IOC Report
5c13e6.msi

loading gif

Files

File Path
Type
Category
Malicious
5c13e6.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
initial sample
malicious
C:\Config.Msi\4c685e.rbs
data
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\BouncyCastle.Crypto.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\System.ValueTuple.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI6995.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSI6995.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI6BB9.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSI6BB9.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI82CC.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSI82CC.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI8742.tmp
data
dropped
malicious
C:\Windows\Installer\MSIA1A4.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSIA1A4.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\System32\InstallUtil.InstallLog
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Windows\Temp\~DF0301261F3F564947.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF1C46BEF5561279DD.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF6331E09D6B6BFB1B.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF6D201690A06C6388.TMP
data
dropped
malicious
C:\Windows\Temp\~DFBFB6DF824FA39372.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DFCC791DA1EF222C85.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallState
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation.zip
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.ini
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AteraAgent.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
CSV text
dropped
C:\Windows\Installer\4c685d.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\4c685f.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\MSI6995.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI6995.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI6995.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI6995.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI6BB9.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI6BB9.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI6BB9.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI6BB9.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI82CC.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI82CC.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI82CC.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI82CC.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI8753.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI87B1.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI88BC.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIA1A4.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSIA1A4.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIA1A4.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIA1A4.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SourceHash{E732A0D7-A2F2-4657-AC41-B19742648E45}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
Certificate, Version=3
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
Certificate, Version=3
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageAgentInformation.exe.log
CSV text
dropped
C:\Windows\Temp\~DF1DD50BE3AA73671A.TMP
data
dropped
C:\Windows\Temp\~DF524F10E4A4FD2AE6.TMP
data
dropped
C:\Windows\Temp\~DFD14943823E97DCCA.TMP
data
dropped
C:\Windows\Temp\~DFD29D1BC9A4077569.TMP
data
modified
C:\Windows\Temp\~DFEF9047CD7385056D.TMP
data
dropped
C:\Windows\Temp\~DFFC9EA6A74A351B98.TMP
data
dropped
\Device\ConDrv
JSON data
dropped
There are 69 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI6995.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5007890 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI6BB9.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5008359 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI82CC.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5014250 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
malicious
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 STOP AteraAgent
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="matteobianchini1965@autograf.pl" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000NxmUvIAJ" /AgentId="ff94aff6-2883-4c67-9794-e0ddc81d610f"
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSIA1A4.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5022156 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" ff94aff6-2883-4c67-9794-e0ddc81d610f "87885c4b-c98b-4114-8df6-f508dfdcbf5a" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000NxmUvIAJ
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" ff94aff6-2883-4c67-9794-e0ddc81d610f "81e73b14-e55c-40af-aa45-a29326f84cb3" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000NxmUvIAJ
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\5c13e6.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 6035F6485629B3656802BDCB68379B97
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 8C2A075FB1C9BFF9A65B59CB5274A31B E Global\MSI0000
C:\Windows\SysWOW64\net.exe
"NET" STOP AteraAgent
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
"TaskKill.exe" /f /im AteraAgent.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
"C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 11 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://ps.atera.com/agentpackagesmac/AgentPackageWindowsUpdate/24.6/AgentPackageWindowsUpdate.zip
unknown
https://agent-api.Pjv
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ff94aff6-2883-4c67-9794-e0ddc81d610f/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=d8be8b67-b9dc-4bd8-9f60-1df842ebee06&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
13.232.67.198
http://schemas.datacontract.org
unknown
http://crl.microsoft
unknown
https://agent-api.atera.com/Production/Agent/track-event
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=f8b53c58-e2e7-4a77-a6fb-ccd81bb3df54
unknown
http://dl.google.com/googletalk/googletalk-setup.exe
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ff94aff6-2883-4c67-9794-e0ddc81d610f/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=c7e4c087-67a4-410d-b929-654d988ae41f&tr=31&tt=17327967212159752&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
13.232.67.198
https://agent-api.PR
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageADRemote/6.0/AgentPackageADRemote.zip
unknown
https://agent-api.atera.com/Production/Agent/AgentStartingB
unknown
https://agent-api.atera.com/Production/Agent/
unknown
http://schemas.datacontract.org/2004/07/System.ServiceProcess
unknown
http://wixtoolset.org
unknown
https://agent-api.atera.com/Production
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=bc48e4ab-59d5-4385-9ebb-6bdf934e8e43
unknown
https://ps.atera.com/agentpackagesmac/Agent.Package.Watchdog/1.7/Agent.Pac
unknown
https://agent-api.atera.com/Production/Agent/GetCommandsFallback0
unknown
https://agent-api.atera.com/Production/Agent/track-event;
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ff94aff6-2883-4c67-9794-e0ddc81d610f/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=31245592-ca57-413a-838a-25566e4ba460&tr=31&tt=17327967212159752&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
13.232.67.198
https://ps.atera.com/agentpackageswin/AgentPackageRuntimeInstaller/13.0/AgentPackageRuntimeInstaller
unknown
http://acontrol.atera.com/
unknown
https://agent-api.atera.com/Production/Agent/AgentStarting)
unknown
https://ps.pndsn.com
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=cf670f90-2c48-42f2-8c3d-1518a12474cf&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
13.232.67.199
https://ps.atera.com/agentpackagesnet45/AgentPackageADRemote/6.0/AgentPackageADRemote.zip
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ff94aff6
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageNetworkDiscovery/23.9/AgentPackageNetworkDiscove
unknown
https://agent-api.P(
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=bb8be473-c9e0-49d3-afb3-ff89cc2038f2&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
13.232.67.198
http://agent-api.atera.com
unknown
https://ps.atera.com/agentpackageswin/AgentPackageTaskSchedul
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=d1a4fa35-d7fa-4da0-99b6-08c62f57c171
unknown
https://agent-api.atera.com/Production/Agent/GetRecurrin
unknown
http://schemas.datacontract.org/2004/07/
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ff94aff6-2883-4c67-9794-e0ddc81d610f/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=363c6e5c-519b-49a4-bb28-3c290a721f04&tt=0&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
13.232.67.198
https://github.com/icsharpcode/SharpZipLib
unknown
https://ps.atera.com/agentpackageswin/AgentPackageNetworkDiscovery/15.0/AgentPackageNetworkDiscovery
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ff94aff6-2883-4c67-9794-e0ddc81d610f/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=a543e4d2-478c-4637-a32f-01e5c1d96820&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
13.232.67.198
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageAgentI
unknown
https://ps.atera.com/agentpackagesnet45/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
unknown
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageTaskScheduler/17.2/AgentPackageTaskScheduler.zip
unknown
https://agent-api.atera.com
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ff94aff6-2883-4c67-9794
unknown
https://agent-api.atera.com/Production/Agent/AgentStarting
unknown
https://agent-api.atera.com/Production/Agent/AgentStartingX7.
unknown
https://agent-api.atera.com/Production/Agent/GetCommandsFallback2/
unknown
http://www.w3.oh
unknown
https://agent-api.atera.com/Production/Agent/GetCommands
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=fe0f6a4a-994b-4250-bc9b-b5822a0b9625&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
13.232.67.198
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=cf670f90-2c48-42f2-8c3d-1518a12474cf
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=e1b9fd91-c306-4290-9b3f-369d7c5c009e
unknown
https://agent-api.atera.com/
unknown
https://agent-api.atera.com/Production/Agent/GetRecurringPackages
unknown
https://ps.atera.com/agentpackageswin/Agent.Package.Availability/13.0/Agent.Package.Availability.zip
unknown
https://www.newtonsoft.com/jsonschema
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=f452f05c-24ab-44c2-90a0-e6c8fdaa9194
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageRuntimeInstaller/1.5/AgentPackageRuntimeInstaller.
