IOC Report
SecuriteInfo.com.Program.RemoteAdminNET.1.367.20003.msi

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Program.RemoteAdminNET.1.367.20003.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
initial sample
malicious
3dfa4c.rbf (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
3dfa4e.rbf (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
3dfa4f.rbf (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
3dfa50.rbf (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
3dfa51.rbf (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
3dfa52.rbf (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Config.Msi\3dfa46.rbs
data
dropped
malicious
C:\Config.Msi\3dfa4b.rbs
data
dropped
malicious
C:\Config.Msi\3dfa53.rbs
data
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\BouncyCastle.Crypto.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\AgentPackageHeartbeat.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\Atera.AgentPackage.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\AgentPackageInternalPoller.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\Atera.AgentCommunication.Models.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\Atera.AgentPackage.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\LiteDB.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\Polly.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\SharpSnmpLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\System.Runtime.InteropServices.RuntimeInformation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\System.ValueTuple.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace\AgentPackageMarketplace.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace\Atera.AgentPackage.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace\Atera.AgentPackages.CommonLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace\Atera.Utils.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.exe.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\Atera.AgentPackage.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\Atera.AgentPackages.CommonLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\Atera.AgentPackages.ModelsV3.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\Atera.Utils.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\Dapper.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\ICSharpCode.SharpZipLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\Microsoft.ApplicationInsights.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\NLog.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\OpenHardwareMonitorLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\Polly.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\StructureMap.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\System.Buffers.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\System.Data.SQLite.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\System.Diagnostics.DiagnosticSource.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\System.Memory.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\System.Runtime.CompilerServices.Unsafe.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\System.Runtime.InteropServices.RuntimeInformation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\System.ValueTuple.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\x64\SQLite.Interop.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\x86\SQLite.Interop.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\AgentPackageOsUpdates.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\AgentPackageOsUpdates.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\Atera.AgentPackage.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\Atera.AgentPackages.CommonLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\Atera.AgentPackages.Exceptions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\Atera.AgentPackages.ModelsV3.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\Atera.Utils.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\CommunityToolkit.WinUI.Notifications.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\Interop.WUApiLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\Microsoft.ApplicationInsights.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\Microsoft.Win32.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\Microsoft.Win32.TaskScheduler.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\NLog.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\Polly.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\RestartReminder.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\RestartReminderNotification.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\StructureMap.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.AppContext.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Buffers.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Collections.Concurrent.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Collections.NonGeneric.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Collections.Specialized.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Collections.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.ComponentModel.EventBasedAsync.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.ComponentModel.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.ComponentModel.TypeConverter.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.ComponentModel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Console.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Data.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Diagnostics.Contracts.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Diagnostics.Debug.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Diagnostics.DiagnosticSource.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Diagnostics.FileVersionInfo.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Diagnostics.Process.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Diagnostics.StackTrace.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Diagnostics.TextWriterTraceListener.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Diagnostics.Tools.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Diagnostics.TraceSource.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Diagnostics.Tracing.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Drawing.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Dynamic.Runtime.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Globalization.Calendars.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Globalization.Extensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Globalization.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.IO.Compression.ZipFile.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.IO.Compression.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.IO.FileSystem.DriveInfo.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.IO.FileSystem.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.IO.FileSystem.Watcher.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.IO.FileSystem.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.IO.IsolatedStorage.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.IO.MemoryMappedFiles.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.IO.Pipes.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.IO.UnmanagedMemoryStream.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.IO.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Linq.Expressions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Linq.Parallel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Linq.Queryable.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Linq.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Memory.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Net.Http.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Net.NameResolution.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Net.NetworkInformation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Net.Ping.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Net.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Net.Requests.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Net.Security.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Net.Sockets.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Net.WebHeaderCollection.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Net.WebSockets.Client.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Net.WebSockets.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Numerics.Vectors.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.ObjectModel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Reflection.Extensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Reflection.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Reflection.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Resources.Reader.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Resources.ResourceManager.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Resources.Writer.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Runtime.CompilerServices.Unsafe.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Runtime.CompilerServices.VisualC.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Runtime.Extensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Runtime.Handles.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Runtime.InteropServices.RuntimeInformation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Runtime.InteropServices.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Runtime.Numerics.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Runtime.Serialization.Formatters.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Runtime.Serialization.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Runtime.Serialization.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Runtime.Serialization.Xml.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Runtime.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Security.Claims.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Security.Cryptography.Algorithms.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Security.Cryptography.Csp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Security.Cryptography.Encoding.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Security.Cryptography.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Security.Cryptography.X509Certificates.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Security.Principal.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Security.SecureString.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Text.Encoding.Extensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Text.Encoding.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Text.RegularExpressions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Threading.Overlapped.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Threading.Tasks.Parallel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Threading.Tasks.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Threading.Thread.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Threading.ThreadPool.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Threading.Timer.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Threading.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.ValueTuple.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Xml.ReaderWriter.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Xml.XDocument.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Xml.XPath.XDocument.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Xml.XPath.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Xml.XmlDocument.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Xml.XmlSerializer.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\netstandard.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\AgentPackageProgramManagement.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\Atera.AgentPackage.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\ThirdPartyPackageManager.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\chocolatey.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\log4net.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\Atera.AgentPackage.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\AgentPackageSystemTools.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\Atera.AgentPackage.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\IdleTimeFinder.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\Microsoft.ApplicationInsights.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\RunScriptAsUser.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\System.Buffers.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\System.Diagnostics.DiagnosticSource.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\System.Memory.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\System.Runtime.CompilerServices.Unsafe.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
modified
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\AgentPackageTicketing.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\Atera.AgentPackage.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\CommunityToolkit.WinUI.Notifications.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\EO.WebBrowser.WinForm.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\EO.WebBrowser.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\FormControlsLibrary.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\ICSharpCode.SharpZipLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\Microsoft.ApplicationInsights.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\QRCoder.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\System.Buffers.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\System.Data.SQLite.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\System.Memory.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\System.Numerics.Vectors.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\System.Runtime.CompilerServices.Unsafe.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\System.ValueTuple.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\TicketingNotifications.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\TicketingPackageExtensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\TicketingTrayTMP.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\UserDetections.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\t2tWinFormAppBarLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\x64\SQLite.Interop.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\x86\SQLite.Interop.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\AgentPackageUpgradeAgent.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\Atera.AgentPackage.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\Microsoft.Win32.TaskScheduler.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\System.ValueTuple.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\ToBeRemoved\AteraAgent.InstallLog
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\ToBeRemoved\AteraAgent.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\ToBeRemoved\BouncyCastle.Crypto.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\ToBeRemoved\ICSharpCode.SharpZipLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\ToBeRemoved\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\ToBeRemoved\Pubnub.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\ToBeRemoved\System.ValueTuple.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\ATERA Networks\AteraAgent\AteraAgent.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\ATERA Networks\AteraAgent\BouncyCastle.Crypto.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\ATERA Networks\AteraAgent\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\ATERA Networks\AteraAgent\Pubnub.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\ATERA Networks\AteraAgent\System.ValueTuple.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI14C4.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSI14C4.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI14C4.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI16A.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSI16A.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI16A.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI18BD.tmp
data
dropped
malicious
C:\Windows\Installer\MSI1FA3.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSI21B7.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSI294A.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSI2F94.tmp
data
dropped
malicious
C:\Windows\Installer\MSI330F.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSI330F.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI330F.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI4F07.tmp
data
dropped
malicious
C:\Windows\Installer\MSI57D5.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
modified
malicious
C:\Windows\Installer\MSIFBAD.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSIFBAD.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIFBAD.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\System32\InstallUtil.InstallLog
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Windows\Temp\AteraSetupLog.txt
Unicode text, UTF-16, little-endian text, with very long lines (319), with CRLF line terminators
dropped
malicious
C:\Windows\Temp\SplashtopStreamer.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Temp\~DF07D540AE027F4656.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF0BA98394DFBAFEC5.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF1E29FC9B342B27CE.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF27045DF9BB3D83EC.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF2A5BC4EA07A7A256.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF3748246E0295C8E7.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF4090650E6245C6F2.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF50AE555E1AE6C734.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF566BF609044F45EB.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF7EC49C7F7F89DD72.TMP
data
dropped
malicious
C:\Windows\Temp\~DF8CD3DD11D85A5C11.TMP
data
dropped
malicious
C:\Windows\Temp\~DF8D23518F04E02162.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF946B63CA5CEB85FD.TMP
data
dropped
malicious
C:\Windows\Temp\~DF9A8BC046147F428C.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DFA7EEBB2557D24724.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DFB1DAA7BE4628F397.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DFF55CA7399CFD76B7.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DFF85B65DD083C28D1.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
3dfa4d.rbf (copy)
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallState
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\Agent.Package.Watchdog.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation.zip
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.ini
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\dynamicfieldscaching.cch
data
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\information.cch
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\update.cch
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat.zip
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\AgentPackageHeartbeat.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\AgentPackageHeartbeat.ini
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller.zip
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\AgentPackageInternalPoller.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\AgentPackageInternalPoller.ini
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace.zip
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace\AgentPackageMarketplace.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace\AgentPackageMarketplace.ini
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring.zip
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.ini
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\package_2.db
SQLite 3.x database, last written using SQLite version 3040000, file counter 12, database pages 12, cookie 0xb, schema 4, UTF-8, version-valid-for 12
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\package_2.db-journal
SQLite Rollback Journal
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates.zip
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\AgentPackageOsUpdates.Common.dll.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\AgentPackageOsUpdates.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\AgentPackageOsUpdates.ini
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\RestartReminder.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\RestartReminderNotification.exe.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement.zip
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\AgentPackageProgramManagement.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\AgentPackageProgramManagement.ini
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\ThirdPartyPackageManager.dll.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageRuntimeInstaller.zip
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote.zip
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.ini
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\lh.txt
JSON data
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\log.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools.zip
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\AgentPackageSystemTools.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\AgentPackageSystemTools.ini
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\IdleTimeFinder.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\RunScriptAsUser.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing.zip
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\AgentPackageTicketing.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\AgentPackageTicketing.ini
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\FormControlsLibrary.dll.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\TicketingNotifications.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\TicketingPackageExtensions.dll.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\TicketingTrayTMP.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\UserDetections.dll.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent.zip
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\AgentPackageUpgradeAgent.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\AgentPackageUpgradeAgent.ini
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\ToBeRemoved\AteraAgent.InstallState
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\ToBeRemoved\AteraAgent.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\ToBeRemoved\log.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Program Files\ATERA Networks\AteraAgent\AteraAgent.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\regid.1991-06.com.microsoft\regid.1991-06.com.microsoft_Windows-10-Pro.swidtag
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AteraAgent.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
CSV text
dropped
C:\Windows\Installer\3dfa45.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\3dfa47.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\3dfa48.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: x64;1033, Revision Number: {911E9E2F-B38D-4D02-A148-5E49FC9D8943}, Create Time/Date: Wed Feb 28 10:52:04 2024, Last Saved Time/Date: Wed Feb 28 10:52:04 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\3dfa54.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: x64;1033, Revision Number: {911E9E2F-B38D-4D02-A148-5E49FC9D8943}, Create Time/Date: Wed Feb 28 10:52:04 2024, Last Saved Time/Date: Wed Feb 28 10:52:04 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\MSI14C4.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI14C4.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI14C4.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI16A.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI16A.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI16A.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI18BE.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI191D.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI1A18.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI2FA5.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI3071.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI30EF.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI330F.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI330F.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI330F.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI4F08.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI5003.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI50FE.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIFBAD.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSIFBAD.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIFBAD.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SourceHash{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\SourceHash{E732A0D7-A2F2-4657-AC41-B19742648E45}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
Certificate, Version=3
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
Certificate, Version=3
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageAgentInformation.exe.log
CSV text
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageMonitoring.exe.log
ASCII text, with CRLF line terminators
modified
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageSTRemote.exe.log
CSV text
dropped
C:\Windows\Temp\PreVer.log.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Windows\Temp\ateraAgentSetup64_1_8_7_2.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: x64;1033, Revision Number: {911E9E2F-B38D-4D02-A148-5E49FC9D8943}, Create Time/Date: Wed Feb 28 10:52:04 2024, Last Saved Time/Date: Wed Feb 28 10:52:04 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Temp\~DF0010207FF71FD75D.TMP
data
dropped
C:\Windows\Temp\~DF2D5C45643A76E466.TMP
data
dropped
C:\Windows\Temp\~DF59FC06DCC638DD09.TMP
data
dropped
C:\Windows\Temp\~DF5C47CADC2729EAEB.TMP
data
dropped
C:\Windows\Temp\~DF601FBC5E9AAAA425.TMP
data
dropped
C:\Windows\Temp\~DF614609C49375AA7C.TMP
data
dropped
C:\Windows\Temp\~DF6596A5ABA7F5E2CF.TMP
data
dropped
C:\Windows\Temp\~DF6A96F64BD14C1AC3.TMP
data
dropped
C:\Windows\Temp\~DF75FDC0767A5B8C72.TMP
data
dropped
C:\Windows\Temp\~DF807EE35C7538DCC2.TMP
data
dropped
C:\Windows\Temp\~DF91664A3E98AE5DD8.TMP
data
dropped
C:\Windows\Temp\~DF94F0F498C042208A.TMP
data
dropped
C:\Windows\Temp\~DFB5FCDA911672B3E2.TMP
data
dropped
C:\Windows\Temp\~DFB918E60495482294.TMP
data
dropped
C:\Windows\Temp\~DFCC921FB70814547E.TMP
data
dropped
C:\Windows\Temp\~DFCF2B6C7829CAB337.TMP
data
dropped
C:\Windows\Temp\~DFDFADD02CD7B61D28.TMP
data
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 397 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSIFBAD.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4062296 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k UnistackSvcGroup
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI16A.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4063718 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k LocalService -s W32Time
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI14C4.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4068578 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="ilpilarsaomateus@gmail.com" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000Lu4JQIAZ" /AgentId="66902f0e-5571-47c0-8de5-86038d3e7b35"
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI330F.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4076312 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 66902f0e-5571-47c0-8de5-86038d3e7b35 "a7726a3f-8b3e-4e5c-93fd-b7293e973556" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000Lu4JQIAZ
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 66902f0e-5571-47c0-8de5-86038d3e7b35 "cd1ad75d-30e1-481a-b7d6-4d6b012e03f7" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000Lu4JQIAZ
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 66902f0e-5571-47c0-8de5-86038d3e7b35 "3f72da7d-d915-4f53-8bc1-de00eab8c542" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000Lu4JQIAZ
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 66902f0e-5571-47c0-8de5-86038d3e7b35 "db753a87-56d5-4df4-b088-df029e1319dc" agent-api.atera.com/Production 443 or8ixLi90Mf "identified" 001Q300000Lu4JQIAZ
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 66902f0e-5571-47c0-8de5-86038d3e7b35 "b27bbec1-8375-4d6e-a646-54dd514ea664" agent-api.atera.com/Production 443 or8ixLi90Mf "generalinfo fromGui" 001Q300000Lu4JQIAZ
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c cscript "C:\Program Files (x86)\Microsoft Office\Office16\ospp.vbs" /dstatus
malicious
C:\Windows\System32\cscript.exe
cscript "C:\Program Files (x86)\Microsoft Office\Office16\ospp.vbs" /dstatus
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe" 66902f0e-5571-47c0-8de5-86038d3e7b35 "25d94b19-dd8c-444e-8649-b75dcdab378e" agent-api.atera.com/Production 443 or8ixLi90Mf "install eyJSbW1Db2RlIjoiaFpDREZQaEs3NW1KIn0=" 001Q300000Lu4JQIAZ
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.exe" 66902f0e-5571-47c0-8de5-86038d3e7b35 "cb18c271-196a-4aaf-9ea1-03326a248300" agent-api.atera.com/Production 443 or8ixLi90Mf "syncprofile" 001Q300000Lu4JQIAZ
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k smphost
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 66902f0e-5571-47c0-8de5-86038d3e7b35 "62bbbd59-291d-44d5-8ada-88594b5f534e" agent-api.atera.com/Production 443 or8ixLi90Mf "generalinfo" 001Q300000Lu4JQIAZ
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\AgentPackageUpgradeAgent.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\AgentPackageUpgradeAgent.exe" 66902f0e-5571-47c0-8de5-86038d3e7b35 "153560a1-b70b-409f-affc-69982282c523" agent-api.atera.com/Production 443 or8ixLi90Mf "checkforupdates" 001Q300000Lu4JQIAZ
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c cscript "C:\Program Files (x86)\Microsoft Office\Office16\ospp.vbs" /dstatus
malicious
C:\Windows\System32\cscript.exe
cscript "C:\Program Files (x86)\Microsoft Office\Office16\ospp.vbs" /dstatus
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\SecuriteInfo.com.Program.RemoteAdminNET.1.367.20003.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding B5D92016C39FF7678052452FC1E699E8
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding FE293C9828EFC6E5D88E7F26AF6615E9 E Global\MSI0000
C:\Windows\SysWOW64\net.exe
"NET" STOP AteraAgent
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 STOP AteraAgent
C:\Windows\SysWOW64\taskkill.exe
"TaskKill.exe" /f /im AteraAgent.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
"C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
"C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sppsvc.exe
C:\Windows\system32\sppsvc.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 46 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://ps.atera.com/agentpackagesmac/AgentPackageWindowsUpdate/24.6/AgentPackageWindowsUpdate.zip
unknown
https://ps.atera.com/agentpackageswin/AgentPackageSTRemote/16.0/AgentPackageSTRemote.zip
unknown
http://schemas.datacontract.org
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageMarketplace/1.6/AgentPackageMarketplace.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=ab049951-757a-48f1-8723-61b58ab127f5
unknown
https://github.com/CommunityToolkit/WindowsCommunityToolkitP
unknown
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.12/AgentPackageAO
unknown
https://ps.atera.com/agentpackageswin/AgentPackageInternalPoller/15.9/AgentPackageInternalPoller.zip
unknown
https://ps.ateHH
unknown
https://nlog-project.org/
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageProgramManagement/24.9/AgentPackageProgramManageme
unknown
https://agent-api.atera.com/Production/Agent/track-event
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=c0f6c0b0-dc8d-4d9d-a87f-1136ef0d8d0b
unknown
http://dl.google.com/googletalk/googletalk-setup.exe
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageUpgradeAgent/27.2/AgentPackageUpgradeAgent.zip?6
unknown
https://agent-api.PR
unknown
HTTPS://PS.ATERA.COM/AGENTPACKAGESNET45/AGENTPACKAGEMONITORING/36.9/AGENTPACKAGEMONITORING.ZIP
unknown
http://standards.iso.org/iso/19770/-2/2009/schema.xsd
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageMarketplace/1.6/AgentPackageMarketplace.zip
unknown
http://schemas.datacontract.org/2004/07/System.ServiceProcess
unknown
https://ps.atera.com/agentpackagescrossplatform/AgentPackageMonitoring/0.40/AgentPackageMonitoring.z
unknown
https://my.splashtop.com/csrs/win
unknown
http://wixtoolset.org
unknown
https://ps.atera.com/agentpackagesnet45/Agent.Package.Watchdog/1.5/Agent.Package.Watchdog.zip
unknown
https://agent-api.atera.com/Production/Agent/track-event;
unknown
https://ps.atera.com/agentpackageswin/AgentPackageRuntimeInstaller/13.0/AgentPackageRuntimeInstaller
unknown
http://acontrol.atera.com/
unknown
https://agent-api.atera.com/Production/Agent/dynamic-fields/
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageSTRemote/23.4/AgentPackageSTRemote.zip
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageADRemote/6.0/AgentPackageADRemote.zip
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/66902f0e-5571-47c0-8de5
unknown
HTTPS://PS.ATERA.COM/AGENTPACKAGESNET45/AGENTPACKAGERUNTIMEINSTALLER/1.6/AGENTPACKAGERUNTIMEINSTALLE
unknown
http://my.splashtop.com
unknown
https://ps.atera.com/agentpackageswin/AgentPackageNetworkDiscovery/15.0/AgentPackageNetworkDiscovery
unknown
https://ps.atera.com/agentpackagesnet45/Agent.Package.Watchdog/1.5/Agent.Package.Watchdog.zip?6aIkQo
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageSTRemote/23.4/AgentPackageSTRemote.ziph
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageHeartbeat/17.11/AgentPackageHeartbeat.zip
unknown
https://download.splashtop.com
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageTaskScheduler/17.2/AgentPackageTaskScheduler.zip
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://agent-api.atera.com
unknown
https://www.nuget.org/packages/NLog.Web.AspNetCore
unknown
http://www.w3.oh
unknown
http://ps.atera.comO
unknown
https://ps.ateHhh
unknown
https://dynamic.t
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageADRemote/6.0/AgentPackageADRemote.zip?6aIkQoLIi1
unknown
http://nlog-project.org/ws/
unknown
http://crl3.digice
unknown
http://nlog-project.org/ws/ILogReceiverServer/ProcessLogMessagesT
unknown
https://ps.atera.com/a
unknown
https://urn.to/r/sds_see
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageRuntimeInstaller/1.5/AgentPackageRuntimeInstaller.
