and write
58FF3FE000
stack
page read and write
4DFB8FE000
stack
page read and write
67D0000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
1E1D05AC000
heap
page read and write
5341000
trusted library allocation
page read and write
213E3A90000
trusted library allocation
page read and write
690000
heap
page read and write
7FFD9B5D0000
trusted library allocation
page read and write
217800C3000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6EA06FE000
stack
page read and write
242970D0000
heap
page read and write
6F60000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
7FF4FD030000
trusted library allocation
page execute and read and write
7FFD9B472000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
2A40000
heap
page read and write
7FFD9B36C000
trusted library allocation
page execute and read and write
4400000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
169F6F80000
heap
page execute and read and write
1CA9068B000
trusted library allocation
page read and write
217FBC9C000
heap
page read and write
6C20000
heap
page execute and read and write
24C1D87F000
unkown
page readonly
67F0000
trusted library allocation
page read and write
7FFD9B4E9000
trusted library allocation
page read and write
426E000
stack
page read and write
217FAE30000
trusted library allocation
page read and write
7EE10FE000
stack
page read and write
6F60000
trusted library allocation
page read and write
217809C4000
trusted library allocation
page read and write
24C1D8C2000
unkown
page readonly
2D1F000
heap
page read and write
6F40000
trusted library allocation
page read and write
67F4000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
7FFD9B33C000
trusted library allocation
page execute and read and write
6F80000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B490000
trusted library allocation
page read and write
5A7E1FE000
stack
page read and write
7FFD9B4A6000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
7FFD9B4C0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
42F0000
trusted library allocation
page execute and read and write
67B0000
trusted library allocation
page read and write
7FFD9B2ED000
trusted library allocation
page execute and read and write
6F90000
trusted library allocation
page read and write
7EE0F29000
stack
page read and write
48E3000
trusted library allocation
page execute and read and write
67F0000
trusted library allocation
page read and write
7FFD9B5C0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
7FFD9B4AD000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
422E000
stack
page read and write
6740000
trusted library allocation
page execute and read and write
5BE000
unkown
page read and write
169F791C000
heap
page read and write
1CE0055D000
trusted library allocation
page read and write
19DB5AE1000
heap
page read and write
24296920000
heap
page read and write
217803D6000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
4590000
trusted library allocation
page execute and read and write
267E000
stack
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B2F2000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6FA4000
trusted library allocation
page read and write
1CE7F486000
heap
page read and write
CB7D2F1000
stack
page read and write
217801D5000
trusted library allocation
page read and write
7EE193E000
stack
page read and write
4185000
trusted library allocation
page execute and read and write
6F60000
trusted library allocation
page read and write
24296B75000
heap
page read and write
24C049F4000
heap
page read and write
6F60000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
2790000
heap
page readonly
1CAA8F60000
heap
page read and write
7FFD9B4B8000
trusted library allocation
page read and write
26BE000
stack
page read and write
48F0000
trusted library allocation
page read and write
7FFD9B4D0000
trusted library allocation
page read and write
1CA90793000
trusted library allocation
page read and write
24C04950000
trusted library allocation
page read and write
2178029D000
trusted library allocation
page read and write
217800A0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
2CA0000
heap
page read and write
67F0000
trusted library allocation
page read and write
43C000
stack
page read and write
19DB6553000
trusted library allocation
page read and write
6F45000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
1E1B6520000
heap
page read and write
24C14FE1000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
217802F2000
trusted library allocation
page read and write
7FFD9B380000
trusted library allocation
page read and write
2CC2000
heap
page read and write
6EA04FE000
stack
page read and write
24297223000
trusted library allocation
page read and write
7C7000
heap
page read and write
7FFD9B2C2000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
213FC970000
heap
page read and write
276B000
trusted library allocation
page execute and read and write
6F90000
trusted library allocation
page read and write
67F000
stack
page read and write
7FFD9B490000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
169F6BF5000
heap
page read and write
7FFD9B492000
trusted library allocation
page read and write
1E1D05BA000
heap
page read and write
2760000
heap
page read and write
7FFD9B4B0000
trusted library allocation
page read and write
217FC188000
heap
page read and write
7EE2128000
stack
page read and write
7810EFE000
stack
page read and write
7FFD9B4DB000
trusted library allocation
page read and write
217801AD000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
217FC092000
heap
page read and write
7EE2F37000
stack
page read and write
6F60000
trusted library allocation
page read and write
2388003B000
trusted library allocation
page read and write
2C80000
heap
page read and write
67D0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
1CE00490000
trusted library allocation
page read and write
7FFD9B5A0000
trusted library allocation
page read and write
4313000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page read and write
1FB000
stack
page read and write
2D31000
heap
page read and write
2178095C000
trusted library allocation
page read and write
273D000
trusted library allocation
page execute and read and write
21780920000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
4DFA5FE000
stack
page read and write
7FFD9B386000
trusted library allocation
page read and write
4611000
trusted library allocation
page read and write
7FFD9B30D000
trusted library allocation
page execute and read and write
6F80000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
7FFD9B302000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
213FC9CF000
heap
page read and write
7FFD9B4CB000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
217FABBB000
heap
page read and write
1CE10521000
trusted library allocation
page read and write
2178046A000
trusted library allocation
page read and write
217801D9000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
EF97CFE000
stack
page read and write
6F90000
trusted library allocation
page read and write
7FFD9B2ED000
trusted library allocation
page execute and read and write
7FFD9B2B2000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
1CAA0651000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B2ED000
trusted library allocation
page execute and read and write
6F40000
trusted library allocation
page read and write
2C9F000
heap
page read and write
7FFD9B386000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
EF981FE000
stack
page read and write
238EA4D0000
heap
page read and write
2D30000
heap
page read and write
4170000
trusted library allocation
page execute and read and write
24297231000
trusted library allocation
page read and write
213E38E0000
heap
page read and write
41C5000
heap
page read and write
7FFD9B4D0000
trusted library allocation
page read and write
24C1D891000
unkown
page readonly
2178019D000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
238EB4A2000
heap
page read and write
1E1D08BD000
heap
page read and write
67F0000
trusted library allocation
page read and write
6760000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
7FFD9B4C4000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
217FC268000
heap
page read and write
58FF6FD000
stack
page read and write
67F0000
trusted library allocation
page read and write
7EE373C000
stack
page read and write
27ED000
heap
page read and write
6F60000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
2257000
stack
page read and write
6F90000
trusted library allocation
page read and write
7FFD9B4E9000
trusted library allocation
page read and write
213E399B000
heap
page read and write
6F80000
trusted library allocation
page read and write
6AAE000
stack
page read and write
24C1D860000
unkown
page readonly
673E000
stack
page read and write
19DB6400000
heap
page execute and read and write
217FC263000
heap
page read and write
6810000
trusted library allocation
page read and write
4C60000
trusted library allocation
page read and write
217FC5E6000
heap
page read and write
238EA4B7000
heap
page read and write
5A7E0FF000
stack
page read and write
6D70000
heap
page read and write
6800000
trusted library allocation
page read and write
7FFD9B376000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
4414000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
238EABC0000
heap
page execute and read and write
24F7000
stack
page read and write
7FFD9B490000
trusted library allocation
page read and write
1CA8FC70000
heap
page read and write
2D4E000
heap
page read and write
6FE0000
remote allocation
page read and write
67B0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
217FC070000
heap
page read and write
4CA6000
trusted library allocation
page read and write
21780135000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
19DB644F000
trusted library allocation
page read and write
7FFD9B2F0000
trusted library allocation
page read and write
2D35000
heap
page read and write
4182000
trusted library allocation
page read and write
67BC000
trusted library allocation
page read and write
21780906000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6FE0000
heap
page read and write
217FAE75000
heap
page read and write
6F80000
trusted library allocation
page read and write
5611000
trusted library allocation
page read and write
238EA3D0000
heap
page read and write
6800000
trusted library allocation
page read and write
7FFD9B501000
trusted library allocation
page read and write
6F49000
trusted library allocation
page read and write
267E000
stack
page read and write
6FA0000
trusted library allocation
page read and write
7FFD9B500000
trusted library allocation
page execute and read and write
6F80000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
43A0000
trusted library allocation
page read and write
7FFD9B4A0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
238EA390000
heap
page read and write
2240000
heap
page read and write
169F7828000
unkown
page readonly
24C1D88D000
unkown
page readonly
49D0000
heap
page readonly
6F40000
trusted library allocation
page read and write
1CAA8ED0000
heap
page read and write
6F90000
trusted library allocation
page read and write
5A7E5FD000
stack
page read and write
7FFD9B2DD000
trusted library allocation
page execute and read and write
2320000
heap
page read and write
CB7D6FD000
stack
page read and write
1CA907A1000
trusted library allocation
page read and write
169F77B2000
unkown
page readonly
19DB5BD0000
heap
page read and write
217FC0AF000
heap
page read and write
19DB653F000
trusted library allocation
page read and write
66D6000
trusted library allocation
page execute and read and write
217FC5CF000
heap
page read and write
458D000
stack
page read and write
1CE0064F000
trusted library allocation
page read and write
5B555FE000
stack
page read and write
24C1D913000
heap
page read and write
67B0000
trusted library allocation
page read and write
217FBCA0000
unkown
page read and write
169F6930000
heap
page read and write
6F80000
trusted library allocation
page read and write
1CA8FE52000
heap
page read and write
7FFD9B300000
trusted library allocation
page read and write
27B4000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