unknown
https://ps.atera.com/agentpackageswin/Agent.Package.Watchdog/13.0/Agent.Package.Watchdog.zip
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ff94aff6-2883-4c67-9794-e0ddc81d610f/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=6eac0c19-ed81-4142-86ce-d4bfe2f9e3ff&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
13.232.67.198
https://ps.atera.com/agentpackagesnet45/AgentPackageWindowsUpdate/24.6/AgentPa
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=0180680e-e6cb-400e-83d6-3808eb668088&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
13.232.67.198
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=0180680e-e6cb-400e-83d6-3808eb668088
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=ba6a13f1-ebc9-4a1b-b6ac-2f0177a0d113&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
13.232.67.198
https://ps.atera.com/agentpackagesnet45/Agent.Package.Availability/0.16/Agent.Package.Availability.z
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=377417ee-b208-4922-a278-778329313858
unknown
https://agent-api.atera.com/Production/Agent/GetRecurringPackagesnection
unknown
https://ps.atera.com/agentpackagesmac/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
unknown
https://ps.atera.com/agentpackagesnet45/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=c1235ff2-1096-4bcd-b42c-92f552aac0b4&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
13.232.67.198
https://ps.atera.com/agentpackagesmac/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ff94aff6-2883-4c67-9794-e0ddc81d610f/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=98770db9-b9c5-40a7-84a7-ea720f9b7aa0&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
13.232.67.198
https://agent-api.atera.com/Production/Agent/GetRecurringPackagesnterval
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ff94aff6-2883-4c67-9794-e0ddc81d610f/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=78d5a8c0-6e60-43a1-8c43-b430a42d1135&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
13.232.67.198
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ff94aff6-2883-4c67-9794-e0ddc81d610f/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=5217d3d2-da87-42e8-9726-56daff914c54&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
13.232.67.198
https://www.newtonsoft.com/json
unknown
https://agent-api.atera.com/Production/Agent/Age
unknown
http://wixtoolset.org/news/
unknown
https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageWindowsUpdate/24.6/A
unknown
https://ps.atera.com/agentpackageswin/AgentPackageAgentInformation/22.7/AgentPackageAgentInformation
unknown
https://agent-api.aterD
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageNetworkDiscovery/13.0/AgentPackageNetworkDiscovery
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=ba6a13f1-ebc9-4a1b-b6ac-2f0177a0d113
unknown
https://ps.atera.com/agentpackageswin/Agent.Package.IotPoc/13.0/Agent.Package.IotPoc.zip
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageTaskScheduler/13.0/AgentPackageTaskScheduler.zip
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageAgentInformation/38.0/AgentPackageAgentInformation
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ff94aff6-2883-4c67-9794-e0ddc81d610f/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=cad12679-119f-4810-9e43-100014c76ca9&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
13.232.67.198
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=ac4fb316-6088-4f09-94da-3e83236acc31&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
13.232.67.198
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ff94aff6-2883-4c67-9794-e0ddc81d610f/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=914d5960-15b7-4468-88cf-9462e85c2124&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
13.232.67.198
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ff94aff6-2883-4c67-9794-e0ddc81d610f/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=d4bd921a-933d-426f-b266-ff3906eda0dc&tt=0&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
13.232.67.198
https://agent-api.P
unknown
http://www.w3.o
unknown
https://ps.atera.com
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=79b0f33b-8550-42a3-8fa1-b61745ab84d2&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
13.232.67.198
https://ps.atera.com/agentpackagesnet45/AgentPackageAgentInformation/38.0/AgentPackageAgentInformati
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=329cd285-2dd4-4cef-8f0f-afb56ab5caec&uuid=ff94aff6-2883-4c67-9794-e0ddc81d610f
13.232.67.198
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ps.pndsn.com
13.232.67.198
bg.microsoft.map.fastly.net
199.232.214.172
d25btwd9wax8gu.cloudfront.net
108.158.75.4
fp2e7a.wpc.phicdn.net
192.229.221.95
ps.atera.com
unknown
agent-api.atera.com
unknown

IPs

IP
Domain
Country
Malicious
108.158.75.4
d25btwd9wax8gu.cloudfront.net
United States
13.232.67.198
ps.pndsn.com
United States
13.232.67.199
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\4c685e.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\4c685e.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB9EFD7FDAF9AD115987000E181661F5
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CD868C8CE5A308147ABB306D829266BC
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C32B8CE0327C1E141950B4C9C2AD4DA7
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D9B1B1F0B1FC024D9390FE4B94D97D5
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\007F59F54ACD08842B2D98A10E6D1E3A
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB25C26F7C51D3C4AA2BED5600F46956
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01010F83113E72A4C81AD77422D2F947
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01D9DC4B27DFC0340B543A11D3CEBE07
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\ATERA Networks\AteraAgent\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\ATERA Networks\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\7D0A237E2F2A7564CA141B792446E854
INSTALLFOLDER_files_Feature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Features
INSTALLFOLDER_files_Feature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
AutoBackupLogFiles
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AteraAgent
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
AccountId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
IntegratorLogin
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
CompanyId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
AgentId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
ServerName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AlphaAgent
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
FileDirectory
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_USERS.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
FileDirectory
There are 137 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
25EA6E78000
heap
page read and write
malicious
2B021B22000
trusted library allocation
page read and write
malicious
163451AD000
heap
page read and write
malicious
47B6000
heap
page read and write
malicious
24980073000
trusted library allocation
page read and write
malicious
1634595D000
trusted library allocation
page read and write
malicious
2B021AA2000
trusted library allocation
page read and write
malicious
249FF0A2000
unkown
page readonly
malicious
163451FB000
heap
page read and write
malicious
25EA6E35000
heap
page read and write
malicious
2B01FEA2000
unkown
page readonly
malicious
5071000
trusted library allocation
page read and write
malicious
1635E6AD000
heap
page read and write
malicious
249FF2CC000
heap
page read and write
malicious
25EA7601000
trusted library allocation
page read and write
malicious
163450A0000
heap
page read and write
malicious
2B01FF70000
heap
page read and write
malicious
50E1000
trusted library allocation
page read and write
malicious
2B020026000
heap
page read and write
malicious
4E59000
heap
page read and write
malicious
5114000
trusted library allocation
page read and write
malicious
2B021A79000
trusted library allocation
page read and write
malicious
25EA6E0B000
heap
page read and write
malicious
2B03A590000
heap
page read and write
malicious
2B021B56000
trusted library allocation
page read and write
malicious
25EA7673000
trusted library allocation
page read and write
malicious
2B020020000
heap
page read and write
malicious
2B020040000
heap
page read and write
malicious
2B021B6C000
trusted library allocation
page read and write
malicious
25EA7647000
trusted library allocation
page read and write
malicious
25EA6DF8000
heap
page read and write
malicious
2B02006E000
heap
page read and write
malicious
25EA6E2D000
heap
page read and write
malicious
5187000
trusted library allocation
page read and write
malicious
1635E68B000
heap
page read and write
malicious
25EA6F90000
heap
page read and write
malicious
249FF2A0000
heap
page read and write
malicious
7FFD9B494000
trusted library allocation
page read and write
malicious
5DF3B15000
stack
page read and write
malicious
2B03A5B7000
heap
page read and write
malicious
2B03A5E3000
heap
page read and write
malicious
25EA7683000
trusted library allocation
page read and write
malicious
249FF300000
heap
page read and write
malicious
2B021AB9000
trusted library allocation
page read and write
malicious
249FF2C0000
heap
page read and write
malicious
24980001000
trusted library allocation
page read and write
malicious
2B021A7C000
trusted library allocation
page read and write
malicious
25EA6DF0000
heap
page read and write
malicious
249FF34C000
heap
page read and write
malicious
490A000
heap
page read and write
malicious
163454B0000
heap
page read and write
malicious
25EA7532000
unkown
page readonly
malicious
163451CD000
heap
page read and write
malicious
2B01FFE0000
heap
page read and write
malicious
2B021AA4000
trusted library allocation
page read and write
malicious
4F45000
heap
page read and write
malicious
25EBFD89000
heap
page read and write
malicious
2B0219F1000
trusted library allocation
page read and write
malicious
16345EBF000
trusted library allocation
page read and write
malicious
1635E670000
heap
page read and write
malicious
24980083000
trusted library allocation
page read and write
malicious
2B021AAA000
trusted library allocation
page read and write
malicious
249FF307000
heap
page read and write
malicious
163458F1000
trusted library allocation
page read and write
malicious
25EA76BF000
trusted library allocation
page read and write
malicious
16345170000
heap
page read and write
malicious
2B01FFE6000
heap
page read and write
malicious
25EBFD1A000
unkown
page readonly
74A0000
trusted library allocation
page read and write
7BB000
stack
page read and write
16345EEB000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
16355903000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
5DF5DE9000
stack
page read and write
74F0000
trusted library allocation
page read and write
7FFD9B4C0000
trusted library allocation
page read and write
249FFB14000
unkown
page readonly
7540000
trusted library allocation
page read and write
24990011000
trusted library allocation
page read and write
4FBC000
stack
page read and write
324A000
heap
page read and write
2B021B6A000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
7FFD9B4D0000
trusted library allocation
page read and write
7FFD9B520000
trusted library allocation
page execute and read and write
7FFD9B680000
trusted library allocation
page read and write
3350000
heap
page read and write
163450B0000
heap
page read and write