unknown
https://urn.to/r/sds_see12https://urn.to/r/sds_see2
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageMonitoring/36.9/AgentPackageMonitoring.zip
unknown
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.12/AgentPackageAgentI
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=220604ff-7d82-4400-81a1-a9e4ac59a4ab
unknown
https://download.splashtop.com/csrs/Splashtop_Streamer_Win_DEPLOY_INSTALLER_v3.7.2.0.exe
unknown
https://my.splashtop.com
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageProgramManagement/24.9/AgentPackageProgramManage
unknown
http://cacerts.digicert.
unknown
https://github.com/CommunityToolkit/WindowsCommunityToolkit
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageSTRemote/23.4/AgentPackageSTRemote.zip
unknown
https://system.data.sqlite.org/X
unknown
https://ps.atera.com/agentpackageswin/AgentPackageHeartbeat/16.9
unknown
http://www.abit.com.tw/
unknown
https://agent-api.atera.com/Production/Agent/recurringCommandResult
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
https://agent-api.atera.com/Production/Agent/AcknowledgeCommands
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=a59c9018-5d76-42b0-adb5-5e60d00da0f5
unknown
https://ps.atera.com/installers/splashtop/win/SplashtopStreamer.exe
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageTaskScheduler/13.0/AgentPackageTaskScheduler.zip
unknown
HTTPS://PS.ATERA.COM/AGENTPACKAGESNET45/AGENTPACKAGESTREMOTE/23.4/AGENTPACKAGESTREMOTE.ZIP
unknown
https://agent-api.P
unknown
http://www.w3.o
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://github.com/JamesNK/Newtonsoft.Json
unknown
https://agent-api.atera.com/PrhP
unknown
https://ps.atera.com/agentpackagesmac/Agent.Package.Availability/0.16/Agent.Package.Availability.zip
unknown
https://ps.atera.com/agentpackageswin/AgentPackageMarketplace/13.0/AgentPackageMarketplace.zip
unknown
https://dev.ditu.live.com/REST/v1/Transit/Stops/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageUpgradeAgent/27.2/AgentPackageUpgradeAgent.zip
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
https://ps.atera.com/agentpackageswin/AgentPackageSTRemote/16.0/Agen
unknown
https://ps.pndsn
unknown
https://www.sqlite.org/copyright.html2
unknown
HTTPS://PS.ATERA.COM/AGENTPACKAGESNET45/AGENT.PACKAGE.WATCHDOG/1.5/AGENT.PACKAGE.WATCHDOG.ZIP
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
unknown
https://agent-api.atera.com/Production/Agent/guiComm
unknown
https://urn.to/r/sds_see23https://urn.to/r/sds_see1UInnerVerify
unknown
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.12/AgentPackageA
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageInternalPoller/23.8/AgentPackageInternalPoller.z
unknown
https://system.data.sqlite.org/
unknown
http://crl.micros
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
40.119.152.241
unknown
United States
malicious
93.184.221.240
unknown
European Union
13.35.58.89
unknown
United States
35.157.63.229
unknown
United States
20.37.139.187
unknown
United States
2.19.126.163
unknown
European Union
13.35.58.124
unknown
United States
20.101.57.9
unknown
United States
35.71.184.3
unknown
United States
192.229.221.95
unknown
United States
13.35.58.7
unknown
United States
20.60.197.1
unknown
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av\{D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
STATE
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\3dfa46.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\3dfa46.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB9EFD7FDAF9AD115987000E181661F5
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CD868C8CE5A308147ABB306D829266BC
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C32B8CE0327C1E141950B4C9C2AD4DA7
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D9B1B1F0B1FC024D9390FE4B94D97D5
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\007F59F54ACD08842B2D98A10E6D1E3A
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB25C26F7C51D3C4AA2BED5600F46956
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01010F83113E72A4C81AD77422D2F947
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01D9DC4B27DFC0340B543A11D3CEBE07
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\ATERA Networks\AteraAgent\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\ATERA Networks\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\7D0A237E2F2A7564CA141B792446E854
INSTALLFOLDER_files_Feature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Features
INSTALLFOLDER_files_Feature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
LastUsedSource
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
Owner
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
SessionHash
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
Sequence
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0001
Owner
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0001
SessionHash
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0001
Sequence
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\3dfa4b.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\3dfa4b.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\TempPackages
C:\Windows\Installer\3dfa47.msi
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\3dfa53.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\3dfa53.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB9EFD7FDAF9AD115987000E181661F5
FF1292B61C97FBE4184B6C604D5EEB4F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CD868C8CE5A308147ABB306D829266BC
FF1292B61C97FBE4184B6C604D5EEB4F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C32B8CE0327C1E141950B4C9C2AD4DA7
FF1292B61C97FBE4184B6C604D5EEB4F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D9B1B1F0B1FC024D9390FE4B94D97D5
FF1292B61C97FBE4184B6C604D5EEB4F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\007F59F54ACD08842B2D98A10E6D1E3A
FF1292B61C97FBE4184B6C604D5EEB4F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB25C26F7C51D3C4AA2BED5600F46956
FF1292B61C97FBE4184B6C604D5EEB4F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01010F83113E72A4C81AD77422D2F947
FF1292B61C97FBE4184B6C604D5EEB4F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01D9DC4B27DFC0340B543A11D3CEBE07
FF1292B61C97FBE4184B6C604D5EEB4F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files\ATERA Networks\AteraAgent\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files\ATERA Networks\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
FF1292B61C97FBE4184B6C604D5EEB4F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\FF1292B61C97FBE4184B6C604D5EEB4F
INSTALLFOLDER_files_Feature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\Features
INSTALLFOLDER_files_Feature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
FF1292B61C97FBE4184B6C604D5EEB4F
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0001
Sequence
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0001
Sequence
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\WMI\Security
c688cf83-9945-5ff6-0e1e-1ff1f8a2ec9a
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\W32Time\Config
LastKnownGoodTime
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
AutoBackupLogFiles
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AteraAgent
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
AccountId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
IntegratorLogin
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
CompanyId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
AgentId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
ServerName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AlphaAgent
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
FileDirectory
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_USERS.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageUpgradeAgent
CommandID
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageUpgradeAgent
Version
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageUpgradeAgent
UsePassword
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageUpgradeAgent
IntervalSecs
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageUpgradeAgent
DownloadUrl
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageUpgradeAgent
CheckSum
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageUpgradeAgent
Arguments
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageTicketing
CommandID
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageTicketing
Version
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageTicketing
UsePassword
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageTicketing
IntervalSecs
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageTicketing
DownloadUrl
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageTicketing
CheckSum
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageTicketing
Arguments
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSTRemote
CommandID
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSTRemote
Version
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSTRemote
UsePassword
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSTRemote
IntervalSecs
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSTRemote
DownloadUrl
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSTRemote
CheckSum
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSTRemote
Arguments
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageAgentInformation
CommandID
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageAgentInformation
Version
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageAgentInformation
IntervalSecs
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageAgentInformation
DownloadUrl
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageAgentInformation
CheckSum
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageAgentInformation
Arguments
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageOsUpdates
CommandID
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageOsUpdates
Version
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageOsUpdates
IntervalSecs
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageOsUpdates
DownloadUrl
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageOsUpdates
CheckSum
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageOsUpdates
Arguments
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageProgramManagement
CommandID
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageProgramManagement
Version
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageProgramManagement
IntervalSecs
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageProgramManagement
DownloadUrl
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageProgramManagement
CheckSum
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageProgramManagement
Arguments
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageInternalPoller
CommandID
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageInternalPoller
Version
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageInternalPoller
UsePassword
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageInternalPoller
IntervalSecs
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageInternalPoller
DownloadUrl
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageInternalPoller
CheckSum
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageInternalPoller
Arguments
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageMonitoring
CommandID
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageMonitoring
Version
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageMonitoring
IntervalSecs
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageMonitoring
DownloadUrl
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageMonitoring
CheckSum
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageMonitoring
Arguments
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageHeartbeat
CommandID
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageHeartbeat
Version
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageHeartbeat
IntervalSecs
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageHeartbeat
DownloadUrl
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageHeartbeat
CheckSum
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageHeartbeat
Arguments
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSystemTools
CommandID
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSystemTools
Version
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSystemTools
IntervalSecs
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSystemTools
DownloadUrl
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSystemTools
CheckSum
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSystemTools
Arguments
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageMarketplace
CommandID
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageMarketplace
Version
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageMarketplace
DownloadUrl
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageMarketplace
CheckSum
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageMarketplace
Arguments
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageADRemote
CommandID
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageADRemote
Version
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageADRemote
IntervalSecs
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageADRemote
DownloadUrl
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageADRemote
CheckSum
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageADRemote
Arguments
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageRuntimeInstaller
CommandID
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageRuntimeInstaller
Version
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageRuntimeInstaller
IntervalSecs
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageRuntimeInstaller
DownloadUrl
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageRuntimeInstaller
CheckSum
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageRuntimeInstaller
Arguments
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\Agent.Package.Watchdog
CommandID
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\Agent.Package.Watchdog
Version
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\Agent.Package.Watchdog
IntervalSecs
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\Agent.Package.Watchdog
DownloadUrl
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\Agent.Package.Watchdog
CheckSum
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\Agent.Package.Watchdog
Arguments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform
ServiceSessionId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASMANCS
FileDirectory
There are 369 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
248AC190000
heap
page read and write
malicious
27DEC26C000
heap
page read and write
malicious
27DEC66C000
heap
page read and write
malicious
27D80539000
trusted library allocation
page read and write
malicious
2A342148000
heap
page read and write
malicious
2A329E61000
trusted library allocation
page read and write
malicious
1EE85220000
heap
page read and write
malicious
1D422C70000
heap
page read and write
malicious
248C5385000
heap
page read and write
malicious
248ACBD1000
trusted library allocation
page read and write
malicious
282B4E99000
trusted library allocation
page read and write
malicious
7FFB23B20000
unkown
page read and write
malicious
1F111BCB000
heap
page read and write
malicious
2A329C7F000
trusted library allocation
page read and write
malicious
27DEB230000
heap
page read and write
malicious
1D42338D000
trusted library allocation
page read and write
malicious
5234000
trusted library allocation
page read and write
malicious
18792DEF000
trusted library allocation
page read and write
malicious
2A329F68000
trusted library allocation
page read and write
malicious
27D80001000
trusted library allocation
page read and write
malicious
1EE9E2C8000
heap
page read and write
malicious
27D807EB000
trusted library allocation
page read and write
malicious
248C546E000
heap
page read and write
malicious
1D422C12000
unkown
page readonly
malicious
282B4E5C000
trusted library allocation
page read and write
malicious
282CD823000
heap
page read and write
malicious
187928C3000
trusted library allocation
page read and write
malicious
2A329149000
heap
page read and write
malicious
2A329FBD000
trusted library allocation
page read and write
malicious
7FFB23B20000
unkown
page read and write
malicious
248AC215000
heap
page read and write
malicious
282B4E8A000
trusted library allocation
page read and write
malicious
1D43C915000
heap
page read and write
malicious
2A32A141000
trusted library allocation
page read and write
malicious
7FFB23B20000
unkown
page read and write
malicious
18792851000
trusted library allocation
page read and write
malicious
18792A26000
trusted library allocation
page read and write
malicious
187AB1C0000
heap
page read and write
malicious
27D80299000
trusted library allocation
page read and write
malicious
27DEB1A9000
heap
page read and write
malicious
2069C85F000
trusted library allocation
page read and write
malicious
2A329CF6000
trusted library allocation
page read and write
malicious
1B35AEC5000
heap
page read and write
malicious
131ACD73000
trusted library allocation
page read and write
malicious
BE3C134000
stack
page read and write
malicious
248AC1D0000
heap
page read and write
malicious
7FFB23B20000
unkown
page read and write
malicious
2A3424DB000
heap
page read and write
malicious
1DD473A0000
heap
page read and write
malicious
2069BD9E000
heap
page read and write
malicious
2A328FD0000
heap
page read and write
malicious
1DD470F0000
heap
page read and write
malicious
248ACC3F000
trusted library allocation
page read and write
malicious
27DEC291000
heap
page read and write
malicious
29025B50000
heap
page read and write
malicious
2069BD80000
heap
page read and write
malicious
1D4232A1000
trusted library allocation
page read and write
malicious
27D80060000
trusted library allocation
page read and write
malicious
27D806BB000
trusted library allocation
page read and write
malicious
7FFB036E9000
unkown
page read and write
malicious
2A32A00B000
trusted library allocation
page read and write
malicious
1EE851E0000
heap
page read and write
malicious
1EE852CA000
heap
page read and write
malicious
187920EC000
heap
page read and write
malicious
1B35B4DB000
trusted library allocation
page read and write
malicious
27DEC6DB000
heap
page read and write
malicious
1B35A972000
unkown
page readonly
malicious
248ACC86000
trusted library allocation
page read and write
malicious
5191000
trusted library allocation
page read and write
malicious
248ACBCC000
trusted library allocation
page read and write
malicious
248ACAA3000
trusted library allocation
page read and write
malicious
27DEB15C000
heap
page read and write
malicious
1DD4710F000
heap
page read and write
malicious
4844000
trusted library allocation
page read and write
malicious
1DD479E3000
trusted library allocation
page read and write
malicious
2A329C08000
trusted library allocation
page read and write
malicious
41F4000
heap
page read and write
malicious
27DEC632000
heap
page read and write
malicious
1879213A000
heap
page read and write
malicious
2A3424C0000
heap
page read and write
malicious
18792897000
trusted library allocation
page read and write
malicious
248ACC3B000
trusted library allocation
page read and write
malicious
1B373BC0000
heap
page read and write
malicious
2A329DBE000
trusted library allocation
page read and write
malicious
2A34254E000
heap
page read and write
malicious
27D80102000
trusted library allocation
page read and write
malicious
7FFB0BB30000
unkown
page read and write
malicious
1F111CC0000
heap
page read and write
malicious
282CD490000
heap
page read and write
malicious
2069BDC1000
heap
page read and write
malicious
1851F601000
trusted library allocation
page read and write
malicious
BE3C335000
stack
page read and write
malicious
27DEB128000
heap
page read and write
malicious
1EE8523E000
heap
page read and write
malicious
282B4F4C000
trusted library allocation
page read and write
malicious
7FFB23B20000
unkown
page read and write
malicious
27D8033C000
trusted library allocation
page read and write
malicious
131ACDBF000
trusted library allocation
page read and write
malicious
131AC42B000
heap
page read and write
malicious
7FFB23B20000
unkown
page read and write
malicious
AC472F3000
stack
page read and write
malicious
2A329A41000
trusted library allocation
page read and write
malicious
2A329CE0000
trusted library allocation
page read and write
malicious
1DD47132000
heap
page read and write
malicious
282B4E84000
trusted library allocation
page read and write
malicious
BE3B935000
stack
page read and write
malicious
1851EE00000
heap
page read and write
malicious
2A329270000
heap
page read and write
malicious
2A329E4E000
trusted library allocation
page read and write
malicious
BE3C435000
stack
page read and write
malicious
282B4DD1000
trusted library allocation
page read and write
malicious
187928D3000
trusted library allocation
page read and write
malicious
282B4F02000
trusted library allocation
page read and write
malicious
27D804E5000
trusted library allocation
page read and write
malicious
27D8035B000
trusted library allocation
page read and write
malicious
1EE852AC000
heap
page read and write
malicious
187920CB000
heap
page read and write
malicious
27D80819000
trusted library allocation
page read and write
malicious
1B35B261000
trusted library allocation
page read and write
malicious
1D43C926000
heap
page read and write
malicious
7FFB23B20000
unkown
page read and write
malicious
282B3042000
unkown
page readonly
malicious
248ACC0C000
trusted library allocation
page read and write
malicious
282CD5E0000
heap
page read and write
malicious
27D802B1000
trusted library allocation
page read and write
malicious
2A342563000
heap
page read and write
malicious
248AC1CB000
heap
page read and write
malicious
27D80545000
trusted library allocation
page read and write
malicious
1B35B3D1000
trusted library allocation
page read and write
malicious
1D43C717000
heap
page read and write
malicious
248ACA11000
trusted library allocation
page read and write
malicious
1B35ABFD000
heap
page read and write
malicious
1B35ABB1000
heap
page read and write
malicious
2069BDCB000
heap
page read and write
malicious
1DD470F8000
heap
page read and write
malicious
248C52AD000
heap
page read and write
malicious
2069BBD2000
unkown
page readonly
malicious
1851F683000
trusted library allocation
page read and write
malicious
1EE85260000
heap
page read and write
malicious
1EE85A08000
trusted library allocation
page read and write
malicious
1EE85032000
unkown
page readonly
malicious
29025C50000
heap
page read and write
malicious
2A32A1A6000
trusted library allocation
page read and write
malicious
1851EE68000
heap
page read and write
malicious
2069BFB0000
heap
page read and write
malicious
27D80321000
trusted library allocation
page read and write
malicious
27DEC69C000
heap
page read and write
malicious
27D80724000
trusted library allocation
page read and write
malicious