217805D0000
trusted library allocation
page read and write
7FFD9B3AC000
trusted library allocation
page execute and read and write
24C04720000
unkown
page readonly
67F0000
trusted library allocation
page read and write
79B000
heap
page read and write
6F90000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
217803EB000
trusted library allocation
page read and write
242AF947000
heap
page read and write
7FFD9B2CD000
trusted library allocation
page execute and read and write
242A70E1000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
4248000
trusted library allocation
page read and write
495A000
heap
page read and write
21780682000
trusted library allocation
page read and write
24296B65000
heap
page read and write
4A60000
trusted library allocation
page read and write
7FFD9B4E0000
trusted library allocation
page read and write
7FFD9B396000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
263E000
stack
page read and write
6800000
trusted library allocation
page read and write
7FFD9B2D4000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
7FFD9B4AE000
trusted library allocation
page read and write
67B5000
trusted library allocation
page read and write
24297235000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
4BB0000
heap
page execute and read and write
238EA4DE000
heap
page read and write
67F0000
trusted library allocation
page read and write
454C000
stack
page read and write
1E1B631D000
heap
page read and write
7FFD9B4F0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
4DFB5FC000
stack
page read and write
475E000
stack
page read and write
6FC0000
trusted library allocation
page read and write
7FFD9B486000
trusted library allocation
page read and write
19DB5BE0000
heap
page read and write
6830000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
238EB4B5000
heap
page read and write
6F90000
trusted library allocation
page read and write
1E1D084B000
heap
page read and write
696E000
stack
page read and write
7FFD9B5F0000
trusted library allocation
page read and write
217806E4000
trusted library allocation
page read and write
6EA09FE000
stack
page read and write
19DB5BD5000
heap
page read and write
24C1D987000
heap
page read and write
422E000
stack
page read and write
67F0000
trusted library allocation
page read and write
217800E3000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
74FE000
stack
page read and write
67D0000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page read and write
1CA8FE38000
heap
page read and write
213E428F000
trusted library allocation
page read and write
6F45000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
19DB6250000
heap
page execute and read and write
16980155000
trusted library allocation
page read and write
7FFD9B480000
trusted library allocation
page read and write
418B000
trusted library allocation
page execute and read and write
2770000
heap
page read and write
242A70ED000
trusted library allocation
page read and write
213E3920000
heap
page read and write
67F0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
238EA6F5000
heap
page read and write
7FFD9B48E000
trusted library allocation
page read and write
6F45000
trusted library allocation
page read and write
217801E9000
trusted library allocation
page read and write
1CE7F4BC000
heap
page read and write
7FFD9B4B6000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
21780908000
trusted library allocation
page read and write
7FFD9B4B7000
trusted library allocation
page read and write
213E4393000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
24296F30000
trusted library allocation
page read and write
7FFD9B30C000
trusted library allocation
page execute and read and write
6800000
trusted library allocation
page read and write
7FFD9B540000
trusted library allocation
page execute and read and write
67F0000
trusted library allocation
page read and write
1E1B62B0000
heap
page read and write
7EE2E3D000
stack
page read and write
7FFD9B550000
trusted library allocation
page execute and read and write
89E000
stack
page read and write
297A000
heap
page read and write
7EE3631000
stack
page read and write
7FFD9B2FD000
trusted library allocation
page execute and read and write
169F77AE000
unkown
page readonly
7FFD9B3B6000
trusted library allocation
page execute and read and write
6801000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
67F4000
trusted library allocation
page read and write
7FFD9B2F4000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
717F000
stack
page read and write
23880151000
trusted library allocation
page read and write
217FC266000
heap
page read and write
6F84000
trusted library allocation
page read and write
217802AA000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
67F1000
trusted library allocation
page read and write
78109FE000
stack
page read and write
4C56000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
7FFD9B34C000
trusted library allocation
page execute and read and write
2680000
heap
page read and write
1B8000
stack
page read and write
169F69C0000
trusted library allocation
page read and write
4B29000
heap
page read and write
4FE000
stack
page read and write
7FFD9B540000
trusted library allocation
page execute and read and write
67F0000
trusted library allocation
page read and write
4DFB9FB000
stack
page read and write
67F0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
2A35000
heap
page read and write
4CAA000
trusted library allocation
page read and write
24296B60000
heap
page read and write
CB7DDFE000
stack
page read and write
6F40000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
7FFD9B3A0000
trusted library allocation
page execute and read and write
27B0000
trusted library allocation
page read and write
7EE343E000
stack
page read and write
213FC910000
heap
page read and write
1E1B64B0000
heap
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B4E1000
trusted library allocation
page read and write
217FAE10000
trusted library allocation
page read and write
24C1D8F9000
unkown
page readonly
67F0000
trusted library allocation
page read and write
1CE004B0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
19DB5ADF000
heap
page read and write
67F0000
trusted library allocation
page read and write
5B550FE000
stack
page read and write
BB2754D000
stack
page read and write
7FFD9B3AC000
trusted library allocation
page execute and read and write
2833000
heap
page read and write
67B0000
trusted library allocation
page read and write
1E1D0835000
heap
page read and write
6850000
heap
page read and write
213E3AE5000
heap
page read and write
67D0000
trusted library allocation
page read and write
425E000
stack
page read and write
7FFD9B310000
trusted library allocation
page read and write
169F6BF0000
heap
page read and write
6F60000
trusted library allocation
page read and write
670E6FF000
stack
page read and write
1CE18DA1000
heap
page read and write
6F80000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
21780658000
trusted library allocation
page read and write
27A0000
trusted library allocation
page read and write
4426000
trusted library allocation
page read and write
217FADB5000
heap
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B300000
trusted library allocation
page read and write
2429711F000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
217FC9A0000
heap
page read and write
7EE352B000
stack
page read and write
6FA0000
trusted library allocation
page read and write
24C049D6000
heap
page read and write
4BA0000
trusted library allocation
page read and write
42EE000
stack
page read and write
7FFD9B2E5000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
169F77AA000
unkown
page readonly
7FFD9B4B0000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
27DA000
heap
page read and write
7FC00000
trusted library allocation
page execute and read and write
67F0000
trusted library allocation
page read and write
7FFD9B400000
trusted library allocation
page execute and read and write
169F7817000
unkown
page readonly
498E000
stack
page read and write
6B8E000
stack
page read and write
7FFD9B520000
trusted library allocation
page execute and read and write
7FFD9B3F0000
trusted library allocation
page execute and read and write
670DF81000
stack
page read and write
7FFD9B4D0000
trusted library allocation
page execute and read and write
6A6E000
stack
page read and write
2389000D000
trusted library allocation
page read and write
2D4E000
heap
page read and write
7FFD9B2E4000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
217803D8000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
7FFD9B3A0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
42AF000
heap
page read and write
238EA480000
heap
page execute and read and write
7FFD9B566000
trusted library allocation
page read and write
217FABC5000
heap
page read and write
4427000
trusted library allocation
page execute and read and write
7FFD9B2F0000
trusted library allocation
page read and write
24C1D8BC000
unkown
page readonly
7FFD9B4D0000
trusted library allocation
page execute and read and write
1CA8FE56000
heap
page read and write
5C0000
heap
page read and write
6F60000
trusted library allocation
page read and write
5A7E4FE000
stack
page read and write
2178012E000
trusted library allocation
page read and write
213E428D000
trusted library allocation
page read and write
169F6850000
heap
page read and write
169F77BA000
unkown
page readonly
7FFD9B2D5000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
5615000
trusted library allocation
page read and write
7FFD9B506000
trusted library allocation
page read and write
169F779D000
unkown
page readonly
67F0000
trusted library allocation
page read and write
238EB49F000
heap
page read and write
6F60000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
19DB6561000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
7F348000
trusted library allocation
page execute and read and write
7FFD9B492000
trusted library allocation
page read and write
7FFD9B480000
trusted library allocation
page read and write
24C1D8D3000
unkown
page readonly
67F0000
trusted library allocation
page read and write
5B54981000
stack
page read and write
46D0000
trusted library allocation
page read and write
1E1B6170000
heap
page read and write
6800000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
27AA000
heap
page read and write
4187000
trusted library allocation
page execute and read and write
6F80000
trusted library allocation
page read and write
213FC963000
heap
page read and write
EF976F1000
stack
page read and write
7FFD9B2FD000
trusted library allocation
page execute and read and write
6810000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
7FFD9B3A0000
trusted library allocation
page read and write
4927000
trusted library allocation
page execute and read and write
6F80000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
6850000
remote allocation
page read and write
6F40000
trusted library allocation
page read and write
238EA2B0000
heap
page read and write
7FFD9B4E0000
trusted library allocation
page read and write
4230000
heap
page readonly
67F0000
trusted library allocation
page read and write
2429720F000
trusted library allocation
page read and write
238EB48C000
heap
page read and write
6F90000
trusted library allocation
page read and write
7FFD9B2B4000
trusted library allocation
page read and write
7FFD9B48E000
trusted library allocation
page read and write
217FC13C000
heap
page read and write
24C05131000
trusted library allocation
page read and write
24C04F68000
unkown
page readonly
6F80000
trusted library allocation
page read and write
4180000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
169F78F0000
heap
page read and write
238EB44D000
heap
page read and write
1E1D0844000
heap
page read and write
2CC2000
heap
page read and write
24C0501D000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
48F4000
trusted library allocation
page read and write
7810BFE000
stack
page read and write
6F80000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
7FFD9B2E2000
trusted library allocation
page read and write
217800D7000
trusted library allocation
page read and write
45FB000
heap
page read and write