2B03A27B000
heap
page read and write
74F0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7406000
trusted library allocation
page execute and read and write
74D0000
trusted library allocation
page read and write
16345952000
trusted library allocation
page read and write
16345B08000
trusted library allocation
page read and write
25EA763F000
trusted library allocation
page read and write
775D000
stack
page read and write
485D000
stack
page read and write
7540000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
2FA9000
heap
page read and write
779D000
stack
page read and write
74F0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
2DC0000
heap
page read and write
7550000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
25EA6E33000
heap
page read and write
16345B0A000
trusted library allocation
page read and write
16345B3A000
trusted library allocation
page read and write
34E5000
heap
page read and write
47DE000
stack
page read and write
7550000
trusted library allocation
page read and write
32F2000
heap
page read and write
7520000
trusted library allocation
page read and write
7FF4D8FF0000
trusted library allocation
page execute and read and write
51CA000
trusted library allocation
page read and write
249FF3D0000
trusted library allocation
page read and write
5DF5FEC000
stack
page read and write
74E0000
trusted library allocation
page read and write
493B000
heap
page read and write
24998421000
heap
page read and write
7560000
trusted library allocation
page read and write
1635E2E5000
heap
page read and write
3250000
heap
page read and write
4D43000
trusted library allocation
page execute and read and write
74E0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
25EBFDC1000
heap
page read and write
7FFD9B510000
trusted library allocation
page read and write
24990001000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
163451B9000
heap
page read and write
91E000
stack
page read and write
B3E93FE000
stack
page read and write
C12000
heap
page read and write
2B03A5CA000
heap
page read and write
74F0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7FFD9B300000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
7FFD9B4D0000
trusted library allocation
page execute and read and write
287BED50000
heap
page read and write
74E1000
trusted library allocation
page read and write
249FFAFD000
unkown
page readonly
74E0000
trusted library allocation
page read and write
1635E9B2000
unkown
page readonly
7540000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
2F80000
heap
page read and write
2F8A000
heap
page read and write
3574000
heap
page read and write
4894000
trusted library allocation
page read and write
16345D39000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
32CE000
stack
page read and write
74F0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
7FFD9B490000
trusted library allocation
page read and write
16345D31000
trusted library allocation
page read and write
16345995000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
1635EADC000
heap
page read and write
2F7D000
heap
page read and write
74E0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7FFD9B4D0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
16345D93000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
5DF5AE9000
stack
page read and write
DC164FC000
stack
page read and write
7FFD9B4C0000
trusted library allocation
page execute and read and write
7540000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
512F000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
EE2A3EF000
stack
page read and write
7FFD9B4E0000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
25EA763D000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
16345A78000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
163459B7000
trusted library allocation
page read and write
2B01FF50000
heap
page read and write
74E0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
16345A99000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
7FFD9B550000
trusted library allocation
page read and write
2B03A5A4000
heap
page read and write
2F89000
heap
page read and write
16345C1A000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
3220000
heap
page read and write
7540000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7FFD9B390000
trusted library allocation
page execute and read and write
5DF6BEC000
stack
page read and write
74F0000
trusted library allocation
page read and write
970000
heap
page read and write
5DF76F8000
stack
page read and write
50B3000
trusted library allocation
page read and write
704E000
stack
page read and write
321E000
stack
page read and write
7540000
trusted library allocation
page read and write
4CDF000
stack
page read and write
7540000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
25EBFE02000
heap
page read and write
1635E846000
heap
page read and write
2E90000
heap
page read and write
7550000
trusted library allocation
page read and write
7450000
trusted library allocation
page read and write
4BF0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
249FF2A5000
heap
page read and write
16346246000
trusted library allocation
page read and write
16345E5D000
trusted library allocation
page read and write
5050000
trusted library allocation
page read and write
5DF53E9000
stack
page read and write
7540000
trusted library allocation
page read and write
16345E23000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
5DF56E9000
stack
page read and write
249FF250000
heap
page read and write
5DF79FD000
stack
page read and write
74C0000
trusted library allocation
page read and write
249FF460000
heap
page read and write
5DF77ED000
stack
page read and write
765E000
stack
page read and write
74E0000
trusted library allocation
page read and write
1635E6EF000
heap
page read and write
74E1000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
2FAB000
heap
page read and write
4BD0000
trusted library allocation
page execute and read and write
25EA6E3B000
heap
page read and write
74C0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
16345AA1000
trusted library allocation
page read and write
4940000
trusted library allocation
page read and write
7FFD9B520000
trusted library allocation
page execute and read and write
74E0000
trusted library allocation
page read and write
2B03A5BC000
heap
page read and write
249FFAE8000
unkown
page readonly
7500000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
25EBFD45000
unkown
page readonly
74E0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
16345E75000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
779F000
stack
page read and write
7540000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7A6B000
heap
page read and write
7504000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
BB3000
heap
page read and write
7540000
trusted library allocation
page read and write
34E5000
heap
page read and write
7463000
trusted library allocation
page read and write
5C25000
trusted library allocation
page read and write
2F99000
heap
page read and write
163458E0000
heap
page read and write
7FFD9B5F0000
trusted library allocation
page read and write
5184000
trusted library allocation
page read and write
2F7F000
stack
page read and write
16345A90000
trusted library allocation
page read and write
16345B35000
trusted library allocation
page read and write
7FFD9B556000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
795D000
stack
page read and write
74F0000
trusted library allocation
page read and write
25EA6E18000
heap
page read and write
70CF000
stack
page read and write
74F0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
7FC68000
trusted library allocation
page execute and read and write
74B0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
2E5E000
heap
page read and write
4950000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
331E000
stack
page read and write
74E0000
trusted library allocation
page read and write
163462E0000
trusted library allocation
page read and write
D00000
heap
page read and write
74A0000
trusted library allocation
page read and write
4B00000
trusted library allocation
page read and write
163459AC000
trusted library allocation
page read and write
2B01FFD5000
heap
page read and write
74A0000
trusted library allocation
page read and write
1635EAAC000
heap
page read and write
74E0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7FFD9B496000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
4DA4000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
5152000
trusted library allocation
page read and write
5DF4BEA000
stack
page read and write
74F0000
trusted library allocation
page read and write
7FFD9B380000
trusted library allocation
page read and write
7FFD9B530000
trusted library allocation
page execute and read and write
7520000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
5DF57F7000
stack
page read and write
7520000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7FFD9B2E2000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7FFD9B480000
trusted library allocation
page read and write
49B0000
heap
page execute and read and write
74E0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
4D50000
heap
page read and write
16345A9D000
trusted library allocation
page read and write
7FFD9B30B000
trusted library allocation
page execute and read and write
7520000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7FFD9B480000
trusted library allocation
page read and write
249FF303000
heap
page read and write
74E0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
163459CB000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
25EA772F000
trusted library allocation
page read and write
5DF75EC000
stack
page read and write
7FFD9B590000
trusted library allocation
page read and write
16346242000
trusted library allocation
page read and write
4980000
trusted library allocation
page read and write
3280000
heap
page read and write
163558FE000
trusted library allocation
page read and write
163451AB000
heap
page read and write
74A0000
trusted library allocation
page read and write
16345D3B000
trusted library allocation
page read and write
16345EF7000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
25EA7548000
unkown
page readonly
7520000
trusted library allocation
page read and write
25EB7611000
trusted library allocation
page read and write
16345E71000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7FFD9B4C0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
4F76000
heap
page read and write
3210000
heap
page read and write
74F0000
trusted library allocation
page read and write
7FFD9B386000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
25EA6F10000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
2B03A3F2000
unkown
page readonly
74F0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
DC15BFE000
stack
page read and write
EE2A6FF000
stack
page read and write
74F0000
trusted library allocation
page read and write
2B021B68000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
7FFD9B30D000
trusted library allocation
page execute and read and write
74F0000
trusted library allocation
page read and write
700E000
stack
page read and write
DC16EFB000
stack
page read and write
7FFD9B500000
trusted library allocation
page execute and read and write
74C0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
1635E747000
heap
page read and write
163459D7000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
7A9E000
stack
page read and write
4C21000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