2A329E50000
trusted library allocation
page read and write
malicious
131AC472000
heap
page read and write
malicious
2A32A0BA000
trusted library allocation
page read and write
malicious
1DD472C2000
unkown
page readonly
malicious
27D803D3000
trusted library allocation
page read and write
malicious
187920B0000
heap
page read and write
malicious
1851EEE9000
heap
page read and write
malicious
1851EE60000
heap
page read and write
malicious
A728B85000
stack
page read and write
malicious
282B4F36000
trusted library allocation
page read and write
malicious
29025B5B000
heap
page read and write
malicious
282B316E000
heap
page read and write
malicious
282B30EC000
heap
page read and write
malicious
2069C7E7000
trusted library allocation
page read and write
malicious
248AC490000
heap
page read and write
malicious
27D804E1000
trusted library allocation
page read and write
malicious
1D43CB6D000
heap
page read and write
malicious
131ACD47000
trusted library allocation
page read and write
malicious
1DD47175000
heap
page read and write
malicious
2069C7A1000
trusted library allocation
page read and write
malicious
2A32A19C000
trusted library allocation
page read and write
malicious
1D423198000
heap
page read and write
malicious
27D80232000
trusted library allocation
page read and write
malicious
282B33D0000
heap
page read and write
malicious
48F0000
heap
page read and write
malicious
282B4E59000
trusted library allocation
page read and write
malicious
1EE85991000
trusted library allocation
page read and write
malicious
27D805AD000
trusted library allocation
page read and write
malicious
1B35AD40000
heap
page read and write
malicious
27DEB1C0000
heap
page read and write
malicious
131AC431000
heap
page read and write
malicious
2A329CD3000
trusted library allocation
page read and write
malicious
2A32A04F000
trusted library allocation
page read and write
malicious
27D8085E000
trusted library allocation
page read and write
malicious
1DD4712C000
heap
page read and write
malicious
1D422ACC000
heap
page read and write
malicious
2A329EA8000
trusted library allocation
page read and write
malicious
1EE9E228000
heap
page read and write
malicious
2A329DDF000
trusted library allocation
page read and write
malicious
187AB3DD000
heap
page read and write
malicious
2A342100000
heap
page read and write
malicious
1F111BE3000
heap
page read and write
malicious
2A3425F7000
heap
page read and write
malicious
248ACB73000
trusted library allocation
page read and write
malicious
1D422772000
unkown
page readonly
malicious
2A34268D000
heap
page read and write
malicious
18792DAD000
trusted library allocation
page read and write
malicious
27DEB400000
heap
page read and write
malicious
29025C70000
heap
page read and write
malicious
27D803EB000
trusted library allocation
page read and write
malicious
27D80726000
trusted library allocation
page read and write
malicious
18792070000
heap
page read and write
malicious
2A32A0BC000
trusted library allocation
page read and write
malicious
187AB286000
heap
page read and write
malicious
24616A80000
heap
page read and write
malicious
27D8058E000
trusted library allocation
page read and write
malicious
27D803D9000
trusted library allocation
page read and write
malicious
47A1000
trusted library allocation
page read and write
malicious
282B4F05000
trusted library allocation
page read and write
malicious
27D802FE000
trusted library allocation
page read and write
malicious
2A342505000
heap
page read and write
malicious
1D422A40000
heap
page read and write
malicious
1B35B377000
trusted library allocation
page read and write
malicious
1EE85B96000
trusted library allocation
page read and write
malicious
131ACD01000
trusted library allocation
page read and write
malicious
282B3120000
heap
page read and write
malicious
2A32A056000
trusted library allocation
page read and write
malicious
27D8051E000
trusted library allocation
page read and write
malicious
27DEC64F000
heap
page read and write
malicious
2A329100000
heap
page read and write
malicious
1F111BC0000
heap
page read and write
malicious
4EEA000
heap
page read and write
malicious
1D422860000
heap
page read and write
malicious
27D80560000
trusted library allocation
page read and write
malicious
2A329E0C000
trusted library allocation
page read and write
malicious
2069C813000
trusted library allocation
page read and write
malicious
18792193000
heap
page read and write
malicious
1B373C55000
heap
page read and write
malicious
1D422A80000
heap
page read and write
malicious
27DEC617000
heap
page read and write
malicious
131AC6E0000
heap
page read and write
malicious
1851F673000
trusted library allocation
page read and write
malicious
BE3C229000
stack
page read and write
malicious
1D422A4C000
heap
page read and write
malicious
7FFAAC7E4000
trusted library allocation
page read and write
malicious
2A329F12000
trusted library allocation
page read and write
malicious
464A000
heap
page read and write
malicious
2A32913F000
heap
page read and write
malicious
27DEC610000
heap
page read and write
malicious
27D80543000
trusted library allocation
page read and write
malicious
1F111BE7000
heap
page read and write
malicious
27D803F0000
trusted library allocation
page read and write
malicious
2069C823000
trusted library allocation
page read and write
malicious
1DD47961000
trusted library allocation
page read and write
malicious
27DEB120000
heap
page read and write
malicious
282B3184000
heap
page read and write
malicious
BE3A0F5000
stack
page read and write
malicious
2A342905000
heap
page read and write
malicious
18792E36000
trusted library allocation
page read and write
malicious
29025B74000
heap
page read and write
malicious
282CD4D7000
heap
page read and write
malicious
1EE9E222000
heap
page read and write
malicious
2A3424CE000
heap
page read and write
malicious
1D422A86000
heap
page read and write
malicious
1F111CE0000
heap
page read and write
malicious
27D804D7000
trusted library allocation
page read and write
malicious
1D423841000
trusted library allocation
page read and write
malicious
282B4E82000
trusted library allocation
page read and write
malicious
206B4E60000
heap
page read and write
malicious
2A32918E000
heap
page read and write
malicious
131AC3F0000
heap
page read and write
malicious
2A329AAE000
trusted library allocation
page read and write
malicious
1851EE9D000
heap
page read and write
malicious
248AC275000
heap
page read and write
malicious
27D80353000
trusted library allocation
page read and write
malicious
248AC1AB000
heap
page read and write
malicious
2056C000000
heap
page read and write
malicious
2069BE0D000
heap
page read and write
malicious
2A3421CD000
heap
page read and write
malicious
1EE85B0D000
trusted library allocation
page read and write
malicious
131ACD83000
trusted library allocation
page read and write
malicious
1DD479D3000
trusted library allocation
page read and write
malicious
282B30E0000
heap
page read and write
malicious
187920FC000
heap
page read and write
malicious
27DEC317000
heap
page read and write
malicious
1B35AB70000
heap
page read and write
malicious
5163000
trusted library allocation
page read and write
7FFAAC890000
trusted library allocation
page read and write
206B4EEF000
heap
page read and write
2056CA89000
heap
page read and write
1D422C80000
unkown
page readonly
5B71000
trusted library allocation
page read and write
1F111B60000
heap
page read and write
131ACD3D000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7FFAAC632000
trusted library allocation
page read and write
7FFAAC7FD000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
7FFAACDA0000
trusted library allocation
page read and write
282CD518000
heap
page read and write
7FFAAC6BC000
trusted library allocation
page execute and read and write
4F50000
trusted library allocation
page read and write
DC3F8FE000
stack
page read and write
7580000
trusted library allocation
page read and write
2056CADF000
heap
page read and write
6D20000
trusted library allocation
page read and write
27D80817000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
2056CA91000
heap
page read and write
75D0000
trusted library allocation
page read and write
1D422D78000
unkown
page readonly
187AB33D000
heap
page read and write
7FFAAC808000
trusted library allocation
page read and write
1FCAC0C0000
heap
page read and write
2CE0AFE000
stack
page read and write
248C5364000
heap
page read and write
24BAEC45000
heap
page read and write
18A90C90000
heap
page read and write
27DEB3F5000
heap
page read and write
2F77000
heap
page read and write
5A571FD000
stack
page read and write
4886000
trusted library allocation
page read and write
7FFAAC6E6000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
1DD47340000
heap
page execute and read and write
2CE0EFF000
stack
page read and write
7953CFE000
stack
page read and write
1ACC0460000
heap
page read and write
7FFAAC806000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
29515D00000
heap
page read and write
98800FE000
unkown
page readonly
1852F608000
trusted library allocation
page read and write
1ACC0463000
heap
page read and write
516C000
trusted library allocation
page execute and read and write
C8A297C000
stack
page read and write
6CF0000
trusted library allocation
page read and write
77AE000
stack
page read and write
2A329B05000
trusted library allocation
page read and write
9441FFE000
stack
page read and write
7580000
trusted library allocation
page read and write
7FFAAC662000
trusted library allocation
page read and write
2A329B01000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
7FFAAC990000
trusted library allocation
page execute and read and write
7580000
trusted library allocation
page read and write
25A1BD02000
heap
page read and write
450E000
stack
page read and write
248BCA11000
trusted library allocation
page read and write
248C522F000
heap
page read and write
131ACC6C000
heap
page read and write
9C8C7F6000
stack
page read and write
AC479FF000
stack
page read and write
248C5316000
heap
page read and write
1ACC045E000
heap
page read and write
20AD4980000
remote allocation
page read and write
5169000
trusted library allocation
page execute and read and write
7FFAACD10000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
187AB47B000
heap
page read and write
1851EDC0000
heap
page read and write
248AC920000
heap
page read and write
7FFAACA50000
trusted library allocation
page read and write
D1D3BFF000
stack
page read and write
2069C8CF000
trusted library allocation
page read and write
9441BFC000
stack
page read and write
2056CB50000
heap
page read and write
2A329C00000
trusted library allocation
page read and write
2F66000
heap
page read and write
5A56FFF000
stack
page read and write
7540000
trusted library allocation
page read and write
187AB383000
heap
page read and write
43D3000
trusted library allocation
page read and write
72CC000
heap
page read and write
67A8000
trusted library allocation
page read and write
2056C1F0000
heap
page read and write
7560000
trusted library allocation
page read and write
282B3064000
unkown
page readonly
282B32D0000
heap
page read and write
6D20000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
3097000
heap
page read and write
1D422C75000
heap
page read and write
27AE000
heap
page read and write
6DBE000
stack
page read and write
7FFAAC823000
trusted library allocation
page read and write
98FFA7B000
stack
page read and write
187AB2C6000
heap
page read and write
6CD0000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
27D800CD000
trusted library allocation
page read and write
24BAEC13000
heap
page read and write
2056C03A000
heap
page read and write
1FCAF1D8000
heap
page read and write
6CD0000
trusted library allocation
page read and write
7FFAAC8D0000
trusted library allocation
page read and write
3050000
heap
page read and write
DD353D1000
stack
page read and write
1EE851E5000
heap
page read and write
5272000
trusted library allocation
page read and write
7FFAAC82C000
trusted library allocation
page read and write
7FFAACA20000
trusted library allocation
page read and write
2A3292F5000
heap
page read and write
7FFAACB70000
trusted library allocation
page read and write
282B3124000
heap
page read and write
27D806A1000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
1ACC045B000
heap
page read and write
7FFAAC65B000
trusted library allocation
page execute and read and write
6D20000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
29515F02000
heap
page read and write
7FFAAC664000
trusted library allocation
page read and write
2A329B11000
trusted library allocation
page read and write
7584000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
246174A1000
heap
page read and write
5A56B34000
stack
page read and write
7FFAAC8D0000
trusted library allocation
page read and write
7FFAAC847000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
7FFAACCB0000
trusted library allocation
page execute and read and write
187AB2FC000
heap
page read and write
75A0000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
18A90E68000
heap
page read and write
7FFAAC825000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
18792740000
trusted library allocation
page read and write
1D43BAB2000
unkown
page readonly
29516390000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
7570000
trusted library allocation
page read and write
2056CBCA000
heap
page read and write
7540000
trusted library allocation
page read and write
7FFAAC726000
trusted library allocation
page execute and read and write
1851EE9F000
heap
page read and write
3060000
heap
page read and write
7560000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
27D800D9000
trusted library allocation
page read and write
1FCAC248000
heap
page read and write
248C5310000
heap
page read and write
7580000
trusted library allocation
page read and write
1D43CB84000
heap
page read and write
6D20000
trusted library allocation
page read and write
7FFAAC810000
trusted library allocation
page read and write
7FFAAC716000
trusted library allocation
page execute and read and write
4F03000
trusted library allocation
page execute and read and write
6D44000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
2056CA72000
heap
page read and write
6D20000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
27D80595000
trusted library allocation
page read and write
282CD545000
heap
page read and write
7540000
trusted library allocation
page read and write
364B9FD000
stack
page read and write
2069C8E3000
trusted library allocation
page read and write
7FFAAC950000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
2A329E97000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
75C0000
trusted library allocation
page read and write
2069C8F1000
trusted library allocation
page read and write
187AB24D000
heap
page read and write
7540000
trusted library allocation
page read and write
1D4332A1000
trusted library allocation
page read and write
7FFAAC643000
trusted library allocation
page read and write
1B35AEC0000
heap
page read and write
4AF0000
heap
page read and write
1D422770000
unkown
page readonly
29B0000
heap
page read and write
7FFAACC50000
trusted library allocation
page execute and read and write
29025DD0000
heap
page read and write
7FFAAC806000
trusted library allocation
page read and write
35A0000
heap
page read and write
27D800A7000
trusted library allocation
page read and write
18A90EA3000
heap
page read and write
286F000
stack
page read and write
2A329FE8000
trusted library allocation
page read and write
7C0697E000
stack
page read and write
2056CA21000
heap
page read and write
6D40000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
1EE85B43000
trusted library allocation
page read and write
1ACC0443000
heap
page read and write
1ACC044C000
heap
page read and write
75A0000
trusted library allocation
page read and write
7FFAAC84C000
trusted library allocation
page read and write
D4AFBFD000
stack
page read and write
246174E9000
heap
page read and write
1EE851B0000
heap
page read and write
6D20000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
2056CA4D000
heap
page read and write
4F32000
trusted library allocation
page read and write
73D16000
unkown
page readonly
248AC1D6000
heap
page read and write
2461746D000
heap
page read and write
6D30000
trusted library allocation
page read and write
1ACC044E000
heap
page read and write
24616B3A000
heap
page read and write
1851F580000
heap
page execute and read and write
1ACC04A0000
heap
page read and write
6D20000
trusted library allocation
page read and write
248C534E000
heap
page read and write
1D43BD5E000
unkown
page readonly
246175CA000
heap
page read and write
6D60000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
1DD47AB5000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7FFAAC720000
trusted library allocation
page execute and read and write
1851F050000
trusted library allocation
page read and write
7FFAAC64D000
trusted library allocation
page execute and read and write
6CD0000
trusted library allocation
page read and write
6BDE000
stack
page read and write
2056BFF0000
heap
page read and write
206B4E85000
heap
page read and write
7FFAACCA0000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
364AEFD000
stack
page read and write
1ACC0455000
heap
page read and write
131ACD3F000
trusted library allocation
page read and write
2069BDC3000
heap
page read and write
7FFAACCF0000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7FFAAC860000
trusted library allocation
page execute and read and write
282B4F48000
trusted library allocation
page read and write
246175B8000
heap
page read and write
7580000
trusted library allocation
page read and write
25A1C402000
trusted library allocation
page read and write
248ACC76000
trusted library allocation
page read and write
7FFAAC68D000
trusted library allocation
page execute and read and write
6CD9000
trusted library allocation
page read and write
4694000
trusted library allocation
page read and write
27DEB350000
heap
page read and write
18792A1C000
trusted library allocation
page read and write
7FFAAC65D000
trusted library allocation
page execute and read and write
6CD0000
trusted library allocation
page read and write
7FFAAC8E0000
trusted library allocation
page read and write
131ACC36000
heap
page read and write
1D43BB54000
unkown
page readonly
248C5283000
heap
page read and write
7FFAAC8B0000
trusted library allocation
page read and write
7FFAAC831000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
22115860000
heap
page read and write
2A32A054000
trusted library allocation
page read and write
2A329A94000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
2D30000
heap
page read and write
1FCAF1A0000
heap
page read and write
27D800B3000
trusted library allocation
page read and write
7FFB23B25000
unkown
page readonly
6CF0000
trusted library allocation
page read and write
D1D42FE000
stack
page read and write
7540000
trusted library allocation
page read and write
187AB202000
heap
page read and write
7FFAACA40000
trusted library allocation
page read and write
BE3AE3E000
stack
page read and write
7FFAAC684000
trusted library allocation
page read and write
7FFAAC8C0000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
6C30000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
2069BF60000
heap
page execute and read and write
1D4332C1000
trusted library allocation
page read and write
7FFAAC810000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7FFAACB60000
trusted library allocation
page read and write
7FFAACC60000
trusted library allocation
page read and write
364B5FE000
stack
page read and write
1EE85EE8000
trusted library allocation
page read and write
9C8CFFE000
unkown
page readonly
7550000
trusted library allocation
page read and write
2056CB42000
heap
page read and write
6D20000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
1C53ED13000
heap
page read and write
2C99000
heap
page read and write
2A3298A0000
heap
page read and write
18A90EA7000
heap
page read and write
7FFAAC9A0000
trusted library allocation
page read and write
2069BDC9000
heap
page read and write
CE4D871000
stack
page read and write
7580000
trusted library allocation
page read and write
5BFFFFE000
stack
page read and write
6D40000
trusted library allocation
page read and write
2056CA23000
heap
page read and write
2056CB54000
heap
page read and write
6D30000
trusted library allocation
page read and write
7FFAAC9A3000
trusted library allocation
page read and write
7FFAAC914000
trusted library allocation
page read and write
1B373E30000
heap
page read and write
6D20000
trusted library allocation
page read and write
5B801FF000
stack
page read and write
282CD590000
heap
page execute and read and write
7FFAAC836000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
2F6F000
heap
page read and write
1DD47270000
trusted library allocation
page read and write
248ACA00000
heap
page execute and read and write
282CD600000
unkown
page readonly
7C05EAB000
stack
page read and write
A87EDFE000
stack
page read and write
2056C0B0000
heap
page read and write
27D800FD000
trusted library allocation
page read and write
187AB3B5000
heap
page read and write
7FFAAC6F0000
trusted library allocation
page execute and read and write
1C53EC00000
heap
page read and write
1ACC0451000
heap
page read and write
27D8068C000
trusted library allocation
page read and write
2E40000
trusted library section
page read and write
7FFAAC790000
trusted library allocation
page execute and read and write
1852F601000
trusted library allocation
page read and write
7FFAAC7F0000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
339F000
stack
page read and write
6D20000
trusted library allocation
page read and write
7FFAAC6BC000
trusted library allocation
page execute and read and write
6D20000
trusted library allocation
page read and write
2069BDAA000
heap
page read and write
2769000
heap
page read and write
7FFAAC716000
trusted library allocation
page read and write
27D80051000
trusted library allocation
page read and write
18A90EE9000
heap
page read and write
7FFAAC820000
trusted library allocation
page read and write
18792750000
heap
page read and write
6CF0000
trusted library allocation
page read and write
98FFEFE000
unkown
page readonly
6CD0000
trusted library allocation
page read and write
246174F4000
heap
page read and write
2056CA83000
heap
page read and write
2056CA23000
heap
page read and write
6CF0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
2A341A70000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
27DEB3D0000
trusted library allocation
page read and write
246174F1000
heap
page read and write
6D20000
trusted library allocation
page read and write
7FFAAC8A0000
trusted library allocation
page execute and read and write
1ACC045C000
heap
page read and write
27DEC65D000
heap
page read and write
7FFAAC7D3000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
1C53EC2B000
heap
page read and write
282CD563000
heap
page read and write
6CD0000
trusted library allocation
page read and write
248C52D7000
heap
page read and write
24617476000
heap
page read and write
27D80097000
trusted library allocation
page read and write
7FFAAC780000
trusted library allocation
page execute and read and write
7FFAAC746000
trusted library allocation
page execute and read and write