4DFB4FC000
stack
page read and write
67D0000
trusted library allocation
page read and write
1CE18DC9000
heap
page read and write
7FFD9B30D000
trusted library allocation
page execute and read and write
7B9000
heap
page read and write
6F80000
trusted library allocation
page read and write
7FFD9B30D000
trusted library allocation
page execute and read and write
7FFD9B516000
trusted library allocation
page read and write
1CE7F49E000
heap
page read and write
6F80000
trusted library allocation
page read and write
21780054000
trusted library allocation
page read and write
1CE00671000
trusted library allocation
page read and write
2423AAA0000
heap
page read and write
1CA907A5000
trusted library allocation
page read and write
7EE1F26000
stack
page read and write
24C1D88F000
unkown
page readonly
238EA4D6000
heap
page read and write
67B0000
trusted library allocation
page read and write
238EA513000
heap
page read and write
67D0000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
7FFD9B31B000
trusted library allocation
page execute and read and write
1CA8FE4D000
heap
page read and write
67D0000
trusted library allocation
page read and write
4360000
trusted library allocation
page read and write
217FC255000
heap
page read and write
6F80000
trusted library allocation
page read and write
7FFD9B2E3000
trusted library allocation
page execute and read and write
6F60000
trusted library allocation
page read and write
43D6000
trusted library allocation
page read and write
1CA8FDE0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
213FC98A000
heap
page read and write
67B0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
69ED000
stack
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B4E6000
trusted library allocation
page read and write
19DB5AC6000
heap
page read and write
7FFD9B3F0000
trusted library allocation
page execute and read and write
6F60000
trusted library allocation
page read and write
2810000
heap
page read and write
67F0000
trusted library allocation
page read and write
743F000
stack
page read and write
6F40000
trusted library allocation
page read and write
169F77ED000
unkown
page readonly
6820000
trusted library allocation
page execute and read and write
4270000
trusted library allocation
page read and write
6760000
trusted library allocation
page read and write
7FFD9B530000
trusted library allocation
page execute and read and write
1CE7F705000
heap
page read and write
67D0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
7FFD9B396000
trusted library allocation
page read and write
7FFD9B490000
trusted library allocation
page read and write
24C04980000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
7FFD9B4E5000
trusted library allocation
page read and write
7EE273E000
stack
page read and write
217FC12E000
heap
page read and write
217FB350000
heap
page read and write
169F78AB000
heap
page read and write
6F80000
trusted library allocation
page read and write
7FFD9B482000
trusted library allocation
page read and write
66D9000
trusted library allocation
page execute and read and write
6F80000
trusted library allocation
page read and write
169F77EB000
unkown
page readonly
6FA0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
78106F1000
stack
page read and write
238EA6F0000
heap
page read and write
238EA3B0000
heap
page read and write
67D0000
trusted library allocation
page read and write
23890011000
trusted library allocation
page read and write
217801D0000
trusted library allocation
page read and write
58FF1FE000
stack
page read and write
7FFD9B2C2000
trusted library allocation
page read and write
7FFD9B2FD000
trusted library allocation
page execute and read and write
6810000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
238EA4CE000
heap
page read and write
1E1D083D000
heap
page read and write
67F0000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B4B0000
trusted library allocation
page read and write
7EE2027000
stack
page read and write
29B7000
heap
page read and write
6F80000
trusted library allocation
page read and write
7FFD9B4E0000
trusted library allocation
page read and write
950000
heap
page read and write
19DB5CE0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
2868000
heap
page read and write
42BE000
stack
page read and write
2CB8000
heap
page read and write
6F40000
trusted library allocation
page read and write
4680000
trusted library allocation
page execute and read and write
7FFD9B4C0000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
44CE000
stack
page read and write
217FBBBE000
heap
page read and write
7FFD9B314000
trusted library allocation
page read and write
2830000
heap
page read and write
28C7000
heap
page read and write
67D0000
trusted library allocation
page read and write
169F783C000
unkown
page readonly
67B0000
trusted library allocation
page read and write
1E1C7E11000
trusted library allocation
page read and write
2178094A000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B4E7000
trusted library allocation
page read and write
217807C2000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B4A0000
trusted library allocation
page read and write
7FFD9B4C8000
trusted library allocation
page read and write
21780632000
trusted library allocation
page read and write
7FFD9B304000
trusted library allocation
page read and write
4DFA7FE000
stack
page read and write
6810000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
1E1D0672000
unkown
page readonly
2388012F000
trusted library allocation
page read and write
1CA8FFD5000
heap
page read and write
2C70000
heap
page read and write
7FFD9B2C4000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
217FC5E8000
heap
page read and write
7FFD9B396000
trusted library allocation
page execute and read and write
24C1D894000
unkown
page readonly
7FFD9B2F2000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
7FFD9B4B0000
trusted library allocation
page read and write
1CA8FD50000
heap
page read and write
723E000
stack
page read and write
7FFD9B2EB000
trusted library allocation
page execute and read and write
6F90000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
2A30000
heap
page read and write
7FFD9B4CE000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
217FABEA000
heap
page read and write
6F80000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
4405000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
5A7E6FE000
stack
page read and write
6EA03FE000
stack
page read and write
7EE243B000
stack
page read and write
7FFD9B40B000
trusted library allocation
page execute and read and write
1E1D0886000
heap
page read and write
7FFD9B510000
trusted library allocation
page read and write
1E1D0599000
heap
page read and write
7FFD9B33C000
trusted library allocation
page execute and read and write
169F7804000
unkown
page readonly
6F90000
trusted library allocation
page read and write
24C049F2000
heap
page read and write
7FFD9B460000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
7FFD9B3A6000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
58FF7FE000
stack
page read and write
6F80000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
670E5FC000
stack
page read and write
67F0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
1CE18D95000
heap
page read and write
67F0000
trusted library allocation
page read and write
2CFA000
heap
page read and write
24C1D8F7000
unkown
page readonly
19DB5B24000
heap
page read and write
4260000
heap
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B4D4000
trusted library allocation
page read and write
7FFD9B4F0000
trusted library allocation
page read and write
7FFD9B2F2000
trusted library allocation
page read and write
25B0000
heap
page read and write
2A1E000
heap
page read and write
7F540000
trusted library allocation
page execute and read and write
7FFD9B4B6000
trusted library allocation
page read and write
6C6E000
stack
page read and write
459E000
stack
page read and write
7FFD9B4F4000
trusted library allocation
page read and write
4DFBAFE000
stack
page read and write
1E1D0847000
heap
page read and write
5A7DEFD000
stack
page read and write
7FFD9B4D0000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page read and write
670EAFE000
stack
page read and write
6F80000
trusted library allocation
page read and write
7EE2C3D000
stack
page read and write
7FFD9B4EE000
trusted library allocation
page read and write
217800A5000
trusted library allocation
page read and write
7FFD9B390000
trusted library allocation
page execute and read and write
5B556FD000
stack
page read and write
169F77B0000
unkown
page readonly
670E3FE000
stack
page read and write
67F0000
trusted library allocation
page read and write
1CE18D9A000
heap
page read and write
2429711B000
trusted library allocation
page read and write
79C000
heap
page read and write
442A000
trusted library allocation
page read and write
5A7DDFF000
stack
page read and write
7FFD9B2FD000
trusted library allocation
page execute and read and write
58FF4FE000
stack
page read and write
6830000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
217FAE70000
heap
page read and write
7FFD9B3B6000
trusted library allocation
page execute and read and write
217FB510000
trusted library allocation
page read and write
21780A66000
trusted library allocation
page read and write
217803DC000
trusted library allocation
page read and write
1CE7F4E5000
heap
page read and write
6FA0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
217800AA000
trusted library allocation
page read and write
238EB482000
heap
page read and write
1E1D08BA000
heap
page read and write
7FFD9B470000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
7FFD9B2CD000
trusted library allocation
page execute and read and write
169F69A0000
trusted library allocation
page read and write
7F330000
trusted library allocation
page execute and read and write
24C048B0000
heap
page read and write
217FBECE000
unkown
page readonly
7FFD9B550000
trusted library allocation
page read and write
7FFD9B4F9000
trusted library allocation
page read and write
217801B5000
trusted library allocation
page read and write
58FEFFC000
stack
page read and write
7FFD9B49E000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6EA07FF000
stack
page read and write
7FFD9B4D8000
trusted library allocation
page read and write
6F8C000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
22C0000
heap
page read and write
6F60000
trusted library allocation
page read and write
1CE18D54000
heap
page read and write
6F40000
trusted library allocation
page read and write
1CE7F4E3000
heap
page read and write
6F80000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7F558000
trusted library allocation
page execute and read and write
24C1D88B000
unkown
page readonly
7FFD9B4A5000
trusted library allocation
page read and write
7FFD9B4F0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
217FC5E4000
heap
page read and write
6F80000
trusted library allocation
page read and write
213E43A5000
trusted library allocation
page read and write
49E8000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6D6E000
stack
page read and write
5B54CFE000
stack
page read and write
2429711D000
trusted library allocation
page read and write
1E1D05CE000
heap
page read and write
6FA0000
trusted library allocation
page read and write
7FFD9B360000
trusted library allocation
page read and write
169F6950000
heap
page read and write
7FFD9B4B0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
24C04A0C000
heap
page read and write
6FA0000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
7FFD9B4E0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
19DCEB24000
heap
page read and write
6F40000
trusted library allocation
page read and write
7FFD9B34C000
trusted library allocation
page execute and read and write
4ABE000
stack
page read and write
217801C5000
trusted library allocation
page read and write
23A0000
heap
page read and write
67B0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
169F77DA000
unkown
page readonly
6FA0000
trusted library allocation
page read and write
439D000
trusted library allocation
page read and write
169F7799000
unkown
page readonly
1CE0055B000
trusted library allocation
page read and write