1635E74F000
heap
page read and write
7ADF000
heap
page read and write
B3E8DFF000
stack
page read and write
4AAC000
stack
page read and write
7540000
trusted library allocation
page read and write
795E000
stack
page read and write
7560000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
2DF2000
heap
page read and write
7F608000
trusted library allocation
page execute and read and write
7520000
trusted library allocation
page read and write
249FFB1A000
unkown
page readonly
74A0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
7FFD9B4D5000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
74FC000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7FFD9B4B0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
5DF46E9000
stack
page read and write
2499840A000
heap
page read and write
7540000
trusted library allocation
page read and write
249FFBE0000
heap
page execute and read and write
BB449FD000
stack
page read and write
A70000
heap
page read and write
25EA75C0000
heap
page execute and read and write
4DA3000
trusted library allocation
page execute and read and write
4DF0000
trusted library allocation
page read and write
B3E95FF000
stack
page read and write
2B020032000
heap
page read and write
7540000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
96E000
stack
page read and write
5DF5EEC000
stack
page read and write
8D0000
heap
page read and write
7490000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
25EA6F30000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
4E8A000
heap
page read and write
C0D000
unkown
page read and write
74C0000
trusted library allocation
page read and write
4BE0000
trusted library allocation
page read and write
59C5000
trusted library allocation
page read and write
249FFB18000
unkown
page readonly
74A9000
trusted library allocation
page read and write
25EBFD70000
heap
page read and write
16345EE1000
trusted library allocation
page read and write
7FFD9B49D000
trusted library allocation
page read and write
4980000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
7FFD9B5C0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
1635E7D1000
heap
page read and write
74E0000
trusted library allocation
page read and write
4D44000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
249FFB22000
unkown
page readonly
74E0000
trusted library allocation
page read and write
DC16CFD000
stack
page read and write
7540000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
4EF0000
heap
page execute and read and write
7540000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
50CD000
trusted library allocation
page read and write
2B0201B0000
heap
page read and write
517B000
trusted library allocation
page read and write
249FFAA0000
unkown
page readonly
7403000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
1635E738000
heap
page read and write
5DF40FE000
stack
page read and write
7540000
trusted library allocation
page read and write
4A30000
heap
page read and write
7FFD9B495000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
1635EAD1000
heap
page read and write
7FFD9B4F0000
trusted library allocation
page read and write
5128000
trusted library allocation
page read and write
3358000
heap
page read and write
74E0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
16345CDD000
trusted library allocation
page read and write
25EBFD37000
unkown
page readonly
7560000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
2FB0000
heap
page read and write
31DF000
stack
page read and write
1634629E000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
1635E3A0000
heap
page read and write
74E0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
34C2000
heap
page read and write
74F0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
16345F59000
trusted library allocation
page read and write
74EC000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
BB44DFF000
stack
page read and write
1635E855000
heap
page read and write
7560000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74F5000
trusted library allocation
page read and write
1634624A000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
1635E836000
heap
page read and write
2EEF000
stack
page read and write
7520000
trusted library allocation
page read and write
7FFD9B520000
trusted library allocation
page read and write
BC3000
heap
page read and write
771E000
stack
page read and write
BB44CFE000
stack
page read and write
4F80000
heap
page read and write
74A0000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
2F47000
stack
page read and write
74A0000
trusted library allocation
page read and write
1635E6FB000
heap
page read and write
74E0000
trusted library allocation
page read and write
1634623D000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
4C9E000
stack
page read and write
2DE4000
heap
page read and write
7550000
trusted library allocation
page read and write
24980143000
trusted library allocation
page read and write
6075000
trusted library allocation
page read and write
163459CF000
trusted library allocation
page read and write
16345410000
trusted library allocation
page read and write
2B01FFA0000
heap
page read and write
7FFD9B3F0000
trusted library allocation
page execute and read and write
74E0000
trusted library allocation
page read and write
24980151000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
B3E96FD000
stack
page read and write
7FFD9B39C000
trusted library allocation
page execute and read and write
2498012F000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
343E000
stack
page read and write
74E0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
5DF72E8000
stack
page read and write
25EBFD3B000
unkown
page readonly
7540000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
1635E250000
heap
page execute and read and write
7466000
trusted library allocation
page execute and read and write
74C0000
trusted library allocation
page read and write
249983EB000
heap
page read and write
7FFD9B380000
trusted library allocation
page read and write
7570000
trusted library allocation
page execute and read and write
25EBFD75000
heap
page read and write
4930000
heap
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
DC15FFE000
stack
page read and write
287BEAE0000
heap
page read and write
74C0000
trusted library allocation
page read and write
7EE20000
trusted library allocation
page execute and read and write
74F0000
trusted library allocation
page read and write
25EBFD18000
unkown
page readonly
7540000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
B90000
heap
page read and write
2B01FEA0000
unkown
page readonly
249FFAFB000
unkown
page readonly
1635EAA0000
heap
page read and write
2E64000
heap
page read and write
3286000
heap
page read and write
4AEE000
stack
page read and write
361F000
stack
page read and write
7580000
trusted library allocation
page read and write
24998360000
heap
page read and write
7500000
trusted library allocation
page read and write
1635E803000
heap
page read and write
7520000
trusted library allocation
page read and write
2FA6000
heap
page read and write
7540000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
2E10000
heap
page read and write
7FFD9B3A0000
trusted library allocation
page execute and read and write
3279000
heap
page read and write
2B021980000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
7EE38000
trusted library allocation
page execute and read and write
2FB0000
heap
page read and write
4CF0000
heap
page read and write
47F0000
heap
page readonly
16345A74000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
7FFD9B2FD000
trusted library allocation
page execute and read and write
7540000
trusted library allocation
page read and write
8C0000
heap
page read and write
4E72000
trusted library allocation
page read and write
5DF7FF7000
stack
page read and write
7FFD9B6A0000
trusted library allocation
page read and write
16345EF3000
trusted library allocation
page read and write
2B03A2E0000
heap
page execute and read and write
249FFAD3000
unkown
page readonly
1635D8F0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
2B03A2B1000
heap
page read and write
5DF58E8000
stack
page read and write
5DF6EEC000
stack
page read and write
5DF3B5F000
stack
page read and write
16345A60000
trusted library allocation
page read and write
7060000
heap
page read and write
7FFD9B530000
trusted library allocation
page execute and read and write
7FFD9B4A6000
trusted library allocation
page read and write
2B0219E0000
heap
page execute and read and write
7520000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
4954000
trusted library allocation
page read and write
B3E92FE000
stack
page read and write
16345155000
heap
page read and write
7540000
trusted library allocation
page read and write
163450F0000
heap
page read and write
5DF71EB000
stack
page read and write
5DF66EC000
stack
page read and write
25EA6DC0000
heap
page read and write
16345423000
trusted library allocation
page read and write
16345D37000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
4880000
heap
page read and write
7540000
trusted library allocation
page read and write
2B0319FF000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
4F90000
heap
page readonly
6071000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page execute and read and write
25EB7601000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
2B02001E000
heap
page read and write
74E0000
trusted library allocation
page read and write
5DF68EC000
stack
page read and write
7520000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
16345A6C000
trusted library allocation
page read and write
7FFD9B3C6000
trusted library allocation
page execute and read and write
74A4000
trusted library allocation
page read and write
3579000
heap
page read and write
7540000
trusted library allocation
page read and write
2B01FFD0000
heap
page read and write
7FFD9B2FB000
trusted library allocation
page execute and read and write
7FFD9B4A0000
trusted library allocation
page read and write
2F9D000
stack
page read and write
3645000
heap
page read and write
7FFD9B560000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
2F3E000
stack
page read and write
D4E000
stack
page read and write
7FFD9B304000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
76DE000
stack
page read and write
2E05000
heap
page read and write
7520000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
74F4000
trusted library allocation
page read and write
2B0219A0000
trusted library allocation
page read and write
DC16BFC000
stack
page read and write
74E0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
16345B3E000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
5DF49FD000
stack
page read and write
25EA75A0000
heap
page execute and read and write
74C0000
trusted library allocation
page read and write
7541000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
5040000
trusted library allocation
page execute and read and write
74F0000
trusted library allocation
page read and write
249983E1000
heap
page read and write
74F0000
trusted library allocation
page read and write
3574000
heap
page read and write
7540000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
B3E8EFE000
stack
page read and write
7540000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
48EE000
stack
page read and write
60E5000
trusted library allocation
page read and write
B3E8FFD000
stack
page read and write
1635E472000
unkown
page readonly
74F0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
7540000
remote allocation