7FFAAC840000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
24BB0B70000
remote allocation
page read and write
7AEE000
stack
page read and write
24BAEC00000
heap
page read and write
7580000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
1EE9E2CB000
heap
page read and write
1B35AD45000
heap
page read and write
7580000
trusted library allocation
page read and write
5150000
trusted library allocation
page read and write
7FFAAC660000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
248C5278000
heap
page read and write
248C4A40000
trusted library allocation
page read and write
32F4000
heap
page read and write
57A5000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
1EE85B81000
trusted library allocation
page read and write
2056CBCC000
heap
page read and write
2A329A9C000
trusted library allocation
page read and write
1FCACB26000
heap
page read and write
7FFAAC652000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
291B000
trusted library allocation
page execute and read and write
7FFAAC859000
trusted library allocation
page read and write
2A339ABF000
trusted library allocation
page read and write
2A32A025000
trusted library allocation
page read and write
2056CA88000
heap
page read and write
7580000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
51ED000
trusted library allocation
page read and write
187920F2000
heap
page read and write
7580000
trusted library allocation
page read and write
BE3AD3D000
stack
page read and write
351E000
stack
page read and write
7FFAAC66D000
trusted library allocation
page execute and read and write
9C8CBFE000
unkown
page readonly
29515E48000
heap
page read and write
364B8FD000
stack
page read and write
246174A1000
heap
page read and write
A729DFC000
stack
page read and write
248C544B000
heap
page read and write
BE3A4FD000
stack
page read and write
4F37000
trusted library allocation
page execute and read and write
6CD0000
trusted library allocation
page read and write
7FFAAC66B000
trusted library allocation
page execute and read and write
5160000
trusted library allocation
page read and write
1FCAC287000
heap
page read and write
9442BFE000
stack
page read and write
7560000
trusted library allocation
page read and write
5B800FF000
stack
page read and write
6D20000
trusted library allocation
page read and write
2F7A000
heap
page read and write
498E000
stack
page read and write
7560000
trusted library allocation
page read and write
24617440000
heap
page read and write
331E000
stack
page read and write
2461759F000
heap
page read and write
5190EFC000
stack
page read and write
5190DFE000
stack
page read and write
1EE853C0000
heap
page read and write
18A90E52000
heap
page read and write
246174F4000
heap
page read and write
248C533E000
heap
page read and write
7FFAACBA0000
trusted library allocation
page read and write
7FFAAC81E000
trusted library allocation
page read and write
98802FE000
unkown
page readonly
D5AB71000
stack
page read and write
7560000
trusted library allocation
page read and write
7FFAAC683000
trusted library allocation
page read and write
1EE9E220000
heap
page read and write
6CD0000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
1851F5F0000
heap
page read and write
7FFAAC820000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
75A4000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7FFAAC68D000
trusted library allocation
page execute and read and write
BE3AB29000
stack
page read and write
7FFB23B22000
unkown
page readonly
7FFAAC800000
trusted library allocation
page read and write
7FFAAC716000
trusted library allocation
page execute and read and write
24BAEC2B000
heap
page read and write
364ACFF000
stack
page read and write
2DCE000
stack
page read and write
131ACBC0000
heap
page read and write
1DD472D8000
unkown
page readonly
7580000
trusted library allocation
page read and write
2C08000
heap
page read and write
18792265000
heap
page read and write
DD35EFE000
stack
page read and write
1DD4714C000
heap
page read and write
2069BF00000
trusted library allocation
page read and write
AC47BFE000
stack
page read and write
CE4D27E000
stack
page read and write
6CF0000
trusted library allocation
page read and write
7FFAAC80E000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
1879288D000
trusted library allocation
page read and write
1EE8526A000
heap
page read and write
1EE85920000
heap
page execute and read and write
7583000
trusted library allocation
page read and write
24617547000
heap
page read and write
18A90F02000
trusted library allocation
page read and write
2056CA30000
heap
page read and write
2EE7000
trusted library allocation
page execute and read and write
7C065FE000
stack
page read and write
7FFAACA00000
trusted library allocation
page read and write
9C8C8FE000
unkown
page readonly
7FFAAC8B0000
trusted library allocation
page execute and read and write
27D80690000
trusted library allocation
page read and write
1FCAC248000
heap
page read and write
7580000
trusted library allocation
page read and write
246169C0000
heap
page read and write
6CD0000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
718E000
stack
page read and write
6D30000
trusted library allocation
page read and write
49D0000
trusted library allocation
page execute and read and write
18A91019000
heap
page read and write
6D20000
trusted library allocation
page read and write
282B310B000
heap
page read and write
2A3421F7000
heap
page read and write
1D422C30000
trusted library allocation
page read and write
D1D3FFE000
stack
page read and write
18792E14000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7FFAAC8D0000
trusted library allocation
page execute and read and write
7FFAACDC0000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
7FFAAC700000
trusted library allocation
page read and write
CE4C9F7000
stack
page read and write
7FFAAC67D000
trusted library allocation
page execute and read and write
1EE9E28F000
heap
page read and write
18792E03000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
2461745D000
heap
page read and write
6CD0000
trusted library allocation
page read and write
2056C01B000
heap
page read and write
BE3BC3E000
stack
page read and write
7560000
trusted library allocation
page read and write
4833000
trusted library allocation
page read and write
364ADFE000
stack
page read and write
2A342590000
heap
page read and write
206AC7B1000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
282CD802000
heap
page read and write
7560000
trusted library allocation
page read and write
27D8066A000
trusted library allocation
page read and write
248C5424000
heap
page read and write
3090000
heap
page read and write
2056CBBD000
heap
page read and write
131AC660000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
131AC680000
trusted library allocation
page read and write
1DD60205000
heap
page read and write
2A00000
heap
page read and write
CE4CCFE000
stack
page read and write
BE3B53E000
stack
page read and write
24617499000
heap
page read and write
2056CA20000
heap
page read and write
6CF0000
trusted library allocation
page read and write
24BAEC70000
heap
page read and write
6D20000
trusted library allocation
page read and write
2069BE0A000
heap
page read and write
1B35ABBB000
heap
page read and write
D1D46FE000
stack
page read and write
94424FD000
stack
page read and write
7FFAAC870000
trusted library allocation
page execute and read and write
7FFAAC860000
trusted library allocation
page read and write
7FFAAC7E5000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7FFB23B20000
unkown
page read and write
7FFAAC850000
trusted library allocation
page read and write
CE4C8FE000
stack
page read and write
131AC4F0000
heap
page read and write
246175B4000
heap
page read and write
282B316A000
heap
page read and write
6CF0000
trusted library allocation
page read and write
6D23000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
1D422D20000
heap
page read and write
7570000
trusted library allocation
page read and write
7FFAAC66D000
trusted library allocation
page execute and read and write
282B3128000
heap
page read and write
2930000
heap
page read and write
24BAED28000
heap
page read and write
6CF0000
trusted library allocation
page read and write
7FFAAC746000
trusted library allocation
page execute and read and write
BE3A5FE000
stack
page read and write
7FFAAC860000
trusted library allocation
page read and write
1EE9E267000
heap
page read and write
1FCAC200000
heap
page read and write
1C53EC39000
heap
page read and write
75A0000
trusted library allocation
page read and write
187AB355000
heap
page read and write
27D8064E000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
1FCAF1A5000
heap
page read and write
6D20000
trusted library allocation
page read and write
24616B30000
heap
page read and write
2056CBAE000
heap
page read and write
6D20000
trusted library allocation
page read and write
7FFAAC856000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
BE3A1FF000
stack
page read and write
7540000
trusted library allocation
page read and write
7FFAAC694000
trusted library allocation
page read and write
18A91102000
heap
page read and write
2056CA22000
heap
page read and write
6CF0000
trusted library allocation
page read and write
2A329B09000
trusted library allocation
page read and write
2069BF20000
trusted library allocation
page read and write
43F4000
heap
page read and write
2E0E000
stack
page read and write
1ACC0431000
heap
page read and write
2461748D000
heap
page read and write
C8A2A7E000
unkown
page readonly
7FFAAC726000
trusted library allocation
page read and write
18A90ED4000
heap
page read and write
1D43C922000
heap
page read and write
2056CA91000
heap
page read and write
2FF7000
stack
page read and write
7FFAAC746000
trusted library allocation
page execute and read and write
6CD0000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
7FFAAC990000
trusted library allocation
page execute and read and write
4F14000
trusted library allocation
page read and write
2E80000
heap
page read and write
2056CBD1000
heap
page read and write
7580000
trusted library allocation
page read and write
33A7000
heap
page read and write
7590000
trusted library allocation
page read and write
D5AFFF000
stack
page read and write
7580000
trusted library allocation
page read and write
A87F07E000
unkown
page readonly
1EE9E2BB000
heap
page read and write
7FFAAC920000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
5BFFDF8000
stack
page read and write
1D423803000
trusted library allocation
page read and write
27D800AB000
trusted library allocation
page read and write
2056CA8D000
heap
page read and write
7FFAAC810000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
246175A8000
heap
page read and write
A87EC7D000
stack
page read and write
7FFAAC9F0000
trusted library allocation
page read and write
2069BE08000
heap
page read and write
7FFAAC8A6000
trusted library allocation
page read and write
7FFAAC76B000
trusted library allocation
page execute and read and write
1C53EC7F000
heap
page read and write
6CD0000
trusted library allocation
page read and write
246175A8000
heap
page read and write
7FFAAC716000
trusted library allocation
page read and write
D6A86FC000
stack
page read and write
131ACE55000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
18792E10000
trusted library allocation
page read and write
B8118FE000
stack
page read and write
7580000
trusted library allocation
page read and write
364AFFE000
stack
page read and write
6D20000
trusted library allocation
page read and write
2A32A130000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
2056CBB6000
heap
page read and write
6CD0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
1B35AB9B000
heap
page read and write
24BAED00000
heap
page read and write
282B4C60000
heap
page read and write
246175CB000
heap
page read and write
A87E87E000
unkown
page readonly
282CD7E0000
heap
page read and write
282B31F0000
heap
page read and write
75A0000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
DD3647E000
stack
page read and write
7FFAAC830000
trusted library allocation
page read and write
7FFAAC850000
trusted library allocation
page read and write
7FFAAC664000
trusted library allocation
page read and write
EEDDBFF000
unkown
page read and write
7590000
trusted library allocation
page read and write
7FFB23B16000
unkown
page readonly
18A90D90000
trusted library allocation
page read and write
1EE9E2BF000
heap
page read and write
27D800DD000
trusted library allocation
page read and write
7FFAAC822000
trusted library allocation
page read and write
2AE0000
heap
page read and write
75A0000
trusted library allocation
page read and write
5008000
trusted library allocation
page read and write
1DD47950000
heap
page execute and read and write
BE3BA3B000
stack
page read and write
7FFAAC84D000
trusted library allocation
page read and write
131ACC2C000
heap
page read and write
6D70000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
2C08000
heap
page read and write
6CD0000
trusted library allocation
page read and write
2BFC000
heap
page read and write
DD3637F000
stack
page read and write
7544000
trusted library allocation
page read and write
7FFAAC7E3000
trusted library allocation
page read and write
282CD806000
heap
page read and write
1D43BBC0000
heap
page execute and read and write
187AB36E000
heap
page read and write
248C52C9000
heap
page read and write
6D20000
trusted library allocation
page read and write
4865000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
2A329B0D000
trusted library allocation
page read and write
206B4E82000
heap
page read and write
1B35AB30000
heap
page read and write
7FFAAC640000
trusted library allocation
page read and write
187AB325000
heap
page read and write
1B35B4D8000
trusted library allocation
page read and write
131AC43B000
heap
page read and write
7580000
trusted library allocation
page read and write
248C52E2000
heap
page read and write
1D422DF5000
heap
page read and write
6CD0000
trusted library allocation
page read and write
2056CB49000
heap
page read and write
1EE85370000
trusted library allocation
page read and write
2056CAE4000
heap
page read and write
6D40000
trusted library allocation
page read and write
4790000
heap
page execute and read and write
32DE000
stack
page read and write
6D20000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
7581000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
27D80634000
trusted library allocation
page read and write
2069C790000
heap
page execute and read and write
24616AA5000
heap
page read and write
6CF0000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
2056C0BA000
heap
page read and write
7580000
trusted library allocation
page read and write
7FFAAC660000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
1C53EC13000
heap
page read and write
6CF0000
trusted library allocation
page read and write
B8117FE000
stack
page read and write
248BCA21000
trusted library allocation
page read and write
7FFAAC830000
trusted library allocation
page read and write
7FFAAC930000
trusted library allocation
page read and write
187AB222000
heap
page read and write
246174F8000
heap
page read and write
7A70000
remote allocation
page read and write
7540000
trusted library allocation
page read and write
D5B3FF000
stack
page read and write
CE4D13E000
stack
page read and write
CE4D17E000
stack
page read and write
248C540E000
heap
page read and write
2A3424F8000
heap
page read and write
1EE8524A000
heap
page read and write
6D24000
trusted library allocation
page read and write
7FFAAC860000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
2FE1000
heap
page read and write
282C4DD1000
trusted library allocation
page read and write
28ED000
trusted library allocation
page execute and read and write
7FFAAC890000
trusted library allocation
page execute and read and write
6D20000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
27D5000
heap
page read and write
A72A13F000
stack
page read and write
1851EE10000
heap
page read and write
7580000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
1ACC0444000
heap
page read and write
7FFB23B1D000
unkown
page readonly
7580000
trusted library allocation
page read and write
DD35AFE000
stack
page read and write
6D20000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
7FFAAC730000
trusted library allocation
page execute and read and write
72C6000
heap
page read and write
29515E00000
heap
page read and write
248C529D000
heap
page read and write
24616B79000
heap
page read and write
2F6E000
heap
page read and write
7FFAAC680000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
2069BEA0000
heap
page read and write
28E3000
trusted library allocation
page execute and read and write
2056CA91000
heap
page read and write
73D1F000
unkown
page readonly
7580000
trusted library allocation
page read and write
7F350000
trusted library allocation
page execute and read and write
2056C06E000
heap
page read and write
A87EB7E000
unkown
page readonly
5BFF68D000
stack
page read and write
2C99000
heap
page read and write
7FFAAC7E0000
trusted library allocation
page read and write
248C523E000
heap
page read and write
27D8069B000
trusted library allocation
page read and write
364B0FE000
stack
page read and write
6D50000
trusted library allocation
page execute and read and write
D4AFCFE000
stack
page read and write
2A329C63000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
7FFAAC8A0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
2056CBC1000
heap
page read and write
7580000
trusted library allocation
page read and write
18792030000
heap
page read and write
6D20000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
2F4F000
heap
page read and write
131AC6E5000
heap
page read and write
27DEB1A5000
heap
page read and write
29025B10000
heap
page read and write
2C92000
heap
page read and write
6D20000
trusted library allocation
page read and write
27DEC220000
heap
page execute and read and write
7C0667E000
unkown
page readonly
7FFAAC890000
trusted library allocation
page execute and read and write
7580000
trusted library allocation
page read and write
4AC0000
trusted library allocation
page read and write
27DEB17D000
heap
page read and write
131AC520000
heap
page read and write
131AC510000
heap
page read and write
6CD0000
trusted library allocation
page read and write
7FFAAC8C0000
trusted library allocation
page execute and read and write
6FC8EFE000
stack
page read and write
282CD7F8000
heap
page read and write
437E000
stack
page read and write
2C7C000
stack
page read and write
7580000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
2069BDC5000
heap
page read and write
6D40000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
758E000
trusted library allocation
page read and write
7FFAAC920000
trusted library allocation
page read and write
187AB312000
heap
page read and write
7590000
trusted library allocation
page read and write
4FF0000
heap
page readonly
79AE000
stack
page read and write
7590000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
7FFAAC8A0000
trusted library allocation
page read and write
2056CBB2000
heap
page read and write
7FFAAC67B000
trusted library allocation
page execute and read and write
20AD4200000
heap
page read and write
6CD0000
trusted library allocation
page read and write
7FFAAC900000
trusted library allocation
page execute and read and write
246175C9000
heap
page read and write
6D60000
trusted library allocation
page read and write
248C528C000
heap
page read and write
7560000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
257E000
stack
page read and write
6D20000
trusted library allocation
page read and write
2C13000
heap
page read and write
6D30000
trusted library allocation
page read and write
7FFAAC716000
trusted library allocation
page read and write
7FFB23B16000
unkown
page readonly
7540000
trusted library allocation
page read and write
7FFAAC8AA000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
7FFB23B22000
unkown
page readonly
248C5352000
heap
page read and write
6CD0000
trusted library allocation
page read and write
246174A1000
heap
page read and write
6CF0000
trusted library allocation
page read and write
7FFAAC905000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7FFAAC8B0000
trusted library allocation
page execute and read and write
2A32A136000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
BE3B23E000
stack
page read and write
7560000
trusted library allocation
page read and write
2461748D000
heap
page read and write
248ACC61000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
6DC0000
remote allocation
page read and write
6CF0000
trusted library allocation
page read and write
248C5441000
heap
page read and write
7560000
trusted library allocation
page read and write
27DEB310000
heap
page read and write
7FFAAC806000
trusted library allocation
page read and write
2A329141000
heap
page read and write
2E80000
heap
page read and write
248AC8C0000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
BE3AA3E000
stack
page read and write
7FFAACC93000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
2DD0000
heap
page read and write
7590000
trusted library allocation
page read and write
7FFAAC710000
trusted library allocation
page read and write
24617534000
heap
page read and write
131BCD0D000
trusted library allocation
page read and write
18792DEA000
trusted library allocation
page read and write
1EE85EE3000
trusted library allocation
page read and write
7FFAACA40000
trusted library allocation
page execute and read and write
6D20000
trusted library allocation
page read and write
7FFB036AA000
unkown
page readonly
51E0000
trusted library allocation
page read and write
1C53EC02000
heap
page read and write
7580000
trusted library allocation
page read and write
206B4E80000
heap
page read and write
75C0000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
248C5209000
heap
page read and write
2056C028000
heap
page read and write
1851F060000
heap
page read and write
282B3310000
heap
page read and write
DD35DFE000
stack
page read and write
7620000
heap
page execute and read and write
6CD0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
2A3422C0000
unkown
page readonly
73D1D000
unkown
page read and write
3660000
heap
page read and write
7FFAAC69B000
trusted library allocation
page execute and read and write
6D20000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
7FFAAC710000
trusted library allocation
page execute and read and write
6D30000
trusted library allocation
page read and write
5BFF70E000
stack
page read and write
2498000
stack
page read and write
7FFAAC81A000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7FFAAC800000
trusted library allocation
page read and write
2056CA21000
heap
page read and write
1EE85980000
heap
page read and write
248C5203000
heap
page read and write
DD361FE000
stack
page read and write
7FFAAC940000
trusted library allocation
page read and write
75B0000
trusted library allocation
page execute and read and write
24616AA0000
heap
page read and write
7FFAAC64D000
trusted library allocation
page execute and read and write
1ACC0320000
heap
page read and write
7560000
trusted library allocation
page read and write
131AC42D000
heap
page read and write
7560000
trusted library allocation
page read and write
2A329B19000
trusted library allocation
page read and write
7FFB23B01000
unkown