1E1B6270000
heap
page read and write
67F0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
670E4FE000
stack
page read and write
6800000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
48ED000
trusted library allocation
page execute and read and write
7FFD9B39C000
trusted library allocation
page execute and read and write
4DFA9FF000
stack
page read and write
6800000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page read and write
2178089C000
trusted library allocation
page read and write
431D000
trusted library allocation
page execute and read and write
6800000
trusted library allocation
page read and write
7FFD9B4FE000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
7FFD9B4C0000
trusted library allocation
page read and write
238EB4B3000
heap
page read and write
67B0000
trusted library allocation
page read and write
25FD000
stack
page read and write
7FFD9B510000
trusted library allocation
page execute and read and write
433E000
stack
page read and write
217807C6000
trusted library allocation
page read and write
4B80000
trusted library allocation
page execute and read and write
6F40000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
7FFD9B530000
trusted library allocation
page execute and read and write
16980151000
trusted library allocation
page read and write
7FFD9B3D0000
trusted library allocation
page execute and read and write
217801F1000
trusted library allocation
page read and write
27D0000
heap
page read and write
6F80000
trusted library allocation
page read and write
7EE1A3D000
stack
page read and write
7FFD9B4E0000
trusted library allocation
page execute and read and write
2CFA000
heap
page read and write
213E3C80000
heap
page read and write
6800000
trusted library allocation
page read and write
42C0000
trusted library allocation
page read and write
6B40000
heap
page execute and read and write
6F60000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
169F77C0000
unkown
page readonly
7FFD9B2E0000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
67B4000
trusted library allocation
page read and write
7FFD9B2F3000
trusted library allocation
page execute and read and write
6800000
trusted library allocation
page read and write
19DB5ADB000
heap
page read and write
1CAA8F84000
heap
page read and write
1699000D000
trusted library allocation
page read and write
7FFD9B2D8000
trusted library allocation
page read and write
169F77AC000
unkown
page readonly
4910000
heap
page read and write
217FBC05000
heap
page read and write
6810000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
26E0000
heap
page read and write
6F80000
trusted library allocation
page read and write
32D000
stack
page read and write
2730000
trusted library allocation
page read and write
7FFD9B37C000
trusted library allocation
page execute and read and write
67B0000
trusted library allocation
page read and write
2388003F000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
7FFD9B520000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
4388000
trusted library allocation
page read and write
27D2000
heap
page read and write
19DB5AFD000
heap
page read and write
6F80000
trusted library allocation
page read and write
7FFD9B4F0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
698000
heap
page read and write
217FAE43000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
1CE18CF8000
heap
page read and write
6F40000
trusted library allocation
page read and write
1CE18D83000
heap
page read and write
67D0000
trusted library allocation
page read and write
24C048D5000
heap
page read and write
7FFD9B33C000
trusted library allocation
page execute and read and write
67F0000
trusted library allocation
page read and write
19DB5AE7000
heap
page read and write
4669000
trusted library allocation
page execute and read and write
7FFD9B2B3000
trusted library allocation
page execute and read and write
7FFD9B4C0000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
217806D8000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
21790013000
trusted library allocation
page read and write
4350000
trusted library allocation
page execute and read and write
1E1B6450000
heap
page execute and read and write
19DCEB66000
heap
page read and write
217802AD000
trusted library allocation
page read and write
24C04975000
heap
page read and write
1CE1052D000
trusted library allocation
page read and write
66DC000
trusted library allocation
page execute and read and write
213E39AB000
heap
page read and write
6F80000
trusted library allocation
page read and write
7FFD9B2DD000
trusted library allocation
page execute and read and write
6800000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
276E000
stack
page read and write
67B0000
trusted library allocation
page read and write
213E3900000
heap
page read and write
7FFD9B2E3000
trusted library allocation
page execute and read and write
6F80000
trusted library allocation
page read and write
1CE0055F000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
2D62000
heap
page read and write
1E1B631B000
heap
page read and write
7FFD9B47E000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
213E428B000
trusted library allocation
page read and write
5A7DCFE000
stack
page read and write
7FFD9B4A6000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
2CC4000
heap
page read and write
1E1B60E4000
unkown
page readonly
67D0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
4640000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
24C0510C000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
2875000
heap
page read and write
7FFD9B540000
trusted library allocation
page execute and read and write
29F7000
stack
page read and write
91F000
stack
page read and write
6F40000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
2A3F000
heap
page read and write
6F60000
trusted library allocation
page read and write
6F91000
trusted library allocation
page read and write
7FFD9B510000
trusted library allocation
page execute and read and write
67B0000
trusted library allocation
page read and write
7FFD9B500000
trusted library allocation
page read and write
670ECFD000
stack
page read and write
2370000
heap
page read and write
43DB000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
1CE0064C000
trusted library allocation
page read and write
217FB4D0000
heap
page execute and read and write
6F80000
trusted library allocation
page read and write
5A7DAF1000
stack
page read and write
451E000
stack
page read and write
67B0000
trusted library allocation
page read and write
7FFD9B4E0000
trusted library allocation
page read and write
1E1D087A000
heap
page read and write
6FA0000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page read and write
169F67A9000
heap
page read and write
2178095A000
trusted library allocation
page read and write
7EE1E3D000
stack
page read and write
24C049EE000
heap
page read and write
217808CD000
trusted library allocation
page read and write
1CE7F55B000
heap
page read and write
2423A920000
heap
page read and write
6F80000
trusted library allocation
page execute and read and write
6FC0000
trusted library allocation
page read and write
24C1D910000
heap
page read and write
6F83000
trusted library allocation
page read and write
7EE0E3F000
stack
page read and write
238EA4B9000
heap
page read and write
2178008C000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
7FFD9B498000
trusted library allocation
page read and write
19DB644D000
trusted library allocation
page read and write
7FFD9B450000
trusted library allocation
page read and write
1E1D088E000
heap
page read and write
6F80000
trusted library allocation
page read and write
213F4251000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
282A000
heap
page read and write
45B0000
heap
page read and write
217FBE22000
unkown
page readonly
6F80000
trusted library allocation
page read and write
217800DB000
trusted library allocation
page read and write
169F77EF000
unkown
page readonly
7FFD9B6A0000
trusted library allocation
page read and write
217801BD000
trusted library allocation
page read and write
7FFD9B400000
trusted library allocation
page execute and read and write
217FC107000
heap
page read and write
7EE2629000
stack
page read and write
7FFD9B2B5000
trusted library allocation
page read and write
2720000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
7F1A0000
trusted library allocation
page execute and read and write
7FFD9B2D2000
trusted library allocation
page read and write
2ECD000
stack
page read and write
67B0000
trusted library allocation
page read and write
7FFD9B400000
trusted library allocation
page execute and read and write
2970000
heap
page read and write
6F80000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
7FFD9B509000
trusted library allocation
page read and write
1CA8FE98000
heap
page read and write
1CA8FE6E000
heap
page read and write
7FFD9B366000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B6E0000
trusted library allocation
page read and write
78107FF000
stack
page read and write
67D0000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
169F67A5000
heap
page read and write
6F80000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
1E1B6290000
heap
page read and write
7FFD9B2F0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
7FFD9B2D0000
trusted library allocation
page read and write
2179000E000
trusted library allocation
page read and write
242AF9CA000
heap
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B2C8000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B390000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
7FFD9B4F9000
trusted library allocation
page read and write
24C1D87B000
unkown
page readonly
169F77BE000
unkown
page readonly
7FFD9B510000
trusted library allocation
page read and write
447E000
heap
page read and write
7FFD9B3DB000
trusted library allocation
page execute and read and write
6800000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
7FFD9B690000
trusted library allocation
page read and write
217FADC0000
heap
page read and write
24BB000
stack
page read and write
6F80000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
7FFD9B530000
trusted library allocation
page execute and read and write
2375000
heap
page read and write
7EE11FD000
stack
page read and write
24C14FF1000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
169F67E8000
heap
page read and write
42A0000
heap
page read and write
1E1D0820000
heap
page read and write
1CAA8F22000
heap
page read and write
1CA8FEF5000
heap
page read and write
238EA4EC000
heap
page read and write
7EE293E000
stack
page read and write
CB7DEFE000
stack
page read and write
58FF5FE000
stack
page read and write
7FFD9B396000
trusted library allocation
page read and write
7FFD9B6B0000
trusted library allocation
page read and write
1CAA8F82000
heap
page read and write
217FAD90000
heap
page read and write
620000
heap
page read and write
67B0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
217800CF000
trusted library allocation
page read and write
213F425D000
trusted library allocation
page read and write
238EA4DA000
heap
page read and write
67B0000
trusted library allocation
page read and write
7FFD9B486000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
79F000
heap
page read and write
217FC200000
heap
page read and write
43FD000
trusted library allocation
page execute and read and write
16990011000
trusted library allocation
page read and write
7FFD9B31D000
trusted library allocation
page execute and read and write
6F90000
trusted library allocation
page read and write
21780468000
trusted library allocation
page read and write
42E0000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
4A00000
trusted library allocation
page execute and read and write
21780918000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
66BE000
stack
page read and write
24C04A34000
heap
page read and write
217801F5000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
6750000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
24C1D8D5000
unkown
page readonly
21780638000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
4B90000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
2D61000
heap