page read and write
74E0000
trusted library allocation
page read and write
163459D3000
trusted library allocation
page read and write
7430000
heap
page execute and read and write
74A0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
1635E6EB000
heap
page read and write
1634518B000
heap
page read and write
5DF6AEC000
stack
page read and write
2FAC000
heap
page read and write
74E0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7FFD9B386000
trusted library allocation
page read and write
25EBFD1C000
unkown
page readonly
DC16DFD000
stack
page read and write
74F0000
trusted library allocation
page read and write
5DF5BEC000
stack
page read and write
16345E55000
trusted library allocation
page read and write
B3E94FE000
stack
page read and write
5DF61EC000
stack
page read and write
16345EE3000
trusted library allocation
page read and write
7FFD9B600000
trusted library allocation
page execute and read and write
2B021B62000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
33A0000
heap
page read and write
7520000
trusted library allocation
page read and write
7FFD9B400000
trusted library allocation
page execute and read and write
163462CE000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
32DE000
stack
page read and write
7FFD9B510000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7F8000
stack
page read and write
3220000
heap
page read and write
7A90000
heap
page read and write
249FF3F0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
24980155000
trusted library allocation
page read and write
163451AF000
heap
page read and write
74C0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
1635E9B0000
unkown
page readonly
74E0000
trusted library allocation
page read and write
2DEC000
heap
page read and write
16345F55000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
4F00000
trusted library allocation
page execute and read and write
74A0000
trusted library allocation
page read and write
249FF0CC000
unkown
page readonly
DC15AF5000
stack
page read and write
7520000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
16355911000
trusted library allocation
page read and write
5DF63E9000
stack
page read and write
74F0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
2F05000
heap
page read and write
74A0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
B3E89D1000
stack
page read and write
7520000
trusted library allocation
page read and write
5141000
trusted library allocation
page read and write
7FFD9B2FD000
trusted library allocation
page execute and read and write
74E0000
trusted library allocation
page read and write
16346248000
trusted library allocation
page read and write
2B03A5A0000
heap
page read and write
7540000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7AA0000
heap
page read and write
7520000
trusted library allocation
page read and write
B3E97FE000
stack
page read and write
74E0000
trusted library allocation
page read and write
16345150000
heap
page read and write
5053000
trusted library allocation
page read and write
25EBFD47000
unkown
page readonly
7FFD9B49E000
trusted library allocation
page read and write
4EDE000
stack
page read and write
74F0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
5DF73EC000
stack
page read and write
74C0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
B3E91FE000
stack
page read and write
74F0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page execute and read and write
2B03A2AC000
heap
page read and write
51C6000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
4DD2000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
4FFC000
stack
page read and write
2B03A285000
heap
page read and write
74E0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
C7E000
unkown
page read and write
7FFD9B304000
trusted library allocation
page read and write
1635E710000
heap
page read and write
74A0000
trusted library allocation
page read and write
7FFD9B48D000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
2B03A5AF000
heap
page read and write
4DD5000
trusted library allocation
page execute and read and write
7540000
trusted library allocation
page read and write
5DF64EC000
stack
page read and write
74E0000
trusted library allocation
page read and write
5DF5CE9000
stack
page read and write
249FFAE6000
unkown
page readonly
74F9000
trusted library allocation
page read and write
7FFD9B470000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
2B03A5A6000
heap
page read and write
7550000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
5DF47E9000
stack
page read and write
74A0000
trusted library allocation
page read and write
BD7000
heap
page read and write
7540000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
509E000
stack
page read and write
7540000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
4D30000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7FFD9B2D0000
trusted library allocation
page read and write
1635E470000
unkown
page readonly
2F99000
heap
page read and write
25EBFD1E000
unkown
page readonly
7500000
trusted library allocation
page read and write
7510000
heap
page execute and read and write
4B0A000
heap
page read and write
74C0000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
2B03A271000
heap
page read and write
4890000
trusted library allocation
page read and write
7FFD9B33C000
trusted library allocation
page execute and read and write
7550000
trusted library allocation
page read and write
3264000
heap
page read and write
2C20000
heap
page read and write
4E70000
trusted library allocation
page read and write
5060000
heap
page read and write
5DF3B9F000
stack
page read and write
74C0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
CFE000
stack
page read and write
5131000
trusted library allocation
page read and write
1635E731000
heap
page read and write
16345A88000
trusted library allocation
page read and write
BC9000
heap
page read and write
74E0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74E4000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
DC165FC000
stack
page read and write
74E0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
25EA6E4F000
heap
page read and write
7550000
trusted library allocation
page read and write
47A0000
heap
page read and write
74C0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
249FFAE4000
unkown
page readonly
74C0000
trusted library allocation
page read and write
163459C3000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
492E000
stack
page read and write
7520000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
7450000
trusted library allocation
page read and write
2B01FEC4000
unkown
page readonly
16345CE5000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
25EBFD33000
unkown
page readonly
7FFD9B4F0000
trusted library allocation
page execute and read and write
7540000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
4737000
trusted library allocation
page execute and read and write
C10000
heap
page read and write
7FFD9B390000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
1635E6FF000
heap
page read and write
163454B5000
heap
page read and write
7540000
trusted library allocation
page read and write
5DF83FE000
stack
page read and write
1635E7F4000
heap
page read and write
74F1000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
249FFAC2000
unkown
page readonly
74C0000
trusted library allocation
page read and write
7FFD9B4A0000
trusted library allocation
page read and write
2F7C000
heap
page read and write
7500000
trusted library allocation
page read and write
DC15EFB000
stack
page read and write
7540000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7FFD9B580000
trusted library allocation
page read and write
B3E90FE000
stack
page read and write
74A0000
trusted library allocation
page read and write
7FFD9B2D2000
trusted library allocation
page read and write
51C2000
trusted library allocation
page read and write
7F3D0000
trusted library allocation
page execute and read and write
7540000
heap
page read and write
7FFD9B39C000
trusted library allocation
page execute and read and write
74F0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
25EA6CA0000
heap
page read and write
74F0000
trusted library allocation
page read and write
A9C000
stack
page read and write
50C1000
trusted library allocation
page read and write
7FFD9B4E0000
trusted library allocation
page read and write
BB44341000
stack
page read and write
85E000
stack
page read and write
16345A8C000
trusted library allocation
page read and write
96B000
stack
page read and write
7540000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
791D000
stack
page read and write
74E0000
trusted library allocation
page read and write
2B03A3F0000
unkown
page readonly
7520000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
163462C5000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
5DF82EC000
stack
page read and write
7540000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74A5000
trusted library allocation
page read and write
74E4000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
249FF2EA000
heap
page read and write
5DF7BF7000
stack
page read and write
5DF60EC000
stack
page read and write
5000000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
16345A80000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
7FFD9B2E3000
trusted library allocation
page execute and read and write
7520000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
C10000
heap
page read and write
74C0000
trusted library allocation
page read and write
2E64000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
1635EEA0000
heap
page read and write
74E0000
trusted library allocation
page read and write
7FFD9B390000
trusted library allocation
page read and write
7DD000
stack
page read and write
3240000
heap
page read and write
249FFB4A000
unkown
page readonly
327D000
stack
page read and write
7550000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
34C1000
heap
page read and write
25EA7530000
unkown
page readonly
74E0000
trusted library allocation
page read and write
7FFD9B4D0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
163462C8000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
5144000
trusted library allocation
page read and write
7540000
remote allocation
page read and write
74A0000
trusted library allocation
page read and write
A95000
heap
page read and write
249FF9E0000
heap
page read and write
5DF4FE9000
stack
page read and write
DC16AFC000
stack
page read and write
16345A94000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
5DF3FEC000
stack
page read and write
74E0000
trusted library allocation
page read and write
16345F5B000
trusted library allocation
page read and write
5DF54FB000
stack
page read and write
7560000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
16345976000
trusted library allocation
page read and write
3553000
heap
page read and write
7550000
trusted library allocation
page read and write
5DF6FEC000
stack
page read and write
74F5000
trusted library allocation
page read and write
DC166FB000
stack
page read and write
74AC000
trusted library allocation
page read and write
7FFD9B490000
trusted library allocation
page read and write
249FFB10000
unkown
page readonly
74F0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
25EBFD6C000
unkown
page readonly
7540000
trusted library allocation
page execute and read and write
7560000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
2F7C000
heap
page read and write
74E0000
trusted library allocation
page read and write
7FFD9B2FB000