page execute read
364AAF1000
stack
page read and write
6CF0000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
18A91144000
heap
page read and write
3000000
heap
page read and write
2461749D000
heap
page read and write
1DD601CC000
heap
page read and write
7580000
trusted library allocation
page read and write
1D422CC6000
unkown
page readonly
47EF000
trusted library allocation
page read and write
7FFAAC650000
trusted library allocation
page read and write
1D423290000
heap
page execute and read and write
1EE9E170000
unkown
page readonly
248C524A000
heap
page read and write
1D422D82000
unkown
page readonly
4560000
heap
page read and write
2A329B25000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
DD360FE000
stack
page read and write
5143000
trusted library allocation
page read and write
7FFAAC716000
trusted library allocation
page read and write
DD358FF000
stack
page read and write
7580000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
248C5292000
heap
page read and write
2720000
heap
page read and write
7FFAAC68D000
trusted library allocation
page execute and read and write
1B35AD80000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
27D806A3000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
2D0E000
stack
page read and write
6D40000
trusted library allocation
page read and write
2056CA59000
heap
page read and write
7FFAAC700000
trusted library allocation
page execute and read and write
1D423275000
heap
page read and write
248C5454000
heap
page read and write
6CD0000
trusted library allocation
page read and write
7FFAAC829000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7FFB0BB32000
unkown
page readonly
7560000
trusted library allocation
page read and write
7581000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
7FFAAC72C000
trusted library allocation
page execute and read and write
187AB477000
heap
page read and write
6CB0000
trusted library allocation
page read and write
2580000
heap
page read and write
6D20000
trusted library allocation
page read and write
7FFAACA90000
trusted library allocation
page read and write
7FFAAC690000
trusted library allocation
page read and write
187AB267000
heap
page read and write
7FFAAC840000
trusted library allocation
page execute and read and write
246175C8000
heap
page read and write
6CF0000
trusted library allocation
page read and write
7AF0000
heap
page read and write
6D20000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
1EE9E2B8000
heap
page read and write
6DC0000
remote allocation
page read and write
DFD000
stack
page read and write
7FFAAC810000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
248ACA91000
trusted library allocation
page read and write
1DD601D2000
heap
page read and write
BE3B639000
stack
page read and write
79EE000
stack
page read and write
2F38000
heap
page read and write
187AB2AE000
heap
page read and write
7FFAAC726000
trusted library allocation
page execute and read and write
A72A53B000
stack
page read and write
7540000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
1DD472E5000
heap
page read and write
6D20000
trusted library allocation
page read and write
1851EEE4000
heap
page read and write
7FFAACB4D000
trusted library allocation
page read and write
2056CAE4000
heap
page read and write
7FFAAC663000
trusted library allocation
page read and write
2056CBAE000
heap
page read and write
27DEC630000
heap
page read and write
7560000
trusted library allocation
page read and write
18A90E13000
unkown
page read and write
27D800D5000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
2F7C000
heap
page read and write
AC474FE000
stack
page read and write
2A3421EC000
heap
page read and write
7FFAACA10000
trusted library allocation
page read and write
2461748E000
heap
page read and write
6CF0000
trusted library allocation
page read and write
6F8E000
stack
page read and write
7540000
trusted library allocation
page read and write
4A8E000
stack
page read and write
7FFAAC64D000
trusted library allocation
page execute and read and write
7FFAAC870000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
364B1FE000
stack
page read and write
7590000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
2056CB44000
heap
page read and write
7580000
trusted library allocation
page read and write
2056C02E000
heap
page read and write
1851EEE6000
heap
page read and write
131AC515000
heap
page read and write
30AE000
stack
page read and write
C8A2B7E000
stack
page read and write
24616A88000
heap
page read and write
3550000
heap
page read and write
4B30000
heap
page execute and read and write
1DD47AA3000
trusted library allocation
page read and write
697E000
stack
page read and write
1B35AA10000
heap
page read and write
4FDE000
stack
page read and write
47FD000
trusted library allocation
page read and write
A7297E9000
stack
page read and write
6D20000
trusted library allocation
page read and write
248AC640000
heap
page read and write
6D20000
trusted library allocation
page read and write
18792A0E000
trusted library allocation
page read and write
20AD4980000
remote allocation
page read and write
7560000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
2F30000
heap
page read and write
7FFAAC8E0000
trusted library allocation
page read and write
6D24000
trusted library allocation
page read and write
1D42383F000
trusted library allocation
page read and write
7FFAAC820000
trusted library allocation
page read and write
24617432000
heap
page read and write
6CF0000
trusted library allocation
page read and write
1C53EC8C000
heap
page read and write
1EE95991000
trusted library allocation
page read and write
51D8000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
1EE9E16A000
unkown
page readonly
7580000
trusted library allocation
page read and write
7FFAAC860000
trusted library allocation
page execute and read and write
43FC000
trusted library allocation
page execute and read and write
7FFAAC7E0000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
1DD47390000
heap
page read and write
7B00000
heap
page read and write
7560000
trusted library allocation
page read and write
C8A2C7E000
unkown
page readonly
1D43BCB2000
unkown
page readonly
7580000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7FFAAC66D000
trusted library allocation
page execute and read and write
6D40000
trusted library allocation
page read and write
7FFAAC720000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
3DB15D000
stack
page read and write
7FFAAC880000
trusted library allocation
page read and write
1B35AB10000
heap
page read and write
327E000
stack
page read and write
6D20000
trusted library allocation
page read and write
2069C8CC000
trusted library allocation
page read and write
7FFAAC750000
trusted library allocation
page execute and read and write
AC477FF000
stack
page read and write
7580000
trusted library allocation
page read and write
1D422770000
unkown
page readonly
7FFAAC683000
trusted library allocation
page read and write
27DEB146000
heap
page read and write
1FCAC0E0000
heap
page read and write
7580000
trusted library allocation
page read and write
131ACE51000
trusted library allocation
page read and write
1DD60223000
heap
page read and write
7590000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
282CD7FC000
heap
page read and write
7FFAAC800000
trusted library allocation
page read and write
A72A67E000
stack
page read and write
7FFAACA60000
trusted library allocation
page read and write
6D20000
trusted library allocation
page execute and read and write
6CF0000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
32D0000
heap
page read and write
BE3B13E000
stack
page read and write
187AB365000
heap
page read and write
1C53EC8F000
heap
page read and write
7FFAACC88000
trusted library allocation
page read and write
2A3292F0000
heap
page read and write
6CD0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
7FFB23B00000
unkown
page readonly
246174F4000
heap
page read and write
2069C73C000
unkown
page readonly
7560000
trusted library allocation
page read and write
6C49000
trusted library allocation
page execute and read and write
6D30000
trusted library allocation
page read and write
6C23000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
47E8000
trusted library allocation
page read and write
A87ED7E000
unkown
page readonly
2056BFF5000
heap
page read and write
24616B36000
heap
page read and write
282B4F42000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
27D80677000
trusted library allocation
page read and write
1851F030000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
2069C7DF000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
2056C027000
heap
page read and write
339C000
heap
page read and write
187AB330000
heap
page read and write
75A0000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
7FFAAC730000
trusted library allocation
page execute and read and write
79542FE000
stack
page read and write
2056CA91000
heap
page read and write
74F0000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
248AC8A0000
heap
page execute and read and write
248AC160000
trusted library allocation
page read and write
7FFAAC880000
trusted library allocation
page execute and read and write
A7298FF000
stack
page read and write
73D00000
unkown
page readonly
1FCAC233000
heap
page read and write
1DD47A8C000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
2056C06E000
heap
page read and write
7FFAAC643000
trusted library allocation
page execute and read and write
3308000
heap
page read and write
6C43000
trusted library allocation
page read and write
9441AFE000
stack
page read and write
24616AA5000
heap
page read and write
7FFAAC840000
trusted library allocation
page read and write
18792080000
heap
page read and write
282CD7E9000
heap
page read and write
6D20000
trusted library allocation
page read and write
2BEE000
heap
page read and write
3160000
heap
page read and write
AC475FE000
stack
page read and write
33A0000
heap
page read and write
1EE85030000
unkown
page readonly
6D40000
trusted library allocation
page read and write
D1D40FF000
stack
page read and write
6DC0000
heap
page read and write
7580000
trusted library allocation
page read and write
2CE08FE000
stack
page read and write
6CF0000
trusted library allocation
page read and write
24617455000
heap
page read and write
7580000
trusted library allocation
page read and write
7FFAAC756000
trusted library allocation
page execute and read and write
4EF0000
trusted library allocation
page read and write
7FFAAC670000
trusted library allocation
page read and write
3270000
heap
page read and write
2056CA2D000
heap
page read and write
6D20000
trusted library allocation
page read and write
7FFAAC816000
trusted library allocation
page read and write
1D43BAB0000
unkown
page readonly
282B3040000
unkown
page readonly
1C53EC42000
heap
page read and write
24617432000
heap
page read and write
282B32F0000
heap
page read and write
1B35B3BD000
trusted library allocation
page read and write
7FFAAC6FC000
trusted library allocation
page execute and read and write
2069BE80000
heap
page read and write
DC3F7FB000
stack
page read and write
7580000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
7FFAAC826000
trusted library allocation
page read and write
24616ABA000
heap
page read and write
7560000
trusted library allocation
page read and write
18A90EDB000
heap
page read and write
6D20000
trusted library allocation
page read and write
CE4D47D000
stack
page read and write
7580000
trusted library allocation
page read and write
2F75000
heap
page read and write
24617493000
heap
page read and write
6D20000
trusted library allocation
page read and write
187AB37B000
heap
page read and write
282B4BC0000
heap
page read and write
7560000
trusted library allocation
page read and write
2A329A00000
trusted library allocation
page read and write
187AB22C000
heap
page read and write
24617498000
heap
page read and write
7FFAAC820000
trusted library allocation
page read and write
7FFAAC720000
trusted library allocation
page execute and read and write
2EE0000
trusted library allocation
page read and write
2056CA5D000
heap
page read and write
18792840000
heap
page execute and read and write
7953DFD000
stack
page read and write
1DD47210000
heap
page read and write
29515E16000
heap
page read and write
7540000
trusted library allocation
page read and write
1D4229D3000
trusted library allocation
page read and write
2056CAE1000
heap
page read and write
7FFAAC8F0000
trusted library allocation
page execute and read and write
7FFAAC710000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
D1D3DFF000
stack
page read and write
7FFAAC68C000
trusted library allocation
page execute and read and write
6D20000
trusted library allocation
page read and write
25A1BC13000
heap
page read and write
2A339A4E000
trusted library allocation
page read and write
1D422D30000
unkown
page readonly
D4AFAFE000
stack
page read and write
6D60000
trusted library allocation
page read and write
1ACC0380000
trusted library allocation
page read and write
1C53F370000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
7FFAAC9B0000
trusted library allocation
page execute and read and write
7580000
trusted library allocation
page read and write
18A90E2B000
heap
page read and write
7580000
trusted library allocation
page read and write
7545000
trusted library allocation
page read and write
24BAEE00000
heap
page read and write
2A329B1D000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
1DD46FE0000
heap
page read and write
7FFAACA80000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
7FFAAC825000
trusted library allocation
page read and write
7FFAAC960000
trusted library allocation
page read and write
7FFAAC7FD000
trusted library allocation
page read and write
282B33B0000
heap
page read and write
D7D000
stack
page read and write
77EE000
stack
page read and write
7580000
trusted library allocation
page read and write
248ACC74000
trusted library allocation
page read and write
7FFAACC40000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
187920F6000
heap
page read and write
7FFAAC822000
trusted library allocation
page read and write
1DD601ED000
heap
page read and write
7FFAAC720000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
776E000
stack
page read and write
7540000
trusted library allocation
page read and write
248C5334000
heap
page read and write
20AD4960000
trusted library allocation
page read and write
7C0627E000
unkown
page readonly
7FFAAC6BC000
trusted library allocation
page execute and read and write
7560000
trusted library allocation
page read and write
1D423821000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
248C5255000
heap
page read and write
D1D41FE000
stack
page read and write
1B35AD60000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
29025AF0000
heap
page read and write
73D01000
unkown
page execute read
7FFAAC825000
trusted library allocation
page read and write
187A2851000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
4460000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
7FFAAC6EC000
trusted library allocation
page execute and read and write
7560000
trusted library allocation
page read and write
27DEB940000
heap
page read and write
6D00000
heap
page execute and read and write
2A32A184000
trusted library allocation
page read and write
C8A23DB000
stack
page read and write
A729CFC000
stack
page read and write
187AB1ED000
heap
page read and write
1D43CB6B000
heap
page read and write
2FC0000
heap
page read and write
7FFAAC890000
trusted library allocation
page read and write
2056CAE4000
heap
page read and write
9C8CEFE000
stack
page read and write
2A329283000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
492F000
stack
page read and write
4780000
heap
page readonly
7FFAAC880000
trusted library allocation
page read and write
7C062FE000
stack
page read and write
7FFAAC802000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
4AD0000
trusted library allocation
page execute and read and write
187AB2C0000
heap
page read and write
18A90EC9000
heap
page read and write
7580000
trusted library allocation
page read and write
6C70000
trusted library allocation
page read and write
7FFAAC632000
trusted library allocation
page read and write
7AAE000
stack
page read and write
75C0000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
A728FFE000
stack
page read and write
2A3290B0000
heap
page read and write
1DD5796D000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
1851EE86000
heap
page read and write
7580000
trusted library allocation
page read and write
18A90EB2000
heap
page read and write
7FFB23B01000
unkown
page execute read
7FFAAC650000
trusted library allocation
page read and write
2CFE000
unkown
page read and write
DD3623E000
stack
page read and write
2A3299F0000
heap
page execute and read and write
24616AAE000
heap
page read and write
2F59000
heap
page read and write
6D20000
trusted library allocation
page read and write
7FFAACB74000
trusted library allocation
page read and write
7FFAAC80E000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
29515E60000
heap
page read and write
24617536000
heap
page read and write
187AB352000
heap
page read and write
7FFAAC680000
trusted library allocation
page read and write
7FFAACBD0000
trusted library allocation
page read and write
A7291FC000
stack
page read and write
75A0000
trusted library allocation
page read and write
2056CBC9000
heap
page read and write
7FF4058B0000
trusted library allocation
page execute and read and write
B8112FF000
stack
page read and write
6DC0000
remote allocation
page read and write
7560000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
1D422C82000
unkown
page readonly
7560000
trusted library allocation
page read and write
20AD4249000
heap
page read and write
282CD602000
unkown
page readonly
7FFAAC69C000
trusted library allocation
page execute and read and write
248ACFD8000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page read and write
7FFAAC780000
trusted library allocation
page execute and read and write
248BCA1E000
trusted library allocation
page read and write
7FFAAC83B000
trusted library allocation
page read and write
7FFAAC81A000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
7FFAACC10000
trusted library allocation
page read and write
A7292FE000
stack
page read and write
248AC1EC000
heap
page read and write
7FFAAC670000
trusted library allocation
page read and write
6C4C000
trusted library allocation
page execute and read and write
24BAED13000
heap
page read and write
1D422C28000
unkown
page readonly
1C53EBE0000
heap
page read and write
131ACC51000
heap
page read and write
7FFB036F3000
unkown
page read and write
6D20000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
6FCE000
stack
page read and write
7590000
trusted library allocation
page read and write
1F111DD0000
heap
page read and write
246175C0000
heap
page read and write
9C8D1FE000
unkown
page readonly
7FFAAC830000
trusted library allocation
page read and write
7C0677E000
stack
page read and write
7560000
trusted library allocation
page read and write
7FFAAC850000
trusted library allocation
page read and write
1B35ABB5000
heap
page read and write
7EFF8000
trusted library allocation
page execute and read and write
27D800F3000
trusted library allocation
page read and write
274B000
stack
page read and write
7FFAAC780000
trusted library allocation
page execute and read and write
3370000
heap
page read and write
6D30000
trusted library allocation
page read and write
2C1C000
heap
page read and write
6D20000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7FFAAC67D000
trusted library allocation
page execute and read and write
2A32911D000
heap
page read and write
6D20000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
33A3000
heap
page read and write
7FFAAC67D000
trusted library allocation
page execute and read and write
2BF4000
heap
page read and write
7540000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
27D8067F000
trusted library allocation
page read and write
7C06A7E000
unkown
page readonly
6CF0000
trusted library allocation
page read and write
3DB47E000
stack
page read and write
2BDA000
heap
page read and write
2E70000
heap
page read and write
7540000
trusted library allocation
page read and write
7FFAAC827000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
2BFA000
heap
page read and write
7EF40000
trusted library allocation
page execute and read and write
7560000
trusted library allocation
page read and write
7FFAAC6CC000
trusted library allocation
page execute and read and write
6CD0000
trusted library allocation
page read and write
2A329BF4000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
2056C0FC000
heap
page read and write
BE3B829000
stack
page read and write
D4AFDFE000
stack
page read and write
1D43CBE7000
heap
page read and write
187AB481000
heap
page read and write
1ACC0453000
heap
page read and write
7580000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
24616B73000
heap
page read and write
CE4CF3A000
stack
page read and write
27D80645000
trusted library allocation
page read and write
7FFAAC807000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
246174A1000
heap
page read and write
7FFAAC85E000
trusted library allocation
page read and write
7FFAAC980000
trusted library allocation
page read and write
7FFAAC644000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
1FCACA02000
heap
page read and write
27D0000
heap
page read and write
18A90F15000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7FFAAC760000
trusted library allocation
page execute and read and write
AC47EFE000
stack
page read and write
D5B0FE000
stack
page read and write
6CF0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
18A91123000
heap
page read and write
7560000
trusted library allocation
page read and write
94428FC000
stack
page read and write
7540000
trusted library allocation
page read and write
7FFAACB50000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
2A339A61000
trusted library allocation
page read and write
248ACA87000
trusted library allocation
page read and write
7FFAAC65D000
trusted library allocation
page execute and read and write
2F99000
heap
page read and write
AC476FC000
stack
page read and write
2056CB52000
heap
page read and write
27DEC6B9000
heap
page read and write
5A570FF000
stack
page read and write
7560000
trusted library allocation
page read and write
27DEB3F0000
heap
page read and write
4410000
trusted library allocation
page execute and read and write
683E000
stack
page read and write
7590000
trusted library allocation
page read and write
2F6A000
heap
page read and write
25A1BC00000
heap
page read and write
7FFAAC65D000
trusted library allocation
page execute and read and write
7FFAAC860000
trusted library allocation
page read and write
24617431000
heap
page read and write
B8119FF000
stack
page read and write
1851EF45000
heap
page read and write
6CD0000
trusted library allocation
page read and write
7FFB23B25000
unkown
page readonly
2CE0CFE000
stack
page read and write
2FA5000
heap
page read and write
6D20000
trusted library allocation
page read and write
1ACC0458000
heap
page read and write
AC47AFE000
stack
page read and write
131ACE43000
trusted library allocation
page read and write
18791F50000
heap
page read and write
7540000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