page read and write
6F60000
trusted library allocation
page read and write
242AF905000
heap
page read and write
299F000
heap
page read and write
2423AD70000
heap
page read and write
6F81000
trusted library allocation
page read and write
21780A64000
trusted library allocation
page read and write
7EE2331000
stack
page read and write
24C1D9CE000
heap
page read and write
242AF99E000
heap
page read and write
21780958000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
7FFD9B3C6000
trusted library allocation
page execute and read and write
7FFD9B49C000
trusted library allocation
page read and write
7FFD9B2D0000
trusted library allocation
page read and write
6F84000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B2F3000
trusted library allocation
page execute and read and write
7FFD9B530000
trusted library allocation
page execute and read and write
6F80000
trusted library allocation
page read and write
7FFD9B4AA000
trusted library allocation
page read and write
217FC184000
heap
page read and write
21790001000
trusted library allocation
page read and write
7FFD9B2FB000
trusted library allocation
page execute and read and write
78111FE000
stack
page read and write
6F60000
trusted library allocation
page read and write
6AE000
stack
page read and write
67B0000
trusted library allocation
page read and write
217FC280000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
2CA3000
heap
page read and write
67B0000
trusted library allocation
page read and write
4A0000
heap
page read and write
67F0000
trusted library allocation
page read and write
4C94000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
29B5000
heap
page read and write
6F60000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
217FC2E0000
heap
page read and write
1CA9068D000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
41A0000
trusted library allocation
page read and write
1E1C7E1F000
trusted library allocation
page read and write
217801F9000
trusted library allocation
page read and write
1E1D05CA000
heap
page read and write
6F40000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
EF97AFD000
stack
page read and write
6800000
trusted library allocation
page read and write
238EA3F5000
heap
page read and write
67B0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
217FC5A0000
heap
page read and write
6F80000
trusted library allocation
page read and write
7EE16E9000
stack
page read and write
6F60000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
213E437C000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
5B552FE000
stack
page read and write
67B0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B2FD000
trusted library allocation
page execute and read and write
6FA0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
670E8FE000
stack
page read and write
7FFD9B4C8000
trusted library allocation
page read and write
19DC6411000
trusted library allocation
page read and write
7FFD9B48A000
trusted library allocation
page read and write
7FFD9B3B0000
trusted library allocation
page execute and read and write
4940000
trusted library allocation
page read and write
6814000
trusted library allocation
page read and write
24C1D90A000
unkown
page readonly
6FD0000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
242AF90F000
heap
page read and write
1CA9077C000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
217FC23E000
heap
page read and write
1E1B6410000
trusted library allocation
page read and write
4C1D000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
6D2E000
stack
page read and write
1CA90640000
heap
page read and write
6800000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
670EBFE000
stack
page read and write
1CAA065D000
trusted library allocation
page read and write
1CA9068F000
trusted library allocation
page read and write
21780177000
trusted library allocation
page read and write
CB7D3FE000
stack
page read and write
6F80000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
4C21000
trusted library allocation
page read and write
1CA9077F000
trusted library allocation
page read and write
7FFD9B4D6000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
560000
heap
page read and write
7FFD9B510000
trusted library allocation
page execute and read and write
24C047D0000
heap
page read and write
24C0501F000
trusted library allocation
page read and write
217FBE20000
unkown
page readonly
67F0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
2423AAA8000
heap
page read and write
6810000
trusted library allocation
page read and write
1CE7F3C0000
heap
page read and write
6F90000
trusted library allocation
page read and write
66D3000
trusted library allocation
page read and write
67FE000
trusted library allocation
page read and write
217809C6000
trusted library allocation
page read and write
EF982FE000
stack
page read and write
5E0000
heap
page read and write
42AC000
stack
page read and write
42F0000
heap
page read and write
5B554FE000
stack
page read and write
2DB0000
heap
page read and write
217801B9000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
7FFD9B2F0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
217FBC02000
heap
page read and write
5B54FFD000
stack
page read and write
7FFD9B452000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B4B0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
2842000
heap
page read and write
7EE1D3C000
stack
page read and write
213FC9CB000
heap
page read and write
6F60000
trusted library allocation
page read and write
6850000
remote allocation
page read and write
217FBBA0000
heap
page read and write
41CE000
stack
page read and write
67C0000
trusted library allocation
page read and write
58FECFE000
stack
page read and write
7FFD9B2E0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
7FFD9B390000
trusted library allocation
page read and write
217801B1000
trusted library allocation
page read and write
4690000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
455F000
stack
page read and write
7FFD9B470000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
217801DD000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
24296894000
heap
page read and write
6F90000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
5F0000
heap
page read and write
6FA0000
trusted library allocation
page read and write
7FFD9B3A0000
trusted library allocation
page execute and read and write
23890001000
trusted library allocation
page read and write
238EA430000
trusted library allocation
page read and write
7FFD9B511000
trusted library allocation
page read and write
169F70C0000
heap
page execute and read and write
67D0000
trusted library allocation
page read and write
7EE1B64000
stack
page read and write
7FFD9B30B000
trusted library allocation
page execute and read and write
7FFD9B3A6000
trusted library allocation
page execute and read and write
5A7E2FE000
stack
page read and write
19DCEB3D000
heap
page read and write
4670000
trusted library allocation
page read and write
26FF000
stack
page read and write
EF97FFE000
stack
page read and write
67F0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
4A70000
heap
page read and write
67D0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B2F4000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
169F77F3000
unkown
page readonly
2178095E000
trusted library allocation
page read and write
43A1000
trusted library allocation
page read and write
1CE004D0000
heap
page execute and read and write
1CA90085000
heap
page read and write
67F0000
trusted library allocation
page read and write
7EE173E000
stack
page read and write
7FFD9B4B2000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
45A0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
4440000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
2767000
trusted library allocation
page execute and read and write
6F40000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
7FFD9B4A0000
trusted library allocation
page read and write
1E1B7F82000
trusted library allocation
page read and write
217807CA000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
7EE2A3D000
stack
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B4A3000
trusted library allocation
page read and write
2429686D000
heap
page read and write
4643000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
2A2C000
heap
page read and write
24C1D86C000
unkown
page readonly
46D0000
trusted library allocation
page read and write
2CAC000
heap
page read and write
6F80000
trusted library allocation
page read and write
2570000
heap
page read and write
67D0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
43F3000
trusted library allocation
page execute and read and write
67F0000
trusted library allocation
page read and write
2750000
heap
page read and write
69AE000
stack
page read and write
6FA0000
trusted library allocation
page read and write
7FFD9B396000
trusted library allocation
page execute and read and write
19DB6200000
heap
page read and write
2A36000
heap
page read and write
7FFD9B4C2000
trusted library allocation
page read and write
24C1D881000
unkown
page readonly
7FFD9B524000
trusted library allocation
page read and write
7FFD9B520000
trusted library allocation
page read and write
6E9FF21000
stack
page read and write
7FFD9B500000
trusted library allocation
page execute and read and write
213E3800000
heap
page read and write
6F80000
trusted library allocation
page read and write
6EA0AFE000
stack
page read and write
67F0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
21780095000
trusted library allocation
page read and write
7FC18000
trusted library allocation
page execute and read and write
7FFD9B2D4000
trusted library allocation
page read and write
24C14FED000
trusted library allocation
page read and write
67B9000
trusted library allocation
page read and write
24296836000
heap
page read and write
4711000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
7FFD9B514000
trusted library allocation
page read and write
213E3C85000
heap
page read and write
471D000
stack
page read and write
67D0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
7FFD9B497000
trusted library allocation
page read and write
48D0000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
217807C8000
trusted library allocation
page read and write
7FFD9B520000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
727E000
stack
page read and write
7FFD9B38C000
trusted library allocation
page execute and read and write
21780131000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
7FFD9B410000
trusted library allocation
page execute and read and write
67D0000
trusted library allocation
page read and write
7FFD9B2DD000
trusted library allocation
page execute and read and write
6FE0000
remote allocation
page read and write
7FFD9B2F4000
trusted library allocation
page read and write
24C1D9BB000
heap
page read and write
6C2E000
stack
page read and write
7FFD9B2DB000
trusted library allocation
page execute and read and write
5715000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
7FFD9B4D0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
2560000
heap
page read and write
6800000
trusted library allocation
page read and write
1CE7F4A0000
heap
page read and write
4B63000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
2860000
heap
page read and write
6F40000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
2848000
heap
page read and write
67F0000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
19DC6421000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
1CE7F400000
heap
page read and write
242AF966000
heap
page read and write
7FFD9B590000
trusted library allocation
page read and write
29DF000
stack
page read and write
67F0000
trusted library allocation
page read and write
27C4000
trusted library allocation
page read and write
7FFD9B4A0000
trusted library allocation
page read and write
23BE000
stack
page read and write
6DA3000
heap
page read and write
24296F10000
trusted library allocation
page read and write
7FFD9B4D9000
trusted library allocation
page read and write
45DF000
stack
page read and write
6F60000
trusted library allocation
page read and write
217800CB000
trusted library allocation