trusted library allocation
page execute and read and write
7520000
trusted library allocation
page read and write
7FFD9B4A0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
2DCA000
heap
page read and write
BB451FE000
stack
page read and write
74F0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
498B000
trusted library allocation
page execute and read and write
74F0000
trusted library allocation
page read and write
746C000
trusted library allocation
page execute and read and write
2FAB000
heap
page read and write
74E0000
trusted library allocation
page read and write
49B6000
heap
page read and write
7500000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7469000
trusted library allocation
page execute and read and write
74F0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
2B03A5C2000
heap
page read and write
74F0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
163459BB000
trusted library allocation
page read and write
16345EE5000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7FFD9B476000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
16345EF9000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
77DE000
stack
page read and write
7FFD9B493000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
2E6F000
stack
page read and write
D6E000
stack
page read and write
74F0000
trusted library allocation
page read and write
163450D0000
heap
page read and write
25EBFD41000
unkown
page readonly
7560000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
2DF8000
heap
page read and write
33FE000
stack
page read and write
7540000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
5DF62EC000
stack
page read and write
16355974000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74F5000
trusted library allocation
page read and write
7450000
trusted library allocation
page read and write
4BBC000
trusted library allocation
page execute and read and write
16345B06000
trusted library allocation
page read and write
C16000
heap
page read and write
495D000
trusted library allocation
page execute and read and write
7FFD9B4B5000
trusted library allocation
page read and write
5DF42FE000
stack
page read and write
2B03A2BB000
heap
page read and write
7544000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
479E000
stack
page read and write
7FFD9B500000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
4860000
trusted library allocation
page execute and read and write
7FFD9B2F4000
trusted library allocation
page read and write
5145000
heap
page read and write
5DF3EE9000
stack
page read and write
7A1E000
stack
page read and write
5DF50F8000
stack
page read and write
7FFD9B5D0000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
7FFD9B6B0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
4E75000
trusted library allocation
page execute and read and write
16345EDD000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
163451F6000
heap
page read and write
7520000
trusted library allocation
page read and write
24998408000
heap
page read and write
2F0B000
stack
page read and write
7540000
trusted library allocation
page read and write
24998490000
heap
page execute and read and write
1635E6F3000
heap
page read and write
74E0000
trusted library allocation
page read and write
4730000
trusted library allocation
page read and write
25EBFE2D000
heap
page read and write
5DF65E8000
stack
page read and write
7500000
trusted library allocation
page read and write
25EBFCF4000
unkown
page readonly
7520000
trusted library allocation
page read and write
4953000
trusted library allocation
page execute and read and write
4BB9000
trusted library allocation
page execute and read and write
7FFD9B48C000
trusted library allocation
page read and write
5DF7DF7000
stack
page read and write
74F0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
25EBFD93000
heap
page read and write
5DF7AEC000
stack
page read and write
DC169FE000
stack
page read and write
16345D35000
trusted library allocation
page read and write
2FC0000
heap
page read and write
74A0000
trusted library allocation
page read and write
1635E865000
heap
page read and write
34C6000
heap
page read and write
74E0000
trusted library allocation
page read and write
7A5E000
stack
page read and write
7FFD9B490000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
2B03A7A0000
heap
page execute and read and write
7500000
trusted library allocation
page read and write
7FFD9B2E3000
trusted library allocation
page read and write
4DAD000
trusted library allocation
page execute and read and write
25EA75F0000
heap
page read and write
4BF0000
trusted library allocation
page read and write
4C6F000
stack
page read and write
7550000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
2B02002E000
heap
page read and write
7540000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
5DF6CE9000
stack
page read and write
74C0000
trusted library allocation
page read and write
7FFD9B2D3000
trusted library allocation
page execute and read and write
25EBFD20000
unkown
page readonly
1635E2B0000
heap
page read and write
25EA6BF0000
unkown
page readonly
7FFD9B473000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
5DF85FC000
stack
page read and write
7520000
trusted library allocation
page read and write
7FFD9B530000
trusted library allocation
page execute and read and write
50A0000
heap
page execute and read and write
74E0000
trusted library allocation
page read and write
4800000
heap
page read and write
7540000
trusted library allocation
page read and write
7FFD9B500000
trusted library allocation
page execute and read and write
2C28000
heap
page read and write
7550000
trusted library allocation
page read and write
2FB0000
heap
page read and write
249FFB16000
unkown
page readonly
249FF465000
heap
page read and write
74E0000
trusted library allocation
page read and write
5DF43EC000
stack
page read and write
74F0000
trusted library allocation
page read and write
CF0000
heap
page read and write
7550000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
3586000
heap
page read and write
74F0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
163462CA000
trusted library allocation
page read and write
1635E870000
heap
page read and write
7540000
trusted library allocation
page read and write
16345CD3000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7FFD9B470000
trusted library allocation
page read and write
496E000
stack
page read and write
74E0000
trusted library allocation
page read and write
249FF0A0000
unkown
page readonly
16345A70000
trusted library allocation
page read and write
1635E85D000
heap
page read and write
7FFD9B4B0000
trusted library allocation
page read and write
7FFD9B4E9000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
1635E2A0000
heap
page execute and read and write
5176000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
5103000
trusted library allocation
page read and write
16345E59000
trusted library allocation
page read and write
DC15DFE000
stack
page read and write
7550000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
BB448FE000
stack
page read and write
163462CC000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
1635E240000
trusted library allocation
page read and write
2B03A343000
heap
page read and write
B3E8CFE000
stack
page read and write
7540000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
5DF4AFF000
stack
page read and write
7FFD9B400000
trusted library allocation
page execute and read and write
74E0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
C30000
heap
page read and write
7560000
trusted library allocation
page read and write
16345E6B000
trusted library allocation
page read and write
C35000
heap
page read and write
2F8F000
heap
page read and write
7540000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
7FFD9B2E3000
trusted library allocation
page execute and read and write
287BED55000
heap
page read and write
74C0000
trusted library allocation
page read and write
1635E33B000
heap
page read and write
3548000
heap
page read and write
74E0000
trusted library allocation
page read and write
249FFB20000
unkown
page readonly
7FFD9B2ED000
trusted library allocation
page execute and read and write
74E0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
2EFE000
stack
page read and write
7520000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
7FFD9B2D4000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
49EE000
stack
page read and write
16345AAD000
trusted library allocation
page read and write
51A5000
trusted library allocation
page read and write
5DF74F7000
stack
page read and write
7530000
trusted library allocation
page read and write
4E50000
trusted library allocation
page read and write
25EBFDEE000
heap
page read and write
4B4E000
stack
page read and write
25EA763B000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
7FFD9B2F4000
trusted library allocation
page read and write
16345EFB000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
25EBFD39000
unkown
page readonly
920000
heap
page read and write
25EA7743000
trusted library allocation
page read and write
5135000
trusted library allocation
page read and write
2B0219B0000
heap
page read and write
1635E863000
heap
page read and write
74C0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7FFD9B480000
trusted library allocation
page read and write
7FFD9B2E4000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
249FFAF9000
unkown
page readonly
16345947000
trusted library allocation
page read and write
2F6B000
stack
page read and write
4DD0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7FFD9B2E0000
trusted library allocation
page read and write
1635EAE9000
heap
page read and write
7540000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
326D000
heap
page read and write
74E0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7FFD9B3B6000
trusted library allocation
page execute and read and write
74E0000
trusted library allocation
page read and write
515A000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
5DF70EB000
stack
page read and write
4D90000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
4DD7000
trusted library allocation
page execute and read and write
7FFD9B30B000
trusted library allocation
page execute and read and write
7540000
trusted library allocation
page read and write
25EA6E76000
heap
page read and write
7FFD9B2ED000
trusted library allocation
page execute and read and write
7550000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
25EBFD35000
unkown
page readonly
7560000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7460000
trusted library allocation
page read and write
4FA8000
trusted library allocation
page read and write
355A000
heap
page read and write
3306000
heap
page read and write
5DF78F8000
stack
page read and write
7FFD9B2ED000
trusted library allocation
page execute and read and write
7560000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7FFD9B32C000
trusted library allocation
page execute and read and write
7540000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
4BF0000
trusted library allocation
page read and write
2DDF000
stack
page read and write
769E000
stack
page read and write
7540000
trusted library allocation
page read and write
7FFD9B483000
trusted library allocation
page read and write
D05000
heap
page read and write
7500000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
25EB760D000
trusted library allocation
page read and write
3330000
heap
page read and write
163458EA000
heap
page read and write