7FFAAC950000
trusted library allocation
page read and write
94429FE000
stack
page read and write
1FCACB02000
heap
page read and write
245B000
stack
page read and write
6CD0000
trusted library allocation
page read and write
7FFB23B00000
unkown
page readonly
7FFAAC8B0000
trusted library allocation
page execute and read and write
187AB1DE000
heap
page read and write
7FFAAC663000
trusted library allocation
page execute and read and write
6CF0000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
187AB3A3000
heap
page read and write
782E000
stack
page read and write
50A0000
trusted library allocation
page execute and read and write
7FFAAC830000
trusted library allocation
page read and write
2766000
heap
page read and write
6D30000
trusted library allocation
page read and write
29515C20000
heap
page read and write
18792A11000
trusted library allocation
page read and write
754C000
trusted library allocation
page read and write
DD3633E000
stack
page read and write
2056CA91000
heap
page read and write
7580000
trusted library allocation
page read and write
50EA000
heap
page read and write
248AC1C9000
heap
page read and write
6CF0000
trusted library allocation
page read and write
20AD4259000
heap
page read and write
1D43BE20000
heap
page read and write
7FFAAC805000
trusted library allocation
page read and write
2A342710000
heap
page read and write
2A329B7E000
trusted library allocation
page read and write
27DEC860000
heap
page read and write
7580000
trusted library allocation
page read and write
7FFAAC68B000
trusted library allocation
page execute and read and write
2FA0000
heap
page read and write
7540000
trusted library allocation
page read and write
2056CB5D000
heap
page read and write
7FFAAC660000
trusted library allocation
page read and write
A87E97E000
unkown
page readonly
282B33B5000
heap
page read and write
2C1B000
heap
page read and write
2A32A027000
trusted library allocation
page read and write
7FFAACB7F000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
693E000
stack
page read and write
7FFAACA30000
trusted library allocation
page read and write
2A342594000
heap
page read and write
2C90000
heap
page read and write
7FFAAC8C0000
trusted library allocation
page execute and read and write
6D20000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
2056C0FB000
heap
page read and write
7FFB03550000
unkown
page readonly
2056CA7D000
heap
page read and write
7580000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
2A339A41000
trusted library allocation
page read and write
7FFAAC71C000
trusted library allocation
page execute and read and write
7560000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
D5B4FE000
stack
page read and write
7FFAAC830000
trusted library allocation
page read and write
D6A87FF000
unkown
page read and write
41D0000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
2A342560000
heap
page read and write
24BAEB00000
heap
page read and write
D5AEFE000
stack
page read and write
6CD0000
trusted library allocation
page read and write
282CD5F3000
heap
page read and write
1EE852A9000
heap
page read and write
7FFB0BB35000
unkown
page readonly
24616AAE000
heap
page read and write
6D20000
trusted library allocation
page read and write
271E000
stack
page read and write
4836000
trusted library allocation
page read and write
6CD4000
trusted library allocation
page read and write
7FFAAC960000
trusted library allocation
page read and write
1F111BE6000
heap
page read and write
131ACC4E000
heap
page read and write
7FFAAC720000
trusted library allocation
page execute and read and write
246174F4000
heap
page read and write
6CD0000
trusted library allocation
page read and write
1851EEA7000
heap
page read and write
7FFAAC8A0000
trusted library allocation
page read and write
7EF58000
trusted library allocation
page execute and read and write
7580000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7FFAAC63D000
trusted library allocation
page execute and read and write
D4B07FE000
stack
page read and write
20AD41D0000
heap
page read and write
18A9101B000
heap
page read and write
7560000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
CE4C7FF000
stack
page read and write
6CF0000
trusted library allocation
page read and write
7FFAAC81C000
trusted library allocation
page read and write
7FFAAC810000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
7FFAACA20000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
7FFAAC7F0000
trusted library allocation
page read and write
1D43BCB0000
unkown
page readonly
6D30000
trusted library allocation
page read and write
32B0000
heap
page read and write
BE3A2FF000
stack
page read and write
6CD0000
trusted library allocation
page read and write
7FFAAC890000
trusted library allocation
page read and write
2A329AA6000
trusted library allocation
page read and write
44EE000
stack
page read and write
7FFAAC930000
trusted library allocation
page read and write
27DEC210000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7FFAAC81A000
trusted library allocation
page read and write
7FFAAC664000
trusted library allocation
page read and write
2A329FF9000
trusted library allocation
page read and write
7FFAAC672000
trusted library allocation
page read and write
DD356FE000
stack
page read and write
187AB4A0000
heap
page read and write
1B36B261000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7953FFE000
stack
page read and write
7FFB0BB11000
unkown
page execute read
3DB57E000
stack
page read and write
274D000
heap
page read and write
2056CA21000
heap
page read and write
5A56EFE000
stack
page read and write
24BAEC5A000
heap
page read and write
2056CA91000
heap
page read and write
2EC0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
246175A7000
heap
page read and write
7590000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
7FFAAC970000
trusted library allocation
page read and write
A87E67E000
stack
page read and write
6D20000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
187AB2B8000
heap
page read and write
7590000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
27DEC62B000
heap
page read and write
6D20000
trusted library allocation
page read and write
1EE85042000
unkown
page readonly
7FFAAC750000
trusted library allocation
page execute and read and write
1C53F402000
heap
page read and write
1B35AB9E000
heap
page read and write
7FFAAC850000
trusted library allocation
page execute and read and write
422E000
stack
page read and write
7580000
trusted library allocation
page read and write
505C000
stack
page read and write
22115400000
heap
page read and write
2056CB4B000
heap
page read and write
282B3168000
heap
page read and write
47F1000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
27D8068A000
trusted library allocation
page read and write
7FFAAC890000
trusted library allocation
page read and write
2FB0000
heap
page read and write
7540000
trusted library allocation
page read and write
24617482000
heap
page read and write
7FFAACA30000
trusted library allocation
page read and write
248AC495000
heap
page read and write
2CB0000
heap
page read and write
2A32A156000
trusted library allocation
page read and write
248C520F000
heap
page read and write
2D80000
heap
page read and write
1FCAF140000
heap
page read and write
6CF0000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
4F3B000
trusted library allocation
page execute and read and write
29515E32000
heap
page read and write
7FFAAC67D000
trusted library allocation
page execute and read and write
7FFAAC66D000
trusted library allocation
page execute and read and write
6D30000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
24617434000
heap
page read and write
7FFAAC856000
trusted library allocation
page read and write
2A329DFC000
trusted library allocation
page read and write
1D43C91E000
heap
page read and write
187AB264000
heap
page read and write
6CF0000
trusted library allocation
page read and write
1D43CB40000
heap
page read and write
7FFAAC980000
trusted library allocation
page read and write
2A329AC8000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
7FFAAC820000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7FFAAC800000
trusted library allocation
page read and write
2A329188000
heap
page read and write
A7295FE000
stack
page read and write
24617449000
heap
page read and write
2C15000
heap
page read and write
7FFAAC970000
trusted library allocation
page read and write
7FFAAC825000
trusted library allocation
page read and write
7FFAAC840000
trusted library allocation
page read and write
29515E13000
heap
page read and write
24617430000
heap
page read and write
7FFAAC68C000
trusted library allocation
page execute and read and write
6C60000
trusted library allocation
page execute and read and write
6CF0000
trusted library allocation
page read and write
187AB21C000
heap
page read and write
4A94000
trusted library allocation
page read and write
6D2C000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
1C53F415000
heap
page read and write
24616B72000
heap
page read and write
7FFAAC82A000
trusted library allocation
page read and write
25A1BC28000
heap
page read and write
6D20000
trusted library allocation
page read and write
7FFAACB40000
trusted library allocation
page read and write
7FFAAC816000
trusted library allocation
page read and write
7FFAAC830000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
282B4DC0000
heap
page execute and read and write
6CD0000
trusted library allocation
page read and write
20AD424A000
heap
page read and write
6D30000
trusted library allocation
page read and write
BE3BD3A000
stack
page read and write
42DC000
stack
page read and write
2A34261C000
heap
page read and write
A72A23A000
stack
page read and write
7FFAAC940000
trusted library allocation
page read and write
7FFAAC664000
trusted library allocation
page read and write
7FFAAC884000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
4DD0000
heap
page read and write
18A90EAE000
heap
page read and write
75C0000
trusted library allocation
page read and write
2461748D000
heap
page read and write
49CE000
stack
page read and write
7560000
trusted library allocation
page read and write
D4AF8FF000
stack
page read and write
24616AAE000
heap
page read and write
2056C0BA000
heap
page read and write
7590000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
7FFAACC30000
trusted library allocation
page read and write
28E0000
trusted library allocation
page read and write
6CD5000
trusted library allocation
page read and write
2EB4000
trusted library allocation
page read and write
1B35ABF8000
heap
page read and write
6CD0000
trusted library allocation
page read and write
1EE959A1000
trusted library allocation
page read and write
1C53EC4D000
heap
page read and write
7FFAAC662000
trusted library allocation
page read and write
50FE000
stack
page read and write
7FFAACA40000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
1851EE90000
heap
page read and write
18792A15000
trusted library allocation
page read and write
6D31000
trusted library allocation
page read and write
7FFAAC810000
trusted library allocation
page execute and read and write
24BAEC02000
heap
page read and write
27D80679000
trusted library allocation
page read and write
7FFAAC803000
trusted library allocation
page read and write
7FFAAC7FE000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
25A1C350000
trusted library allocation
page read and write
20AD4202000
heap
page read and write
7560000
trusted library allocation
page read and write
27DEC6AA000
heap
page read and write
248C53E4000
heap
page read and write
6D20000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
2A342900000
heap
page read and write
248C5416000
heap
page read and write
7590000
trusted library allocation
page read and write
7FFAAC840000
trusted library allocation
page read and write
7FFAAC7F6000
trusted library allocation
page read and write
7FFAAC65D000
trusted library allocation
page execute and read and write
1EE85030000
unkown
page readonly
6CD0000
trusted library allocation
page read and write
2056CA8D000
heap
page read and write
24BB05F0000
trusted library allocation
page read and write
18792050000
heap
page read and write
6D40000
trusted library allocation
page read and write
246175A2000
heap
page read and write
6D20000
trusted library allocation
page read and write
1EE85280000
heap
page read and write
27D8063D000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7FFAAC8A0000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
7FFAAC910000
trusted library allocation
page read and write
18A90EE9000
heap
page read and write
18792A22000
trusted library allocation
page read and write
1851EDE0000
heap
page read and write
1ACC0470000
heap
page read and write
221154B8000
heap
page read and write
282B3140000
heap
page read and write
6CD0000
trusted library allocation
page read and write
18A91013000
heap
page read and write
7FFAAC890000
trusted library allocation
page execute and read and write
7540000
trusted library allocation
page read and write
7FFAAC8F5000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
7FFAAC664000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7FFAAC6E6000
trusted library allocation
page read and write
94426FC000
stack
page read and write
1EE85B29000
trusted library allocation
page read and write
7FFAAC8C0000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
2880000
heap
page read and write
131C55B0000
heap
page execute and read and write
1EE9E160000
unkown
page readonly
7580000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
2069BDAC000
heap
page read and write
2069C7DD000
trusted library allocation
page read and write
513E000
stack
page read and write
6D20000
trusted library allocation
page read and write
BE3B435000
stack
page read and write
1D423369000
trusted library allocation
page read and write
6C2D000
trusted library allocation
page execute and read and write
27D8063F000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
187AB2C2000
heap
page read and write
2056CA45000
heap
page read and write
7FFAAC880000
trusted library allocation
page read and write
1DD472C0000
unkown
page readonly
6C46000
trusted library allocation
page execute and read and write
7580000
trusted library allocation
page read and write
246175B5000
heap
page read and write
282CD694000
unkown
page readonly
A87E47D000
stack
page read and write
7545000
trusted library allocation
page read and write
4330000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
4225000
heap
page read and write
7FFAAC879000
trusted library allocation
page read and write
2A329275000
heap
page read and write
7580000
trusted library allocation
page read and write
221154B0000
heap
page read and write
EEDDCFF000
stack
page read and write
248C51FD000
heap
page read and write
1DD471F0000
heap
page read and write
7FFAAC68B000
trusted library allocation
page execute and read and write
7FFB036F4000
unkown
page readonly
7560000
trusted library allocation
page read and write
AC473FE000
stack
page read and write
27D8065B000
trusted library allocation
page read and write
2056CA22000
heap
page read and write
2A342524000
heap
page read and write
282CD7D0000
heap
page execute and read and write
7FFAAC6F0000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
18A90EE9000
heap
page read and write
27D800D1000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
246174EA000
heap
page read and write
7590000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
131AC540000
heap
page read and write
2069BC80000
heap
page read and write
6D20000
trusted library allocation
page read and write
7FFAAC8D0000
trusted library allocation
page read and write
1EE852A7000
heap
page read and write
6D30000
trusted library allocation
page read and write
7FFAAC900000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
2056CA7D000
heap
page read and write
2056C0F5000
heap
page read and write
7580000
trusted library allocation
page read and write
7FFAAC810000
trusted library allocation
page read and write
27D80296000
trusted library allocation
page read and write
7FFAAC662000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
24617469000
heap
page read and write
6D20000
trusted library allocation
page read and write
18A9101B000
heap
page read and write
246175A5000
heap
page read and write
6CF0000
trusted library allocation
page read and write
7FFAAC806000
trusted library allocation
page read and write
7FFAAC6BC000
trusted library allocation
page execute and read and write
1D43BBD2000
unkown
page readonly
7580000
trusted library allocation
page read and write
282CD58C000
heap
page read and write
2A32A04D000
trusted library allocation
page read and write
7FFAAC880000
trusted library allocation
page read and write
2A342598000
heap
page read and write
1EE85AE2000
trusted library allocation
page read and write
27DEB3D3000
trusted library allocation
page read and write
514D000
trusted library allocation
page execute and read and write
7560000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
2585000
heap
page read and write
6CF0000
trusted library allocation
page read and write
7FFAAC850000
trusted library allocation
page read and write
2A329260000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
1EE85AFA000
trusted library allocation
page read and write
1D422A6A000
heap
page read and write
7FFAAC674000
trusted library allocation
page read and write
BE3AEBE000
stack
page read and write
7FFAAC874000
trusted library allocation
page read and write
7FFAAC66D000
trusted library allocation
page execute and read and write
4A90000
trusted library allocation
page read and write
20AD4228000
heap
page read and write
7580000
trusted library allocation
page read and write
24BAEB20000
heap
page read and write
D1D3EFD000
stack
page read and write
1852F603000
trusted library allocation
page read and write
1EE853C5000
heap
page read and write
1DD47AB1000
trusted library allocation
page read and write
2E8E000
stack
page read and write
A87EA7E000
stack
page read and write
2056CA21000
heap
page read and write
7FFAAC830000
trusted library allocation
page read and write
4F04000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
2A342620000
heap
page read and write
24616B78000
heap
page read and write
6D30000
trusted library allocation
page read and write
282CD588000
heap
page read and write
484A000
heap
page read and write
2F58000
heap
page read and write
246175B4000
heap
page read and write
4F1B000
heap
page read and write
7570000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
7FFAAC850000
trusted library allocation
page read and write
187AB1E9000
heap
page read and write
34DD000
stack
page read and write
7FFAAC670000
trusted library allocation
page read and write
A7293FF000
stack
page read and write
2056CA8D000
heap
page read and write
6D40000
trusted library allocation
page read and write
7FFB23B22000
unkown
page readonly
187AB2D1000
heap
page read and write
3316000
heap
page read and write
22115430000
heap
page read and write
6D20000
trusted library allocation
page read and write
43CD000
stack
page read and write
4AE0000
trusted library allocation
page read and write
94427FC000
stack
page read and write
1EE85EE6000
trusted library allocation
page read and write
282CD7ED000
heap
page read and write
1EE850D0000
heap
page read and write
6CF0000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7FFAAC830000
trusted library allocation
page read and write
9442AFB000
stack
page read and write
2461754F000
heap
page read and write
24BAED02000
heap
page read and write
6CDC000
trusted library allocation
page read and write
7FFAAC67D000
trusted library allocation
page execute and read and write
187AB363000
heap
page read and write
7580000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
72A0000
heap
page read and write
1FCACB2A000
heap
page read and write
282CD56E000
heap
page read and write
2056C096000
heap
page read and write
6CF0000
trusted library allocation
page read and write
22115410000
heap
page read and write
46E0000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
7A70000
remote allocation
page read and write
18792075000
heap
page read and write
7540000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
282B4F4A000
trusted library allocation
page read and write
1B35AAF0000
heap
page read and write
2D8E000
stack
page read and write
7FFAAC870000
trusted library allocation
page execute and read and write
6D20000
trusted library allocation
page read and write
1ACC043F000
heap
page read and write
6D20000
trusted library allocation
page read and write
7FFAAC823000
trusted library allocation
page read and write
7FFAAC880000
trusted library allocation
page execute and read and write
A728EFE000
stack
page read and write
A7290FE000
stack
page read and write
7F0B8000
trusted library allocation
page execute and read and write
248C5356000
heap
page read and write
2A329200000
heap
page read and write
2056CAE4000
heap
page read and write
7FFAAC930000
trusted library allocation
page read and write
246175C5000
heap
page read and write
7FFAAC890000
trusted library allocation
page read and write
1D423810000
trusted library allocation
page read and write
4640000
heap
page read and write
6D30000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
1D43CB68000
heap
page read and write
24616B6E000
heap
page read and write
2056C0F4000
heap
page read and write
7580000
trusted library allocation
page read and write
24617431000
heap
page read and write
2056C07D000
heap
page read and write
7560000
trusted library allocation
page read and write
2CE06F9000
stack
page read and write
248C53E6000
heap
page read and write
2F00000
trusted library allocation
page read and write
1ACC0461000
heap
page read and write
6CD0000
trusted library allocation
page read and write
131ACBB0000
heap
page read and write
1D422D32000
unkown
page readonly
7FFAAC660000
trusted library allocation
page read and write
187AB26F000
heap
page read and write
1C53EE00000
heap
page read and write
1D423363000
trusted library allocation
page read and write
75C0000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
2F66000
heap
page read and write
6CF0000
trusted library allocation
page read and write
4320000
trusted library allocation
page execute and read and write
6D20000
trusted library allocation
page read and write
D4AF5AE000
stack
page read and write
6ECE000
stack
page read and write
364B2FA000
stack
page read and write
7FFAAC706000
trusted library allocation
page read and write
20AD4260000
heap
page read and write
4460000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
248AC213000
heap
page read and write
98803FE000
stack
page read and write
7590000
trusted library allocation
page read and write
248C5241000
heap
page read and write
AC47DFE000
stack
page read and write
27D8050C000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
2056C0EE000
heap
page read and write
25A1BC02000
heap
page read and write
7FFAAC66D000
trusted library allocation
page execute and read and write
7FFAAC81F000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7FFAACB80000
trusted library allocation
page execute and read and write
18792A24000
trusted library allocation
page read and write
7FFAAC910000
trusted library allocation
page read and write
7FFAAC820000
trusted library allocation
page read and write