page read and write
1E1B63C7000
heap
page read and write
EF97EFE000
stack
page read and write
6F60000
trusted library allocation
page read and write
2734000
trusted library allocation
page read and write
2178091E000
trusted library allocation
page read and write
4B60000
trusted library allocation
page read and write
7FFD9B610000
trusted library allocation
page execute and read and write
4B6C000
trusted library allocation
page execute and read and write
6800000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
7FFD9B30C000
trusted library allocation
page execute and read and write
6F60000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
19DB5BA0000
heap
page read and write
24C1D896000
unkown
page readonly
2423AD75000
heap
page read and write
2CB8000
heap
page read and write
78108FE000
stack
page read and write
6F80000
trusted library allocation
page read and write
1CAA0661000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B2D3000
trusted library allocation
page execute and read and write
6EE000
stack
page read and write
7FFD9B4B9000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
242970A0000
heap
page execute and read and write
67B0000
trusted library allocation
page read and write
7FFD9B490000
trusted library allocation
page read and write
24C1D862000
unkown
page readonly
3E0000
heap
page read and write
6800000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
7FFD9B4A6000
trusted library allocation
page read and write
1E1D08A3000
heap
page read and write
1E1D058D000
heap
page read and write
7C9000
heap
page read and write
6F40000
trusted library allocation
page read and write
1CAA9000000
heap
page execute and read and write
1FC000
stack
page read and write
6F90000
trusted library allocation
page read and write
1CA905C0000
heap
page execute and read and write
281A000
heap
page read and write
2D1F000
heap
page read and write
67D0000
trusted library allocation
page read and write
217FBC07000
heap
page read and write
67F0000
trusted library allocation
page read and write
1CE7F3E0000
heap
page read and write
58FF0FF000
stack
page read and write
4DFB6FE000
stack
page read and write
EF980FE000
stack
page read and write
4BA0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
7FFD9B2E2000
trusted library allocation
page read and write
5A7DFFF000
stack
page read and write
67F0000
trusted library allocation
page read and write
4DFA4F4000
stack
page read and write
1CA8FE58000
heap
page read and write
1CA8FE96000
heap
page read and write
6F80000
trusted library allocation
page read and write
463D000
stack
page read and write
27C3000
heap
page read and write
780000
heap
page read and write
6F80000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
5B54DFF000
stack
page read and write
6F40000
trusted library allocation
page read and write
7FFD9B500000
trusted library allocation
page execute and read and write
1E1B63F0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
1CE7F700000
heap
page read and write
7574000
heap
page read and write
4460000
heap
page read and write
6F60000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
7FFD9B2ED000
trusted library allocation
page execute and read and write
4C11000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
4925000
trusted library allocation
page execute and read and write
67D0000
trusted library allocation
page read and write
169F77C9000
unkown
page readonly
43F4000
trusted library allocation
page read and write
7FFD9B4B0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
1E1B6443000
heap
page read and write
6F60000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
2178006A000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
713E000
stack
page read and write
21780A62000
trusted library allocation
page read and write
4A5C000
stack
page read and write
42E0000
trusted library allocation
page read and write
48E4000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
7FFD9B420000
trusted library allocation
page execute and read and write
6F70000
trusted library allocation
page read and write
217807C4000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
24C05123000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B580000
trusted library allocation
page execute and read and write
1CE18DA3000
heap
page read and write
213E39A9000
heap
page read and write
67D0000
trusted library allocation
page read and write
169F779B000
unkown
page readonly
67D0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
27C0000
trusted library allocation
page read and write
19DB644B000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
5B0000
heap
page read and write
67B0000
trusted library allocation
page read and write
42D0000
trusted library allocation
page read and write
7FFD9B2C0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
2388012C000
trusted library allocation
page read and write
7FFD9B380000
trusted library allocation
page execute and read and write
217FC25A000
heap
page read and write
27BD000
trusted library allocation
page execute and read and write
7FFD9B30B000
trusted library allocation
page execute and read and write
7FFD9B4F0000
trusted library allocation
page execute and read and write
6F80000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B3D0000
trusted library allocation
page execute and read and write
217FC4B0000
unkown
page readonly
6F80000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B2F8000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
7EE393D000
stack
page read and write
67B0000
trusted library allocation
page read and write
4C0F000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
58FEDFE000
stack
page read and write
7F1B8000
trusted library allocation
page execute and read and write
4180000
heap
page read and write
6F40000
trusted library allocation
page read and write
238EA450000
trusted library allocation
page read and write
7FFD9B510000
trusted library allocation
page read and write
7EE13FE000
stack
page read and write
7FFD9B4A0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
263E000
stack
page read and write
6B4E000
stack
page read and write
24296A20000
heap
page read and write
217FC1A5000
heap
page read and write
7FFD9B540000
trusted library allocation
page execute and read and write
1E1B6317000
heap
page read and write
7EE12FE000
stack
page read and write
67F0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
1698012C000
trusted library allocation
page read and write
169F7806000
unkown
page readonly
7FFD9B476000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
2733000
trusted library allocation
page execute and read and write
67F0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
2178005B000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
7FFD9B2C2000
trusted library allocation
page read and write
217FC5A6000
heap
page read and write
67B5000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
7FFD9B4BA000
trusted library allocation
page read and write
16990001000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
6F44000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7EE383D000
stack
page read and write
21780934000
trusted library allocation
page read and write
EF97DFF000
stack
page read and write
67B0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
7FFD9B4D7000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
7FFD9B600000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
1CE7F550000
heap
page read and write
6F80000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
169F77F1000
unkown
page readonly
7FFD9B570000
trusted library allocation
page read and write
169F7840000
heap
page read and write
3AD000
stack
page read and write
6F80000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
2C8A000
heap
page read and write
6F80000
trusted library allocation
page read and write
2F0E000
stack
page read and write
7FFD9B480000
trusted library allocation
page read and write
27F3000
heap
page read and write
7FFD9B4D0000
trusted library allocation
page read and write
4DFA8FC000
stack
page read and write
6F80000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
2D55000
heap
page read and write
6F80000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
24C0510F000
trusted library allocation
page read and write
7EE333B000
stack
page read and write
67FC000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
4340000
trusted library allocation
page read and write
17B000
stack
page read and write
217FAE40000
trusted library allocation
page read and write
4700000
heap
page execute and read and write
7810FFE000
stack
page read and write
67B0000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
4B69000
trusted library allocation
page execute and read and write
19DB5A70000
heap
page read and write
67F0000
trusted library allocation
page read and write
4DFB0FB000
stack
page read and write
7FFD9B31C000
trusted library allocation
page execute and read and write
7FFD9B4C9000
trusted library allocation
page read and write
2760000
trusted library allocation
page read and write
7FFD9B4C0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
23880143000
trusted library allocation
page read and write
44D0000
heap
page read and write
6B0E000
stack
page read and write
7FFD9B2E0000
trusted library allocation
page read and write
7FFD9B560000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
7FFD9B2FD000
trusted library allocation
page execute and read and write
28AB000
heap
page read and write
7FFD9B510000
trusted library allocation
page execute and read and write
7FFD9B4D9000
trusted library allocation
page read and write
7EE2229000
stack
page read and write
788000
heap
page read and write
43DE000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
7FFD9B530000
trusted library allocation
page execute and read and write
78112FE000
stack
page read and write
67F3000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
24C1D926000
heap
page read and write
67D0000
trusted library allocation
page read and write
753E000
stack
page read and write
6F80000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
24C1D8BE000
unkown
page readonly
21790021000
trusted library allocation
page read and write
76F000
stack
page read and write
24C04FD0000
heap
page read and write
757C000
heap
page read and write
217806DC000
trusted library allocation
page read and write
19DB653C000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
CB7D9FE000
stack
page read and write
7FFD9B4A0000
trusted library allocation
page read and write
217FC5A3000
heap
page read and write
67F0000
trusted library allocation
page read and write
169F6740000
heap
page read and write
217807CC000
trusted library allocation
page read and write
169F6680000
unkown
page readonly
217801C9000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6EA08FE000
stack
page read and write
217FABE6000
heap
page read and write
6F80000
trusted library allocation
page read and write
6EA0CFD000
stack
page read and write
6F80000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
6F8E000
trusted library allocation
page read and write
169F77C7000
unkown
page readonly
660000
heap
page read and write
448E000
stack
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B4D0000
trusted library allocation
page read and write
70F0000
heap
page execute and read and write
7FFD9B49A000
trusted library allocation
page read and write
5A7E3FE000
stack
page read and write
67F0000
trusted library allocation
page read and write
6ACE000
stack
page read and write
7FFD9B530000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
67B5000
trusted library allocation
page read and write
7EE14FE000
stack
page read and write
45FE000
stack
page read and write
67F0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B3C6000
trusted library allocation
page execute and read and write
6FB0000
trusted library allocation
page execute and read and write
71BE000
stack
page read and write
7FFD9B4F0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
1CA8FD70000
heap
page read and write
72E000
stack
page read and write
7FFD9B4A8000
trusted library allocation
page read and write
7FFD9B310000
trusted library allocation
page read and write
217802A1000
trusted library allocation