7540000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
25EBFE18000
heap
page read and write
330E000
heap
page read and write
7580000
trusted library allocation
page read and write
7FFD9B396000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
25EBFCE1000
unkown
page readonly
7540000
trusted library allocation
page read and write
473B000
trusted library allocation
page execute and read and write
7540000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
249FFB26000
unkown
page readonly
BB447FF000
stack
page read and write
799E000
stack
page read and write
249FF150000
heap
page read and write
5DF4CFC000
stack
page read and write
4BA0000
trusted library allocation
page read and write
48A0000
heap
page read and write
74F0000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
50BF000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
BB44FFE000
stack
page read and write
7530000
trusted library allocation
page read and write
287BEAC0000
heap
page read and write
74A0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7A60000
heap
page read and write
73EE000
stack
page read and write
74D0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
745E000
stack
page read and write
2B03A320000
heap
page read and write
287BEB20000
heap
page read and write
74E0000
trusted library allocation
page read and write
710E000
stack
page read and write
24998436000
heap
page read and write
3558000
heap
page read and write
74A0000
trusted library allocation
page read and write
16345460000
heap
page execute and read and write
4F68000
trusted library allocation
page read and write
50D1000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7FFD9B2F0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7FFD9B3F0000
trusted library allocation
page execute and read and write
74E0000
trusted library allocation
page read and write
16345196000
heap
page read and write
25EBFE4B000
heap
page read and write
D7D000
stack
page read and write
329E000
stack
page read and write
74F0000
trusted library allocation
page read and write
B9A000
heap
page read and write
7550000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
4970000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
16345E1D000
trusted library allocation
page read and write
7FFD9B540000
trusted library allocation
page execute and read and write
2B03A340000
heap
page read and write
7500000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
DC167FE000
stack
page read and write
74F0000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
5DF45FE000
stack
page read and write
7550000
trusted library allocation
page read and write
249FF348000
heap
page read and write
74A0000
trusted library allocation
page read and write
47E7000
heap
page read and write
74E0000
trusted library allocation
page read and write
337E000
stack
page read and write
7FFD9B4F9000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
16345D33000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
775E000
stack
page read and write
50D0000
heap
page read and write
4DA0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7FFD9B2E0000
trusted library allocation
page read and write
5DF81EC000
stack
page read and write
74A0000
trusted library allocation
page read and write
7420000
trusted library allocation
page execute and read and write
4E90000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
7FFD9B570000
trusted library allocation
page execute and read and write
EE2A2ED000
stack
page read and write
7540000
trusted library allocation
page read and write
16345F5D000
trusted library allocation
page read and write
4B90000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
25EBFE13000
heap
page read and write
74A0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
3553000
heap
page read and write
7500000
trusted library allocation
page read and write
7540000
remote allocation
page read and write
7FFD9B2FD000
trusted library allocation
page execute and read and write
BF5000
heap
page read and write
7500000
trusted library allocation
page read and write
7564000
trusted library allocation
page read and write
249FFB48000
unkown
page readonly
16345420000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
9A8000
stack
page read and write
3577000
heap
page read and write
24998365000
heap
page read and write
74A5000
trusted library allocation
page read and write
4C10000
heap
page execute and read and write
34E7000
heap
page read and write
A5C000
stack
page read and write
4A2F000
stack
page read and write
74C0000
trusted library allocation
page read and write
7FFD9B2F3000
trusted library allocation
page read and write
2B020069000
heap
page read and write
74C0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
4DB4000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
4D40000
trusted library allocation
page read and write
47EF000
stack
page read and write
7FFD9B4C0000
trusted library allocation
page read and write
4990000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
5DF4EFE000
stack
page read and write
2E50000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
BB44BFE000
stack
page read and write
74E0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
2F68000
heap
page read and write
7540000
trusted library allocation
page read and write
4C2E000
stack
page read and write
714E000
stack
page read and write
74E0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
1635E767000
heap
page read and write
754C000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
163558F1000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
7FC50000
trusted library allocation
page execute and read and write
7540000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
2F99000
heap
page read and write
7FFD9B4F0000
trusted library allocation
page execute and read and write
7520000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
7FFD9B2E2000
trusted library allocation
page read and write
249FFAFF000
unkown
page readonly
6E30000
heap
page execute and read and write
16345B0F000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7470000
trusted library allocation
page read and write
74E3000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
2B01FF75000
heap
page read and write
7520000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
BB44AFE000
stack
page read and write
16345959000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
249FFB1C000
unkown
page readonly
7FFD9B4AD000
trusted library allocation
page read and write
7FFD9B3C6000
trusted library allocation
page execute and read and write
7540000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
2F8F000
heap
page read and write
5DF6DEC000
stack
page read and write
DC163FF000
stack
page read and write
7540000
trusted library allocation
page read and write
25EBFD31000
unkown
page readonly
4E77000
trusted library allocation
page execute and read and write
7FFD9B2D0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
249FF30B000
heap
page read and write
74C0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7FFD9B510000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
1635E76D000
heap
page read and write
74A0000
trusted library allocation
page read and write
7FFD9B490000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
249FFB1E000
unkown
page readonly
359F000
stack
page read and write
7560000
trusted library allocation
page read and write
6FCE000
stack
page read and write
4E54000
trusted library allocation
page read and write
2B03A226000
heap
page read and write
4F7F000
stack
page read and write
16345E51000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
4B8D000
stack
page read and write
74C0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
7AD5000
heap
page read and write
25EA6F70000
heap
page read and write
249FFAA2000
unkown
page readonly
7540000
trusted library allocation
page read and write
A60000
heap
page read and write
DC160FE000
stack
page read and write
7540000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7541000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
BB446FE000
stack
page read and write
25EBFD67000
unkown
page readonly
7540000
trusted library allocation
page read and write
503E000
stack
page read and write
25EA6E16000
heap
page read and write
74E0000
trusted library allocation
page read and write
7FFD9B48A000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
16346244000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
25EA6F95000
heap
page read and write
5DF7EF8000
stack
page read and write
74C0000
trusted library allocation
page read and write
CCE000
stack
page read and write
4F10000
heap
page read and write
7080000
heap
page execute and read and write
7520000
trusted library allocation
page read and write
7FFD9B2F0000
trusted library allocation
page read and write
754E000
trusted library allocation
page read and write
2B03A5DF000
heap
page read and write
4E40000
heap
page read and write
74E0000
trusted library allocation
page read and write
2E63000
trusted library allocation
page execute and read and write
74A0000
trusted library allocation
page read and write
25EBFD69000
unkown
page readonly
74C0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
50BD000
trusted library allocation
page execute and read and write
4900000
heap
page read and write
7520000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
249FF270000
heap
page read and write
7FFD9B3A0000
trusted library allocation
page execute and read and write
73F0000
trusted library allocation
page read and write
249FFB37000
unkown
page readonly
7540000
trusted library allocation
page read and write
5DF69EC000
stack
page read and write
7FFD9B30D000
trusted library allocation
page execute and read and write
2498012C000
trusted library allocation
page read and write
1634598B000
trusted library allocation
page read and write
4F5E000
stack
page read and write
74C0000
trusted library allocation
page read and write
479E000
stack
page read and write
74F0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7FFD9B2E4000
trusted library allocation
page read and write
7FFD9B2E0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
16345A30000
trusted library allocation
page read and write
7FFD9B6C0000
trusted library allocation
page read and write
5050000
trusted library allocation
page read and write
7FFD9B300000
trusted library allocation
page read and write
4A40000
heap
page readonly
3640000
heap
page read and write
7540000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
5DF84FE000
stack
page read and write
74E0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
DC162FE000
stack
page read and write
74E0000
trusted library allocation
page read and write
163459BF000
trusted library allocation
page read and write
25EA6DA0000
heap
page read and write
74C0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
7FFD9B2ED000
trusted library allocation
page execute and read and write
7550000
trusted library allocation
page read and write
2B0319F1000
trusted library allocation
page read and write
7409000
trusted library allocation
page execute and read and write
74E0000
trusted library allocation
page read and write
16345AA9000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
771E000
stack
page read and write
4987000
trusted library allocation
page execute and read and write
7520000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
249FF2ED000
heap
page read and write
49A0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
BBC000
heap
page read and write
25EA6D80000
heap
page read and write
7FFD9B510000
trusted library allocation