7FFAAC870000
trusted library allocation
page read and write
187AB343000
heap
page read and write
7FFAAC654000
trusted library allocation
page read and write
248ACBB3000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
DD35BFE000
stack
page read and write
24616D50000
heap
page read and write
2056CA27000
heap
page read and write
7590000
trusted library allocation
page read and write
A87EE7E000
unkown
page readonly
7FFAAC660000
trusted library allocation
page read and write
27DEB405000
heap
page read and write
7FFAACDB0000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
248C5246000
heap
page read and write
6D20000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
7FFB23B20000
unkown
page read and write
7580000
trusted library allocation
page read and write
98FFDFD000
stack
page read and write
28E4000
trusted library allocation
page read and write
7FFAAC8A0000
trusted library allocation
page execute and read and write
2056CBBC000
heap
page read and write
1D4229F0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
7FFAAC8E0000
trusted library allocation
page read and write
79540FE000
stack
page read and write
4874000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
2C13000
heap
page read and write
18A91123000
heap
page read and write
2948000
stack
page read and write
1B35A97E000
unkown
page readonly
5264000
trusted library allocation
page read and write
7FFAAC9C0000
trusted library allocation
page read and write
2069C692000
unkown
page readonly
131ACE2F000
trusted library allocation
page read and write
D4B06FD000
stack
page read and write
1D4332B1000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
1ACC0495000
heap
page read and write
18A90E00000
unkown
page read and write
6CD0000
trusted library allocation
page read and write
9441CFE000
stack
page read and write
7590000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
1FCAC2AD000
heap
page read and write
7FFAAC67D000
trusted library allocation
page execute and read and write
5B75000
trusted library allocation
page read and write
1D42382C000
trusted library allocation
page read and write
246175AC000
heap
page read and write
28A0000
heap
page read and write
6CF0000
trusted library allocation
page read and write
2C15000
heap
page read and write
75A0000
trusted library allocation
page read and write
43F9000
trusted library allocation
page execute and read and write
73D00000
unkown
page readonly
27DEC6B4000
heap
page read and write
7FFAAC810000
trusted library allocation
page read and write
18A90EBA000
heap
page read and write
7FFAAC780000
trusted library allocation
page execute and read and write
6D20000
trusted library allocation
page read and write
24617530000
heap
page read and write
1B35B3AC000
trusted library allocation
page read and write
1F111DD5000
heap
page read and write
1EE85890000
heap
page execute and read and write
1B373A42000
unkown
page readonly
7540000
trusted library allocation
page read and write
2D00000
heap
page read and write
1FCAC302000
heap
page read and write
AC47CFE000
stack
page read and write
2461759F000
heap
page read and write
7FFAAC803000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
27DEB3A0000
trusted library allocation
page read and write
2E4F000
unkown
page read and write
7FFAAC663000
trusted library allocation
page execute and read and write
248ACA9F000
trusted library allocation
page read and write
248ACC82000
trusted library allocation
page read and write
4630000
heap
page read and write
7FFAAC68B000
trusted library allocation
page execute and read and write
7FFAAC872000
trusted library allocation
page read and write
1EE85B09000
trusted library allocation
page read and write
94425FC000
stack
page read and write
2B30000
heap
page read and write
7580000
trusted library allocation
page read and write
246174F4000
heap
page read and write
24617431000
heap
page read and write
1D43BA80000
heap
page read and write
7FFAAC910000
trusted library allocation
page read and write
7FFAAC822000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
CE4D97E000
stack
page read and write
7C06C7E000
unkown
page readonly
7FFAAC6E0000
trusted library allocation
page read and write
18537FD0000
heap
page execute and read and write
2B7E000
stack
page read and write
6D20000
trusted library allocation
page read and write
2A329C04000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
7B2F000
heap
page read and write
2056CAE4000
heap
page read and write
6C50000
trusted library allocation
page read and write
7FFAAC800000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
7FFAAC8C0000
trusted library allocation
page execute and read and write
6D20000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
2056CAE4000
heap
page read and write
7580000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
246174F4000
heap
page read and write
1DD47140000
heap
page read and write
7FFAAC710000
trusted library allocation
page read and write
27DEC250000
heap
page read and write
27D903A9000
trusted library allocation
page read and write
2F4C000
heap
page read and write
27D800B7000
trusted library allocation
page read and write
7FFAAC684000
trusted library allocation
page read and write
7FFAAC8C0000
trusted library allocation
page read and write
27DEBCD9000
heap
page read and write
D5B7FE000
stack
page read and write
A87E27E000
stack
page readonly
6CD0000
trusted library allocation
page read and write
25A1BBE0000
heap
page read and write
187AB1D9000
heap
page read and write
2787000
stack
page read and write
2461749D000
heap
page read and write
7FFAAC634000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
2056CBAF000
heap
page read and write
2056C008000
heap
page read and write
67FC000
stack
page read and write
6CB0000
trusted library allocation
page read and write
9441DFE000
stack
page read and write
7FFAAC930000
trusted library allocation
page read and write
24617431000
heap
page read and write
7540000
trusted library allocation
page read and write
246174EF000
heap
page read and write
7FFAAC654000
trusted library allocation
page read and write
187AB23B000
heap
page read and write
477E000
stack
page read and write
9441EFE000
stack
page read and write
1FCACB32000
heap
page read and write
6D40000
trusted library allocation
page read and write
7FFAAC660000
trusted library allocation
page read and write
1ACC042B000
heap
page read and write
7FFAAC633000
trusted library allocation
page execute and read and write
2A329AE0000
trusted library allocation
page read and write
25A1BBC0000
heap
page read and write
6D20000
trusted library allocation
page read and write
7FFAAC664000
trusted library allocation
page read and write
4DA0000
heap
page read and write
DD35CFD000
stack
page read and write
312E000
stack
page read and write
248C5414000
heap
page read and write
1EE9E20E000
unkown
page readonly
18A90F00000
trusted library allocation
page read and write
7C0687E000
unkown
page readonly
24616B0E000
heap
page read and write
7FFAAC653000
trusted library allocation
page execute and read and write
79544FD000
stack
page read and write
7FFAAC7D0000
trusted library allocation
page read and write
7FFAAC69C000
trusted library allocation
page execute and read and write
7590000
trusted library allocation
page read and write
7FFAAC634000
trusted library allocation
page read and write
2056CBAE000
heap
page read and write
7FFB23B00000
unkown
page readonly
131AC439000
heap
page read and write
1D43BAF2000
unkown
page readonly
6D20000
trusted library allocation
page read and write
7FFAAC81C000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
2F50000
heap
page readonly
B8115FE000
stack
page read and write
7C0637E000
unkown
page readonly
6CD0000
trusted library allocation
page read and write
7FFAAC770000
trusted library allocation
page execute and read and write
2F4B000
heap
page read and write
6CF0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
24617433000
heap
page read and write
246174A1000
heap
page read and write
4F0D000
trusted library allocation
page execute and read and write
1EE8526C000
heap
page read and write
2461749D000
heap
page read and write
5BFFCFA000
stack
page read and write
7560000
trusted library allocation
page read and write
2753000
heap
page read and write
7FFAAC850000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
2056C0B0000
heap
page read and write
7FFAAC645000
trusted library allocation
page read and write
7FFAAC800000
trusted library allocation
page read and write
2056C020000
heap
page read and write
18792260000
heap
page read and write
7590000
trusted library allocation
page read and write
248AC0F0000
heap
page read and write
44AE000
stack
page read and write
24617465000
heap
page read and write
7FFAAC900000
trusted library allocation
page read and write
30EF000
stack
page read and write
1B35ABD1000
heap
page read and write
248ACBB7000
trusted library allocation
page read and write
7FFAACC70000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7FFAAC8A0000
trusted library allocation
page read and write
B8113FF000
stack
page read and write
1B35B54F000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
1C53EC25000
heap
page read and write
7FFAAC8F3000
trusted library allocation
page read and write
18A91100000
heap
page read and write
7FFAAC820000
trusted library allocation
page read and write
4FE0000
heap
page read and write
46C2000
trusted library allocation
page read and write
94422FC000
stack
page read and write
7580000
trusted library allocation
page read and write
269E000
stack
page read and write
1ACC046E000
heap
page read and write
7FFAAC7E0000
trusted library allocation
page read and write
7FFAAC653000
trusted library allocation
page read and write
248C521D000
heap
page read and write
6D40000
trusted library allocation
page read and write
2A329B29000
trusted library allocation
page read and write
9C8D0FE000
stack
page read and write
1ACC0340000
heap
page read and write
6D30000
trusted library allocation
page read and write
7FFB0BB26000
unkown
page readonly
46CB000
trusted library allocation
page execute and read and write
18A91002000
heap
page read and write
18A9101B000
heap
page read and write
333F000
stack
page read and write
73D16000
unkown
page readonly
6D20000
trusted library allocation
page read and write
7FFAAC6F0000
trusted library allocation
page execute and read and write
7FFAAC80D000
trusted library allocation
page read and write
187AB24B000
heap
page read and write
5226000
trusted library allocation
page read and write
2A329760000
heap
page read and write
27BF000
heap
page read and write
2056CB30000
heap
page read and write
7560000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
468D000
trusted library allocation
page execute and read and write
6191000
trusted library allocation
page read and write
7FFAAC849000
trusted library allocation
page read and write
7FFAAC860000
trusted library allocation
page execute and read and write
6D40000
trusted library allocation
page read and write
1EE85B85000
trusted library allocation
page read and write
74D0000
trusted library allocation
page execute and read and write
7FFAAC7EA000
trusted library allocation
page read and write
187AB1F3000
heap
page read and write
73D1D000
unkown
page read and write
187AB218000
heap
page read and write
94421FA000
stack
page read and write
6D20000
trusted library allocation
page read and write
EEDDAFB000
stack
page read and write
6D20000
trusted library allocation
page read and write
24BB0B70000
remote allocation
page read and write
24BAED17000
heap
page read and write
2056C0B6000
heap
page read and write
1ACC04A8000
heap
page read and write
2056CBC2000
heap
page read and write
32FC000
heap
page read and write
1D422980000
heap
page read and write
2EB3000
trusted library allocation
page execute and read and write
7FFAAC7F0000
trusted library allocation
page read and write
20AD4980000
remote allocation
page read and write
2C9B000
heap
page read and write
75A0000
trusted library allocation
page read and write
7FFAAC726000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7C05FAE000
stack
page read and write
4B71000
trusted library allocation
page read and write
D4AFFFA000
stack
page read and write
2A329E95000
trusted library allocation
page read and write
B8116FE000
stack
page read and write
41E0000
heap
page read and write
24616B7D000
heap
page read and write
1DD47A8F000
trusted library allocation
page read and write
1FCAF1D0000
heap
page read and write
6D40000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7FFAAC8A0000
trusted library allocation
page execute and read and write
98804FE000
unkown
page readonly
6D30000
trusted library allocation
page read and write
304E000
stack
page read and write
2C90000
heap
page read and write
2069BFB5000
heap
page read and write
49F0000
trusted library allocation
page read and write
3665000
heap
page read and write
24F0000
heap
page read and write
4670000
trusted library allocation
page read and write
2056C0B1000
heap
page read and write
7580000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
A7294FE000
stack
page read and write
1C53ED00000
heap
page read and write
7580000
trusted library allocation
page read and write
BE3B03D000
stack
page read and write
6D20000
trusted library allocation
page read and write
2EBD000
trusted library allocation
page execute and read and write
248C533C000
heap
page read and write
2069BD60000
heap
page read and write
9C8CCFE000
stack
page read and write
2D85000
heap
page read and write
7FFB23B25000
unkown
page readonly
9C8CAFB000
stack
page read and write
2A329B82000
trusted library allocation
page read and write
27D807CB000
trusted library allocation
page read and write
27D804F7000
trusted library allocation
page read and write
7FFAAC643000
trusted library allocation
page execute and read and write
7FFAAC870000
trusted library allocation
page read and write
6F0D000
stack
page read and write
131BCD11000
trusted library allocation
page read and write
248C5274000
heap
page read and write
7580000
trusted library allocation
page read and write
A87E77E000
unkown
page readonly
7580000
trusted library allocation
page read and write
7FFAACDE0000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
248C526F000
heap
page read and write
46B0000
heap
page read and write
7580000
trusted library allocation
page read and write
CE4D67B000
stack
page read and write
7FFAAC870000
trusted library allocation
page read and write
1D43CB45000
heap
page read and write
187AB307000
heap
page read and write
7580000
trusted library allocation
page read and write
1879210E000
heap
page read and write
6CF0000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
20AD424F000
heap
page read and write
7540000
trusted library allocation
page read and write
1DD57971000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7FFAAC670000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7FFAACAB0000
trusted library allocation
page execute and read and write
24617531000
heap
page read and write
7FFAAC826000
trusted library allocation
page read and write
7FFAAC8A0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
248ACC5E000
trusted library allocation
page read and write
7FFAAC880000
trusted library allocation
page read and write
1EE85320000
heap
page read and write
2056CA91000
heap
page read and write
7FFAAC64D000
trusted library allocation
page execute and read and write
4A00000
heap
page execute and read and write
57A1000
trusted library allocation
page read and write
1ACC04A3000
heap
page read and write
20AD4A02000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
364B6FE000
stack
page read and write
1D422DF0000
heap
page read and write
1ACC0481000
heap
page read and write
7FFAAC67D000
trusted library allocation
page execute and read and write
7560000
trusted library allocation
page read and write
2A339A53000
trusted library allocation
page read and write
772E000
stack
page read and write
131BCD01000
trusted library allocation
page read and write
2FBB000
stack
page read and write
7FFAAC8F0000
trusted library allocation
page read and write
1FCAC216000
heap
page read and write
A72AD7D000
stack
page read and write
7580000
trusted library allocation
page read and write
2A329280000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7C06B7E000
stack
page read and write
206B4ECB000
heap
page read and write
6CF0000
trusted library allocation
page read and write
20AD4240000
heap
page read and write
6CF0000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
CE4C6FF000
stack
page read and write
7FFAAC8C0000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
7FFAACB30000
trusted library allocation
page read and write
1B373CE0000
heap
page execute and read and write
1D422940000
heap
page read and write
6CF0000
trusted library allocation
page read and write
2F2E000
stack
page read and write
7540000
trusted library allocation
page read and write
1879288F000
trusted library allocation
page read and write
7FFAAC642000
trusted library allocation
page read and write
5581000
trusted library allocation
page read and write
246175C0000
heap
page read and write
6CD0000
trusted library allocation
page read and write
1D422B23000
heap
page read and write
1ACC0400000
heap
page read and write
7F0A0000
trusted library allocation
page execute and read and write
7FFAAC780000
trusted library allocation
page execute and read and write
187AB600000
heap
page read and write
2056CA8D000
heap
page read and write
2069BEE0000
heap
page read and write
7590000
trusted library allocation
page read and write
2A341A40000
trusted library allocation
page read and write
6D2E000
trusted library allocation
page read and write
20AD422B000
heap
page read and write
7FFAAC940000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
187AB466000
heap
page read and write
29515E52000
heap
page read and write
6D20000
trusted library allocation
page read and write
D4B02FE000
stack
page read and write
246169D0000
heap
page read and write
6CD0000
trusted library allocation
page read and write
25A1BC25000
heap
page read and write
7540000
trusted library allocation
page read and write
7FFAACA10000
trusted library allocation
page read and write
1DD47173000
heap
page read and write
D1D43FE000
stack
page read and write
1DD57961000
trusted library allocation
page read and write
2A32A13E000
trusted library allocation
page read and write
509D000
stack
page read and write
1FCAF170000
heap
page read and write
2910000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
24616AA4000
heap
page read and write
187921F0000
trusted library allocation
page read and write
D1D3CFF000
stack
page read and write
246174F4000
heap
page read and write
7540000
trusted library allocation
page read and write
7FFAAC859000
trusted library allocation
page read and write
2C3C000
stack
page read and write
7580000
trusted library allocation
page execute and read and write
7FFAAC840000
trusted library allocation
page read and write
7FFAAC850000
trusted library allocation
page read and write
2A32A194000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
A87E1FC000
stack
page read and write
187AB20A000
heap
page read and write
2F66000
heap
page read and write
431E000
stack
page read and write
7560000
trusted library allocation
page read and write
7F368000
trusted library allocation
page execute and read and write
2A3428C0000
unkown
page readonly
7540000
trusted library allocation
page read and write
2056CB31000
heap
page read and write
1DD473A5000
heap
page read and write
7540000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
20AD4231000
heap
page read and write
7FFAAC664000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
187AB421000
heap
page read and write
7FFAAC838000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
7FFAAC840000
trusted library allocation
page read and write
2C08000
heap
page read and write
18A90E99000
heap
page read and write
6D20000
trusted library allocation
page read and write
7FFAACB90000
trusted library allocation
page execute and read and write
248ACA9B000
trusted library allocation
page read and write
5190FFC000
stack
page read and write
6CF0000
trusted library allocation
page read and write
1ACC0350000
heap
page read and write
24616AAD000
heap
page read and write
2A34292C000
heap
page read and write
2A3421CA000
heap
page read and write
724E000
stack
page read and write
7FFAAC980000
trusted library allocation
page read and write
4460000
trusted library allocation
page read and write
1C53EC66000
heap
page read and write
24BB0B70000
remote allocation
page read and write
7FFAACC00000
trusted library allocation
page read and write
A87DC9B000
stack
page read and write
7540000
trusted library allocation
page read and write
7FFB23B16000
unkown
page readonly
1ACC0433000
heap
page read and write
7FFAACD00000
trusted library allocation
page read and write
246175B4000
heap
page read and write
24616B79000
heap
page read and write
1ACC049C000
heap
page read and write
1B35B3B9000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
29C0000
heap
page read and write
7560000
trusted library allocation
page read and write
246174A1000
heap
page read and write
24616AEE000
heap
page read and write
7FFAAC65D000
trusted library allocation
page execute and read and write
7560000
trusted library allocation
page read and write
2056CA55000
heap
page read and write
7590000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
6CE0000
trusted library allocation
page read and write
20AD4302000
heap
page read and write
2056CA7E000
heap
page read and write
6D20000
trusted library allocation
page read and write
7FFAAC81A000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7FFAAC710000
trusted library allocation
page read and write
2A32A186000
trusted library allocation
page read and write
1D422AC9000
heap
page read and write
32BE000
stack
page read and write
7FFAAC830000
trusted library allocation
page read and write
290B000
stack
page read and write
7560000
trusted library allocation
page read and write
248C522A000
heap
page read and write
7540000
trusted library allocation
page read and write
276B000
heap
page read and write
6D20000
trusted library allocation
page read and write
248C51E0000
heap
page read and write
7560000
trusted library allocation
page read and write
7FFAAC8A3000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
44BE000
stack
page read and write
D4B03FE000
stack
page read and write
2CE07FF000
stack
page read and write
1ACC0457000
heap
page read and write
18A90E73000
heap
page read and write
6CD0000
trusted library allocation
page read and write
27DEB980000
trusted library allocation
page read and write
5180000
heap
page execute and read and write
248C5446000
heap
page read and write
7FFAAC84D000
trusted library allocation
page read and write
1B35AE30000
heap
page read and write
7FFAAC820000
trusted library allocation
page read and write
7FFAAC710000
trusted library allocation
page read and write
2BEF000
heap
page read and write
1DD47116000
heap
page read and write
5190C7F000
stack
page read and write
2A329AAA000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
7FFAAC684000
trusted library allocation
page read and write
22115865000
heap
page read and write
6CD0000
trusted library allocation
page read and write
24616B31000
heap
page read and write
6CD0000
trusted library allocation
page read and write