page read and write
217FABFC000
heap
page read and write
23880155000
trusted library allocation
page read and write
2429720C000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
24C048D0000
heap
page read and write
7FFD9B300000
trusted library allocation
page read and write
6EA0BFE000
stack
page read and write
6F60000
trusted library allocation
page read and write
7FFD9B4AB000
trusted library allocation
page read and write
7FFD9B300000
trusted library allocation
page read and write
4330000
heap
page read and write
2178017C000
trusted library allocation
page read and write
2C60000
heap
page read and write
213E3A70000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
7FFD9B3C6000
trusted library allocation
page execute and read and write
438F000
trusted library allocation
page read and write
7FFD9B2B8000
trusted library allocation
page read and write
4BA0000
trusted library allocation
page read and write
4DFADFF000
stack
page read and write
4310000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
EF977FE000
stack
page read and write
6FA0000
trusted library allocation
page read and write
7FFD9B2ED000
trusted library allocation
page execute and read and write
466C000
trusted library allocation
page execute and read and write
4B3E000
stack
page read and write
6F60000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
7FFD9B46E000
trusted library allocation
page read and write
19DB5990000
heap
page read and write
5A7DBFE000
stack
page read and write
1E1D04D0000
heap
page read and write
6760000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
16980143000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
283C000
heap
page read and write
280D000
heap
page read and write
67B0000
trusted library allocation
page read and write
421E000
stack
page read and write
6F90000
trusted library allocation
page read and write
169F6FA0000
heap
page read and write
6F60000
trusted library allocation
page read and write
4DFACFE000
stack
page read and write
217FC22F000
heap
page read and write
6800000
trusted library allocation
page read and write
5BC5000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
7FFD9B4A2000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
1E1D0823000
heap
page read and write
169F784A000
heap
page read and write
7EE15FE000
stack
page read and write
217801E1000
trusted library allocation
page read and write
213F4261000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
217803E6000
trusted library allocation
page read and write
1E1D0830000
heap
page read and write
6800000
trusted library allocation
page read and write
2F30000
heap
page read and write
6F40000
trusted library allocation
page read and write
217800DF000
trusted library allocation
page read and write
43D3000
trusted library allocation
page read and write
7FFD9B410000
trusted library allocation
page execute and read and write
67F0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
7EE303E000
stack
page read and write
6F40000
trusted library allocation
page read and write
7FFD9B2E4000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
1CA8FD90000
heap
page read and write
7FFD9B304000
trusted library allocation
page read and write
2996000
heap
page read and write
6F80000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
7FFD9B520000
trusted library allocation
page read and write
1E1B7E00000
heap
page read and write
67B0000
trusted library allocation
page read and write
78110FE000
stack
page read and write
6F80000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B490000
trusted library allocation
page read and write
4DFABFE000
stack
page read and write
67D0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
24C1D9A7000
heap
page read and write
67F0000
trusted library allocation
page read and write
27B3000
trusted library allocation
page execute and read and write
24C1D87D000
unkown
page readonly
27D5000
heap
page read and write
7EE2D3D000
stack
page read and write
169F77C3000
unkown
page readonly
6F80000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
24C1D8BA000
unkown
page readonly
4B66000
trusted library allocation
page execute and read and write
6F80000
trusted library allocation
page read and write
7FFD9B496000
trusted library allocation
page read and write
282E000
stack
page read and write
213E39BD000
heap
page read and write
67F0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
19DB6565000
trusted library allocation
page read and write
BB2797E000
stack
page read and write
23FF000
stack
page read and write
7FFD9B500000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
1CE18E60000
heap
page execute and read and write
213E40B0000
heap
page read and write
67F0000
trusted library allocation
page read and write
4B4D000
trusted library allocation
page execute and read and write
6810000
trusted library allocation
page read and write
7FFD9B32C000
trusted library allocation
page execute and read and write
217FC602000
heap
page read and write
67D0000
trusted library allocation
page read and write
7EE1BBE000
unkown
page read and write
217FBCB0000
heap
page execute and read and write
24C1D89A000
unkown
page readonly
67D0000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
242AFA80000
heap
page execute and read and write
2423AA20000
heap
page read and write
6850000
remote allocation
page read and write
1CE7F7C5000
heap
page read and write
7FFD9B4C0000
trusted library allocation
page read and write
7FFD9B3D6000
trusted library allocation
page execute and read and write
24C1D8C0000
unkown
page readonly
4A10000
heap
page read and write
BB2787F000
stack
page read and write
2740000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6F81000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
169F67C1000
heap
page read and write
7FFD9B470000
trusted library allocation
page read and write
4DFB2FC000
stack
page read and write
442B000
trusted library allocation
page execute and read and write
7FFD9B2BD000
trusted library allocation
page execute and read and write
7FFD9B4C9000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
4300000
trusted library allocation
page read and write
21780998000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page read and write
242AF97D000
heap
page read and write
7FFD9B2D0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
5E5000
heap
page read and write
7FFD9B480000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
4391000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
7EE1829000
stack
page read and write
1CA8FE54000
heap
page read and write
6800000
trusted library allocation
page read and write
41EE000
stack
page read and write
2A48000
heap
page read and write
6F80000
trusted library allocation
page read and write
217801ED000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
1E1D0630000
heap
page execute and read and write
1E1B6265000
heap
page read and write
6FA0000
trusted library allocation
page read and write
4B40000
trusted library allocation
page read and write
7FFD9B2F4000
trusted library allocation
page read and write
217801E5000
trusted library allocation
page read and write
7FFD9B4E9000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
1CE18CF0000
heap
page read and write
67B0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
CB7DBFE000
stack
page read and write
1CE7F4A4000
heap
page read and write
1E1B7F8A000
trusted library allocation
page read and write
1698012F000
trusted library allocation
page read and write
1E1D0561000
heap
page read and write
67D0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
24296A40000
heap
page read and write
7FFD9B2E0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B2E4000
trusted library allocation
page read and write
7FFD9B510000
trusted library allocation
page execute and read and write
6800000
trusted library allocation
page read and write
4B50000
trusted library allocation
page read and write
7FFD9B2F2000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
213FC942000
heap
page read and write
6800000
trusted library allocation
page read and write
CB7DCFE000
stack
page read and write
6F60000
trusted library allocation
page read and write
7FFD9B314000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
2D4E000
heap
page read and write
238EAC80000
heap
page read and write
67F0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
21780170000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
7FFD9B46E000
trusted library allocation
page read and write
4CA2000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B4E0000
trusted library allocation
page execute and read and write
67B0000
trusted library allocation
page read and write
7FFD9B4C0000
trusted library allocation
page read and write
24C04F50000
unkown
page readonly
2429684B000
heap
page read and write
6EA05FD000
stack
page read and write
7FFD9B2B0000
trusted library allocation
page read and write
24C0501B000
trusted library allocation
page read and write
670EDFE000
stack
page read and write
7FFD9B3D6000
trusted library allocation
page execute and read and write
6F90000
trusted library allocation
page read and write
217FC14E000
heap
page read and write
700000
heap
page read and write
7FFD9B496000
trusted library allocation
page read and write
4B43000
trusted library allocation
page read and write
1CE10531000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
73FD000
stack
page read and write
1E1B6525000
heap
page read and write
4922000
trusted library allocation
page read and write
4394000
heap
page read and write
7FFD9B500000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
62F000
unkown
page read and write
2388003D000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
7FFD9B4F0000
trusted library allocation
page read and write
6F4C000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
2DB5000
heap
page read and write
217FC240000
heap
page read and write
6F80000
trusted library allocation
page read and write
4DFAFFC000
stack
page read and write
5BC1000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
2D56000
heap
page read and write
67D0000
trusted library allocation
page read and write
7FFD9B486000
trusted library allocation
page read and write
24C04900000
heap
page read and write
217803F0000
trusted library allocation
page read and write
7FFD9B5E0000
trusted library allocation
page read and write
7FFD9B2ED000
trusted library allocation
page execute and read and write
67D0000
trusted library allocation
page read and write
7FFD9B2CD000
trusted library allocation
page execute and read and write
6F80000
trusted library allocation
page read and write
4C85000
trusted library allocation
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B500000
trusted library allocation
page read and write
7FFD9B490000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
2178005D000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
19DC641D000
trusted library allocation
page read and write
1E1B64D0000
heap
page execute and read and write
6FA0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
217800C7000
trusted library allocation
page read and write
217801CD000
trusted library allocation
page read and write
58FF2FE000
stack
page read and write
67B0000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
24C1D934000
heap
page read and write
24C1D898000
unkown
page readonly
217FAD70000
heap
page read and write
67F0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
1CA8FE00000
trusted library allocation
page read and write
1E1D0573000
heap
page read and write
1E1B62FA000
heap
page read and write
EF978FE000
stack
page read and write
6F60000
trusted library allocation
page read and write
7FFD9B2E2000
trusted library allocation
page read and write
24C1D879000
unkown
page readonly
6F40000
trusted library allocation
page read and write
24296853000
heap
page read and write
7FFD9B5B0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B2DD000
trusted library allocation
page execute and read and write
7EE2829000
stack
page read and write
1CE7F4AA000
heap
page read and write
6F40000
trusted library allocation
page read and write
66C0000
trusted library allocation
page read and write
7FFD9B2BD000
trusted library allocation
page execute and read and write