page read and write
7F5F0000
trusted library allocation
page execute and read and write
34E7000
heap
page read and write
25EBFD3F000
unkown
page readonly
74E0000
trusted library allocation
page read and write
7FFD9B33C000
trusted library allocation
page execute and read and write
1635D920000
trusted library allocation
page read and write
3760000
heap
page read and write
74E0000
trusted library allocation
page read and write
5DF3BDF000
stack
page read and write
25EBFD3D000
unkown
page readonly
2B01FEA0000
unkown
page readonly
7520000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
3730000
heap
page read and write
7540000
trusted library allocation
page read and write
32E5000
heap
page read and write
74A0000
trusted library allocation
page read and write
2E6D000
trusted library allocation
page execute and read and write
1635E2A3000
heap
page execute and read and write
7520000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
25EA772C000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
7FFD9B4C6000
trusted library allocation
page read and write
32F0000
heap
page read and write
7FFD9B5B0000
trusted library allocation
page read and write
33E5000
heap
page read and write
7A20000
remote allocation
page read and write
2F00000
heap
page read and write
AF0000
heap
page read and write
5DF80ED000
stack
page read and write
74F0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
DC15CFE000
stack
page read and write
2B02000A000
heap
page read and write
74C0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
2B03A5C5000
heap
page read and write
74F0000
trusted library allocation
page read and write
16345140000
trusted library allocation
page read and write
7551000
trusted library allocation
page read and write
4E7B000
trusted library allocation
page execute and read and write
16345D2F000
trusted library allocation
page read and write
7A5E000
stack
page read and write
16345A7C000
trusted library allocation
page read and write
34CF000
heap
page read and write
33E0000
heap
page read and write
7560000
trusted library allocation
page read and write
7FFD9B32C000
trusted library allocation
page execute and read and write
7540000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7FFD9B2DD000
trusted library allocation
page execute and read and write
49A0000
trusted library allocation
page execute and read and write
32E0000
heap
page read and write
5DF41FD000
stack
page read and write
74A0000
trusted library allocation
page read and write
5156000
trusted library allocation
page read and write
34A0000
heap
page read and write
25EBFCF2000
unkown
page readonly
7FFD9B4F0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
16345E65000
trusted library allocation
page read and write
4E3E000
stack
page read and write
4DDB000
trusted library allocation
page execute and read and write
7560000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
2B01FF80000
heap
page read and write
74F0000
trusted library allocation
page read and write
76DE000
stack
page read and write
4BEF000
stack
page read and write
74A0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
51B4000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
4EE0000
heap
page readonly
7520000
trusted library allocation
page read and write
50B8000
trusted library allocation
page read and write
16345C5A000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
4870000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
249FF321000
heap
page read and write
1635DC7C000
heap
page read and write
7520000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
BB450FD000
stack
page read and write
74F0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
5DF4DF7000
stack
page read and write
5DF52E9000
stack
page read and write
74C0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
16345F5F000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
16345ADB000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
287BEAB0000
heap
page read and write
74E0000
trusted library allocation
page read and write
2B03A5CF000
heap
page read and write
7FFD9B4E0000
trusted library allocation
page read and write
7544000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
4BF0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7FFD9B396000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
5DF67EC000
stack
page read and write
7540000
trusted library allocation
page read and write
3548000
heap
page read and write
7520000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
2B03A296000
heap
page read and write
5C21000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7FFD9B4B0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7FFD9B390000
trusted library allocation
page execute and read and write
74F0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
D0E000
stack
page read and write
7510000
trusted library allocation
page execute and read and write
74E0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7FFD9B480000
trusted library allocation
page read and write
3587000
heap
page read and write
74F0000
trusted library allocation
page read and write
7FFD9B3B6000
trusted library allocation
page execute and read and write
517E000
trusted library allocation
page read and write
5DF59FD000
stack
page read and write
7540000
trusted library allocation
page read and write
7FFD9B2DD000
trusted library allocation
page execute and read and write
7550000
trusted library allocation
page read and write
2B03A484000
unkown
page readonly
7FFD9B4E0000
trusted library allocation
page read and write
4960000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
DC168FC000
stack
page read and write
7543000
trusted library allocation
page read and write
7FFD9B5A0000
trusted library allocation
page read and write
2B03A29A000
heap
page read and write
7FFD9B5E0000
trusted library allocation
page read and write
34AA000
heap
page read and write
7500000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7FFD9B4BD000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
75DE000
stack
page read and write
74C0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
7FFD9B500000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
7FFD9B2F0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
323E000
stack
page read and write
7500000
trusted library allocation
page read and write
7480000
trusted library allocation
page execute and read and write
74A0000
trusted library allocation
page read and write
4B93000
trusted library allocation
page read and write
25EA6F75000
heap
page read and write
74F0000
trusted library allocation
page read and write
16345B43000
trusted library allocation
page read and write
7A20000
remote allocation
page read and write
7400000
trusted library allocation
page read and write
4FFE000
stack
page read and write
16345AB1000
trusted library allocation
page read and write
1635E51E000
unkown
page readonly
74F0000
trusted library allocation
page read and write
5DF7CEC000
stack
page read and write
74C0000
trusted library allocation
page read and write
7FFD9B540000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
32BC000
heap
page read and write
74E0000
trusted library allocation
page read and write
74A5000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
1635EFA0000
heap
page read and write
74E0000
trusted library allocation
page read and write
5DF48FF000
stack
page read and write
7540000
trusted library allocation
page read and write
7A20000
remote allocation
page read and write
3320000
heap
page read and write
7540000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
CBE000
stack
page read and write
74E0000
trusted library allocation
page read and write
5DF51E9000
stack
page read and write
74F0000
trusted library allocation
page read and write
25EA7751000
trusted library allocation
page read and write
510B000
trusted library allocation
page read and write
DC16FFB000
stack
page read and write
2B03A1C0000
heap
page read and write
504E000
stack
page read and write
74E0000
trusted library allocation
page read and write
7BA0000
heap
page read and write
16345AFD000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
59C1000
trusted library allocation
page read and write
16345B11000
trusted library allocation
page read and write
2499000D000
trusted library allocation
page read and write
249FFB24000
unkown
page readonly
7540000
trusted library allocation
page read and write
BB44EFE000
stack
page read and write
7550000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
6D00000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
1635E980000
heap
page read and write
74E0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
16345AA5000
trusted library allocation
page read and write
60E1000
trusted library allocation
page read and write
16345F57000
trusted library allocation
page read and write
505D000
trusted library allocation
page execute and read and write
4BF0000
trusted library allocation
page read and write
74EE000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
513D000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
7FFD9B38C000
trusted library allocation
page execute and read and write
7540000
trusted library allocation
page read and write
2FA7000
stack
page read and write
163459C7000
trusted library allocation
page read and write
5059000
heap
page read and write
2F8F000
heap
page read and write
74A0000
trusted library allocation
page read and write
25EBFD43000
unkown
page readonly
7550000
trusted library allocation
page read and write
7FFD9B38C000
trusted library allocation
page execute and read and write
5106000
trusted library allocation
page read and write
25EBFD05000
unkown
page readonly
7FFD9B2D4000
trusted library allocation
page read and write
7FFD9B690000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
163451B5000
heap
page read and write
7540000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
32D0000
heap
page read and write
2B03A240000
heap
page read and write
DC161FE000
stack
page read and write
2E60000
trusted library allocation
page read and write
249FFB12000
unkown
page readonly
7580000
trusted library allocation
page read and write
740C000
trusted library allocation
page execute and read and write
7550000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
2B03A222000
heap
page read and write
25EA7755000
trusted library allocation
page read and write
3284000
heap
page read and write
6D10000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
25EBFD07000
unkown
page readonly
7520000
trusted library allocation
page read and write
7F3E8000
trusted library allocation
page execute and read and write
16345B32000
trusted library allocation
page read and write
249FF230000
heap
page read and write
5173000
trusted library allocation
page read and write
7FFD9B2D3000
trusted library allocation
page execute and read and write
2F60000
heap
page read and write
7540000
trusted library allocation
page read and write
49C1000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
4D4D000
trusted library allocation
page execute and read and write
74E0000
trusted library allocation
page read and write
A90000
heap
page read and write
2B020022000
heap
page read and write
74F0000
trusted library allocation
page read and write
287BEB28000
heap
page read and write
16345A84000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7FFD9B487000
trusted library allocation
page read and write
249FF311000
heap
page read and write
74C0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
There are 2072 hidden memdumps, click here to show them.