67B0000
trusted library allocation
page read and write
213E437F000
trusted library allocation
page read and write
5C0000
heap
page read and write
67D0000
trusted library allocation
page read and write
1E1D053D000
heap
page read and write
6F80000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B2E8000
trusted library allocation
page read and write
29BB000
stack
page read and write
217FC18E000
heap
page read and write
4AFE000
stack
page read and write
7FFD9B370000
trusted library allocation
page execute and read and write
169F6730000
heap
page read and write
67D0000
trusted library allocation
page read and write
1CE00510000
heap
page read and write
213E4140000
heap
page execute and read and write
1CE7F3B0000
heap
page read and write
67F0000
trusted library allocation
page read and write
49CE000
stack
page read and write
6F60000
trusted library allocation
page read and write
7CA000
heap
page read and write
24296A00000
heap
page read and write
6F80000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
27EF000
stack
page read and write
6F40000
trusted library allocation
page read and write
7FFD9B4E0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B3A6000
trusted library allocation
page read and write
7FFD9B4C5000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
7FFD9B3B0000
trusted library allocation
page execute and read and write
6F40000
trusted library allocation
page read and write
24C04F40000
heap
page execute and read and write
67F0000
trusted library allocation
page read and write
1CA8FFD0000
heap
page read and write
67F0000
trusted library allocation
page read and write
43A0000
trusted library allocation
page read and write
42C4000
trusted library allocation
page read and write
2780000
trusted library allocation
page read and write
1E1B6440000
heap
page read and write
7FFD9B2C0000
trusted library allocation
page read and write
7EE2529000
stack
page read and write
47D000
stack
page read and write
6F40000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
7FFD9B480000
trusted library allocation
page read and write
416E000
stack
page read and write
7FFD9B304000
trusted library allocation
page read and write
4420000
trusted library allocation
page read and write
4C5B000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
213E39A3000
heap
page read and write
7FFD9B370000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
217FBBED000
heap
page read and write
6F80000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B520000
trusted library allocation
page execute and read and write
7FFD9B49D000
trusted library allocation
page read and write
5B54EFE000
stack
page read and write
66E0000
trusted library allocation
page read and write
7FFD9B3FB000
trusted library allocation
page execute and read and write
7FFD9B2E3000
trusted library allocation
page execute and read and write
217800E7000
trusted library allocation
page read and write
7EE3128000
stack
page read and write
5B557FE000
stack
page read and write
7FFD9B2F0000
trusted library allocation
page read and write
2178091A000
trusted library allocation
page read and write
955000
heap
page read and write
27CC000
heap
page read and write
169F69F5000
heap
page read and write
24C05135000
trusted library allocation
page read and write
19DB5D00000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
213E3986000
heap
page read and write
6F60000
trusted library allocation
page read and write
66F0000
heap
page execute and read and write
6F90000
trusted library allocation
page read and write
4650000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
24C1D889000
unkown
page readonly
7FFD9B4C0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
5B551FE000
stack
page read and write
27A0000
heap
page read and write
169F77BC000
unkown
page readonly
42F0000
heap
page read and write
6800000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
7FFD9B39C000
trusted library allocation
page execute and read and write
67F0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
2856000
heap
page read and write
6BCF000
stack
page read and write
44E0000
heap
page readonly
7810CFE000
stack
page read and write
6F60000
trusted library allocation
page read and write
67F1000
trusted library allocation
page read and write
217805C8000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7540000
heap
page read and write
4DFA6FE000
stack
page read and write
442C000
heap
page read and write
4422000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
6A2E000
stack
page read and write
6F80000
trusted library allocation
page read and write
19DCEB88000
heap
page read and write
6F40000
trusted library allocation
page read and write
EF979FE000
stack
page read and write
4320000
heap
page execute and read and write
67F0000
trusted library allocation
page read and write
43E4000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
7FFD9B2D2000
trusted library allocation
page read and write
7FFD9B4A0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
217FB36F000
heap
page read and write
294E000
stack
page read and write
670E7FE000
stack
page read and write
7FFD9B4A0000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
6EA02FE000
stack
page read and write
2423AA00000
heap
page read and write
6F90000
trusted library allocation
page read and write
7EE3228000
stack
page read and write
6810000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
CB7D5FE000
stack
page read and write
2178022E000
trusted library allocation
page read and write
1E1B60C0000
unkown
page readonly
6810000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
217FC146000
heap
page read and write
670E9FF000
stack
page read and write
67B0000
trusted library allocation
page read and write
7FFD9B410000
trusted library allocation
page execute and read and write
67F0000
trusted library allocation
page read and write
6BD0000
heap
page read and write
21780066000
trusted library allocation
page read and write
7FFD9B2C3000
trusted library allocation
page execute and read and write
24C1D92E000
heap
page read and write
67B0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
670E2FE000
stack
page read and write
169F78DF000
heap
page read and write
6F60000
trusted library allocation
page read and write
58FEEFF000
stack
page read and write
67B0000
trusted library allocation
page read and write
1E1B60C0000
unkown
page readonly
169F678D000
heap
page read and write
67F0000
trusted library allocation
page read and write
169F7839000
unkown
page readonly
6F80000
trusted library allocation
page read and write
21780172000
trusted library allocation
page read and write
24C1D95B000
heap
page read and write
6A8E000
stack
page read and write
67F0000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
213E4240000
heap
page execute and read and write
19DB5AEB000
heap
page read and write
7FFD9B2B3000
trusted library allocation
page execute and read and write
7B9000
heap
page read and write
7FFD9B4CD000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
6EA0DFF000
stack
page read and write
67D0000
trusted library allocation
page read and write
6FE0000
remote allocation
page read and write
67D0000
trusted library allocation
page read and write
2178091C000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
4DFB3FA000
stack
page read and write
6F80000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page read and write
24C1D915000
heap
page read and write
7FFD9B32C000
trusted library allocation
page execute and read and write
6F80000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
492B000
trusted library allocation
page execute and read and write
67D0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
4DFAEFC000
stack
page read and write
7FFD9B4A0000
trusted library allocation
page read and write
CB7D4FF000
stack
page read and write
6F80000
trusted library allocation
page read and write
4C53000
trusted library allocation
page read and write
2960000
heap
page read and write
7FFD9B3F0000
trusted library allocation
page execute and read and write
6F80000
trusted library allocation
page read and write
21780956000
trusted library allocation
page read and write
24C1D8D7000
unkown
page readonly
7FFD9B31B000
trusted library allocation
page execute and read and write
5345000
trusted library allocation
page read and write
24C04F30000
heap
page execute and read and write
1E1B7F88000
trusted library allocation
page read and write
2D1F000
heap
page read and write
21780411000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
1CE00675000
trusted library allocation
page read and write
58FE9E1000
stack
page read and write
7FFD9B500000
trusted library allocation
page execute and read and write
169F77C5000
unkown
page readonly
217801C1000
trusted library allocation
page read and write
7FFD9B2D3000
trusted library allocation
page execute and read and write
79B000
heap
page read and write
242A70F1000
trusted library allocation
page read and write
7FFD9B31D000
trusted library allocation
page execute and read and write
1CE00663000
trusted library allocation
page read and write
7FFD9B460000
trusted library allocation
page read and write
7FFD9B480000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
1E1D0670000
unkown
page readonly
6F90000
trusted library allocation
page read and write
7CF000
heap
page read and write
6F90000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
217FC3E0000
heap
page execute and read and write
4660000
trusted library allocation
page read and write
4890000
heap
page read and write
4DFAAFE000
stack
page read and write
6F60000
trusted library allocation
page read and write
7810DFE000
stack
page read and write
217806C8000
trusted library allocation
page read and write
24C1D86A000
unkown
page readonly
4DFB7FD000
stack
page read and write
217803F7000
trusted library allocation
page read and write
217FC0C3000
heap
page read and write
7EE2B3F000
stack
page read and write
1E1D0704000
unkown
page readonly
67F0000
trusted library allocation
page read and write
4C08000
trusted library allocation
page read and write
CB7D8FE000
stack
page read and write
217800D3000
trusted library allocation
page read and write
217803F3000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
24C048E0000
heap
page read and write
6F60000
trusted library allocation
page read and write
19DCEB5B000
heap
page read and write
6F80000
trusted library allocation
page read and write
2178009E000
trusted library allocation
page read and write
2D36000
heap
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B6C0000
trusted library allocation
page read and write
19DB5D25000
heap
page read and write
EF97BFE000
stack
page read and write
7FFD9B3E0000
trusted library allocation
page execute and read and write
67B0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7FFD9B2D4000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
7FFD9B476000
trusted library allocation
page read and write
5B553FE000
stack
page read and write
2965000
heap
page read and write
67F0000
trusted library allocation
page read and write
213E43A1000
trusted library allocation
page read and write
217FC4B2000
unkown
page readonly
6810000
trusted library allocation
page read and write
67F0000
trusted library allocation
page execute and read and write
CB7DAFE000
stack
page read and write
4600000
heap
page execute and read and write
CB7D7FF000
stack
page read and write
6F80000
trusted library allocation
page read and write
7FFD9B4A4000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
4DFB1FD000
stack
page read and write
67F0000
trusted library allocation
page read and write
45E0000
heap
page read and write
2CC4000
heap
page read and write
19DB5AED000
heap
page read and write
67B0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
242AF900000
heap
page read and write
6800000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
7FFD9B4F0000
trusted library allocation
page read and write
24C1D9C0000
heap
page read and write
71FF000
stack
page read and write
7FFD9B2E8000
trusted library allocation
page read and write
1E1B6331000
heap
page read and write
7FFD9B366000
trusted library allocation
page read and write
There are 2654 hidden memdumps, click here to show them.