AC478FE000
stack
page read and write
7580000
trusted library allocation
page read and write
D5B6FE000
stack
page read and write
5BFFBFD000
stack
page read and write
7FFAAC670000
trusted library allocation
page read and write
248AC110000
heap
page read and write
2C13000
heap
page read and write
248C4D96000
heap
page read and write
6CF0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
1FCAC237000
heap
page read and write
25A1BC40000
heap
page read and write
7FFAAC840000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7FFAAC684000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7FFB03551000
unkown
page execute read
1D422960000
heap
page read and write
7FFAAC870000
trusted library allocation
page read and write
7FFAAC6CC000
trusted library allocation
page execute and read and write
7580000
trusted library allocation
page read and write
7FFAAC870000
trusted library allocation
page read and write
D5B1FD000
stack
page read and write
20AD4260000
heap
page read and write
6D20000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
2917000
trusted library allocation
page execute and read and write
BE3A6FE000
stack
page read and write
2A329DE5000
trusted library allocation
page read and write
9C8C47B000
stack
page read and write
4DCF000
stack
page read and write
2056CBCC000
heap
page read and write
282CD5F0000
heap
page read and write
4F9E000
stack
page read and write
7590000
trusted library allocation
page read and write
7FFAAC810000
trusted library allocation
page read and write
1879288B000
trusted library allocation
page read and write
29515E6F000
heap
page read and write
2A3290D0000
heap
page read and write
7FFAACA20000
trusted library allocation
page read and write
7FFAAC85A000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7FFAAC9D0000
trusted library allocation
page read and write
246169F0000
heap
page read and write
6D20000
trusted library allocation
page read and write
2A329121000
heap
page read and write
7FFAAC66D000
trusted library allocation
page execute and read and write
2A329AE3000
trusted library allocation
page read and write
1EE9E249000
heap
page read and write
1B35A970000
unkown
page readonly
7FFAAC8E0000
trusted library allocation
page read and write
24616AEE000
heap
page read and write
2056CBC9000
heap
page read and write
6CD0000
trusted library allocation
page read and write
187AB234000
heap
page read and write
187AB1B0000
heap
page execute and read and write
6D40000
trusted library allocation
page read and write
B810FD9000
stack
page read and write
27DEB330000
heap
page read and write
7580000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
2F4E000
stack
page read and write
7FFAAC648000
trusted library allocation
page read and write
6FC8FFE000
stack
page read and write
4680000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7FFAAC672000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7FFAAC663000
trusted library allocation
page execute and read and write
6D30000
trusted library allocation
page read and write
187921D0000
trusted library allocation
page read and write
7FFAAC790000
trusted library allocation
page execute and read and write
6D20000
trusted library allocation
page read and write
1B35B392000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
714D000
stack
page read and write
7560000
trusted library allocation
page read and write
2A329128000
heap
page read and write
7540000
trusted library allocation
page read and write
131ACD3B000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
27D80657000
trusted library allocation
page read and write
4A4E000
stack
page read and write
7FFAAC6EC000
trusted library allocation
page execute and read and write
1FCAC213000
heap
page read and write
18792A1E000
trusted library allocation
page read and write
7FFAAC654000
trusted library allocation
page read and write
24BAEC3D000
heap
page read and write
6D20000
trusted library allocation
page read and write
7FFAAC8E6000
trusted library allocation
page read and write
2BFB000
heap
page read and write
6CD0000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7FFAAC72C000
trusted library allocation
page execute and read and write
2A329240000
trusted library allocation
page read and write
2EEB000
trusted library allocation
page execute and read and write
27DEB167000
heap
page read and write
2461743A000
heap
page read and write
5223000
trusted library allocation
page read and write
1C53EC74000
heap
page read and write
7FFAAC630000
trusted library allocation
page read and write
7FFAAC690000
trusted library allocation
page read and write
DC3F6FF000
stack
page read and write
272A000
heap
page read and write
6CF0000
trusted library allocation
page read and write
1EE85350000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7FFAAC7ED000
trusted library allocation
page read and write
18A90E7A000
heap
page read and write
1D43B2D0000
trusted library allocation
page read and write
7953AFE000
stack
page read and write
131AC42F000
heap
page read and write
7FFAAC673000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
A87E57E000
unkown
page readonly
6D20000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
D4AF561000
stack
page read and write
7580000
trusted library allocation
page read and write
1B373A40000
unkown
page readonly
6D20000
trusted library allocation
page read and write
7953EFF000
stack
page read and write
2056CADA000
heap
page read and write
246174A1000
heap
page read and write
7FFAAC680000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
2069C7DB000
trusted library allocation
page read and write
BE3A7FE000
stack
page read and write
6D20000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
2F6A000
heap
page read and write
A72AA7E000
stack
page read and write
7FFAACDD0000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
BE3A3FE000
stack
page read and write
7580000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
483B000
trusted library allocation
page read and write
20AD41F0000
heap
page read and write
7580000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
32DA000
heap
page read and write
1D4239B8000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7FFAACBB0000
trusted library allocation
page execute and read and write
1ACC0C02000
trusted library allocation
page read and write
7FFAAC684000
trusted library allocation
page read and write
1B36B271000
trusted library allocation
page read and write
7FFAAC716000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
1FCACB23000
heap
page read and write
355E000
stack
page read and write
7FFAACA70000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
2A329B21000
trusted library allocation
page read and write
7FFAAC6E0000
trusted library allocation
page read and write
6195000
trusted library allocation
page read and write
7FFAAC673000
trusted library allocation
page execute and read and write
CE4CDF7000
stack
page read and write
4921000
heap
page read and write
73D1F000
unkown
page readonly
7FFAAC68B000
trusted library allocation
page execute and read and write
6CD0000
trusted library allocation
page read and write
D4AF5EE000
stack
page read and write
1C53ED02000
heap
page read and write
187AB30C000
heap
page read and write
2069C690000
unkown
page readonly
7FFAAC746000
trusted library allocation
page execute and read and write
7580000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
282B3380000
trusted library allocation
page read and write
2056CBC0000
heap
page read and write
6D20000
trusted library allocation
page read and write
7FFAAC674000
trusted library allocation
page read and write
2A3421C8000
heap
page read and write
2BD0000
heap
page read and write
1DD472E0000
heap
page read and write
2461749D000
heap
page read and write
75C0000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
32B5000
heap
page read and write
6CD0000
trusted library allocation
page read and write
2D4E000
stack
page read and write
6D20000
trusted library allocation
page read and write
248C52E0000
heap
page read and write
2F83000
heap
page read and write
27D90001000
trusted library allocation
page read and write
27D90013000
trusted library allocation
page read and write
7FFAAC7E3000
trusted library allocation
page read and write
7FFAACCE0000
trusted library allocation
page read and write
79541FE000
stack
page read and write
24616A9B000
heap
page read and write
27D9000E000
trusted library allocation
page read and write
7FFAAC69B000
trusted library allocation
page execute and read and write
6D20000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
2FDE000
heap
page read and write
1D42380B000
trusted library allocation
page read and write
7FFAAC820000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7FFAAC82D000
trusted library allocation
page read and write
4683000
trusted library allocation
page execute and read and write
7FFAAC68D000
trusted library allocation
page execute and read and write
7540000
trusted library allocation
page read and write
2056CA2A000
heap
page read and write
359E000
stack
page read and write
248AC0D0000
heap
page read and write
6D30000
trusted library allocation
page read and write
282CD575000
heap
page read and write
A72A435000
stack
page read and write
488A000
trusted library allocation
page read and write
187AB38E000
heap
page read and write
7540000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
6B80000
trusted library allocation
page execute and read and write
27D800C5000
trusted library allocation
page read and write
1D43CC0C000
heap
page read and write
1D4239B6000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
4570000
heap
page execute and read and write
2056CA40000
heap
page read and write
27DEC315000
heap
page read and write
7FFAAC6BC000
trusted library allocation
page execute and read and write
2744000
heap
page read and write
2056CBCF000
heap
page read and write
364B3FA000
stack
page read and write
522B000
trusted library allocation
page read and write
7FFAAC760000
trusted library allocation
page execute and read and write
1ACC045A000
heap
page read and write
6D20000
trusted library allocation
page read and write
364ABFE000
stack
page read and write
7FFAAC935000
trusted library allocation
page read and write
1B36B2CB000
trusted library allocation
page read and write
27D80093000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7FFAAC920000
trusted library allocation
page read and write
131AC44B000
heap
page read and write
4AB0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
2A32A192000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
7FFAAC860000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
5585000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
7FFAAC800000
trusted library allocation
page read and write
7FFAAC840000
trusted library allocation
page read and write
7EFE0000
trusted library allocation
page execute and read and write
6D10000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
7FFAAC950000
trusted library allocation
page read and write
7FFAAC680000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
24BB0602000
trusted library allocation
page read and write
2056CAE8000
heap
page read and write
29515E02000
heap
page read and write
2056CB55000
heap
page read and write
2056CBCB000
heap
page read and write
248AC0C0000
heap
page read and write
246175BB000
heap
page read and write
46C0000
trusted library allocation
page read and write
6CD5000
trusted library allocation
page read and write
7FFAAC8E6000
trusted library allocation
page read and write
7FFAAC67C000
trusted library allocation
page read and write
7FFAAC8F0000
trusted library allocation
page read and write
246175C3000
heap
page read and write
246175A1000
heap
page read and write
2056CA7D000
heap
page read and write
DD35FFE000
stack
page read and write
1EE85830000
unkown
page readonly
7FFAACA30000
trusted library allocation
page read and write
364BAFF000
stack
page read and write
7540000
trusted library allocation
page read and write
4460000
trusted library allocation
page read and write
7FFAAC880000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
2461744D000
heap
page read and write
2056CBB5000
heap
page read and write
2A329B15000
trusted library allocation
page read and write
7FFAAC834000
trusted library allocation
page read and write
1D4229D0000
trusted library allocation
page read and write
CE4CE3F000
stack
page read and write
206AC7A1000
trusted library allocation
page read and write
7FFAAC756000
trusted library allocation
page execute and read and write
131ACCF0000
heap
page execute and read and write
2A329AE8000
trusted library allocation
page read and write
7FFAAC6F6000
trusted library allocation
page read and write
7FFAACCC0000
trusted library allocation
page read and write
2A3428C2000
unkown
page readonly
2069BBD0000
unkown
page readonly
1DD47118000
heap
page read and write
6D30000
trusted library allocation
page read and write
282B33D5000
heap
page read and write
98FFFFE000
stack
page read and write
7953791000
stack
page read and write
2F7C000
heap
page read and write
7540000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
7570000
trusted library allocation
page read and write
1D422AA0000
heap
page read and write
7580000
trusted library allocation
page read and write
7FFAAC810000
trusted library allocation
page read and write
7FFB23B16000
unkown
page readonly
18792135000
heap
page read and write
6CF0000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
246175B2000
heap
page read and write
131ACC69000
heap
page read and write
1B35AE00000
heap
page execute and read and write
7FFAAC820000
trusted library allocation
page read and write
27C5000
heap
page read and write
18A91000000
heap
page read and write
6D20000
trusted library allocation
page read and write
2CE0DFE000
stack
page read and write
6CD0000
trusted library allocation
page read and write
CE4D37E000
stack
page read and write
2069BEE5000
heap
page read and write
6CD0000
trusted library allocation
page read and write
1851F065000
heap
page read and write
6D30000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
7FFAAC8E0000
trusted library allocation
page read and write
7FFAAC663000
trusted library allocation
page execute and read and write
1B35B397000
trusted library allocation
page read and write
7FFB23B01000
unkown
page execute read
206AC7AD000
trusted library allocation
page read and write
94419FF000
stack
page read and write
2F60000
heap
page read and write
1D43BBD0000
unkown
page readonly
1DD470C0000
heap
page read and write
27DEC6B6000
heap
page read and write
7FFAAC71C000
trusted library allocation
page execute and read and write
1D43BCA8000
unkown
page readonly
27DEC240000
heap
page execute and read and write
DC3F5FF000
stack
page read and write
6CD0000
trusted library allocation
page read and write
24617433000
heap
page read and write
7A70000
remote allocation
page read and write
7590000
trusted library allocation
page read and write
98801FC000
stack
page read and write
D5B2FF000
stack
page read and write
6D20000
trusted library allocation
page read and write
6C1E000
stack
page read and write
2069BBD0000
unkown
page readonly
7FFAAC63D000
trusted library allocation
page execute and read and write
7FFAAC860000
trusted library allocation
page read and write
43D0000
trusted library allocation
page read and write
7FFAAC6AC000
trusted library allocation
page execute and read and write
7560000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
5170000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
246175BD000
heap
page read and write
7580000
trusted library allocation
page read and write
131AC310000
heap
page read and write
2056CBAF000
heap
page read and write
282C4DDF000
trusted library allocation
page read and write
248C5226000
heap
page read and write
1D42383B000
trusted library allocation
page read and write
18A9101B000
heap
page read and write
1ACC0462000
heap
page read and write
7FFAACCD0000
trusted library allocation
page read and write
A87E8FD000
stack
page read and write
7560000
trusted library allocation
page read and write
7FFAAC940000
trusted library allocation
page read and write
1EE85B05000
trusted library allocation
page read and write
94423FB000
stack
page read and write
7FFAAC877000
trusted library allocation
page read and write
5BFFEFF000
stack
page read and write
4882000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
20AD4225000
heap
page read and write
7FFAACBC0000
trusted library allocation
page execute and read and write
7580000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
25A1BC2B000
heap
page read and write
1DD60208000
heap
page read and write
6D20000
trusted library allocation
page read and write
7FFAACBF0000
trusted library allocation
page read and write
4DE0000
heap
page read and write
1F111A80000
heap
page read and write
248C535A000
heap
page read and write
364B4FE000
stack
page read and write
2CE0BFE000
stack
page read and write
6D20000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
1D422D80000
unkown
page readonly
7590000
trusted library allocation
page read and write
27D800AF000
trusted library allocation
page read and write
7FFAAC852000
trusted library allocation
page read and write
1851ECE0000
heap
page read and write
DC3F1AB000
stack
page read and write
24616AAE000
heap
page read and write
5276000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7FFAAC7F7000
trusted library allocation
page read and write
282CD4FA000
heap
page read and write
18A90CB0000
heap
page read and write
1C53F400000
heap
page read and write
7580000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
7FFAACD20000
trusted library allocation
page execute and read and write
A729A3E000
stack
page read and write
206B4F0D000
heap
page read and write
2F93000
heap
page read and write
27DEB890000
heap
page execute and read and write
1ACC0413000
heap
page read and write
1B35ADC0000
unkown
page readonly
6CD0000
trusted library allocation
page read and write
7FFAACAA0000
trusted library allocation
page read and write
248C5235000
heap
page read and write
1DD47250000
trusted library allocation
page read and write
187A2861000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
7953BFF000
stack
page read and write
6D20000
trusted library allocation
page read and write
472E000
stack
page read and write
7560000
trusted library allocation
page read and write
246175AA000
heap
page read and write
7FFAAC870000
trusted library allocation
page read and write
7FFB23B19000
unkown
page readonly
2056CA24000
heap
page read and write
7580000
trusted library allocation
page read and write
131AC435000
heap
page read and write
6D20000
trusted library allocation
page read and write
2056C1D0000
heap
page read and write
7FFAAC880000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7FFAAC674000
trusted library allocation
page read and write
D4AF9FE000
stack
page read and write
A72A57E000
stack
page read and write
44C0000
heap
page execute and read and write
5190A7B000
stack
page read and write
7FFAAC850000
trusted library allocation
page read and write
27DEC258000
heap
page read and write
2056CA3D000
heap
page read and write
7FFAAC720000
trusted library allocation
page execute and read and write
7FFAAC71C000
trusted library allocation
page execute and read and write
1FCAC268000
heap
page read and write
246174A1000
heap
page read and write
131ACE2C000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
1DD60238000
heap
page read and write
7FFAAC810000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
2056CBCD000
heap
page read and write
7FFAAC650000
trusted library allocation
page read and write
7584000
trusted library allocation
page read and write
5255000
trusted library allocation
page read and write
CE4D57D000
stack
page read and write
1D43B628000
heap
page read and write
2BBE000
stack
page read and write
73D01000
unkown
page execute read
248C536D000
heap
page read and write
7540000
trusted library allocation
page read and write
A728BCF000
stack
page read and write
1FCAF150000
heap
page read and write
2F73000
heap
page read and write
6D20000
trusted library allocation
page read and write
A87EF7D000
stack
page read and write
2F8C000
heap
page read and write
2056CBB1000
heap
page read and write
D4B01FC000
stack
page read and write
D4B04FD000
stack
page read and write
7540000
trusted library allocation
page read and write
1EE85AE7000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
1FCAC1F0000
trusted library allocation
page read and write
2F6B000
heap
page read and write
A7296F5000
stack
page read and write
29515E37000
heap
page read and write
7FFAAC6F6000
trusted library allocation
page read and write
2C15000
heap
page read and write
27D80643000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
2F4B000
heap
page read and write
7560000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
4270000
heap
page readonly
2A329A30000
heap
page execute and read and write
7FFAAC900000
trusted library allocation
page execute and read and write
6D30000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
46C5000
trusted library allocation
page execute and read and write
5140000
trusted library allocation
page read and write
1B373B00000
unkown
page readonly
7FFAAC68D000
trusted library allocation
page execute and read and write
761E000
stack
page read and write
2056CBB8000
heap
page read and write
29515C00000
heap
page read and write
49E0000
heap
page read and write
7FFB23B00000
unkown
page readonly
2069BDE1000
heap
page read and write
6CF0000
trusted library allocation
page read and write
7FFAAC670000
trusted library allocation
page read and write
1ACC045D000
heap
page read and write
7590000
trusted library allocation
page read and write
7FFAAC71C000
trusted library allocation
page execute and read and write
6CD0000
trusted library allocation
page read and write
2056CAE4000
heap
page read and write
A87E7FE000
stack
page read and write
4B60000
heap
page read and write
1B35A970000
unkown
page readonly
7FFAAC720000
trusted library allocation
page execute and read and write
D5B5FE000
stack
page read and write
6D30000
trusted library allocation
page read and write
2056CB36000
heap
page read and write
1D422C10000
unkown
page readonly
1EE85268000
heap
page read and write
7FFAAC736000
trusted library allocation
page execute and read and write
6CF0000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
5166000
trusted library allocation
page execute and read and write
2056BFE0000
heap
page read and write
7580000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
248C5217000
heap
page read and write
D1D45FD000
stack
page read and write
7545000
trusted library allocation
page read and write
24BAEC86000
heap
page read and write
7560000
trusted library allocation
page read and write
2D0D000
stack
page read and write
DD359FD000
stack
page read and write
7590000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
282B3360000
trusted library allocation
page read and write
4380000
heap
page read and write
CE4D77D000
stack
page read and write
6D30000
trusted library allocation
page read and write
4690000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
2069C8F5000
trusted library allocation
page read and write
248C5458000
heap
page read and write
7580000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7FFAAC94C000
trusted library allocation
page read and write
18A90EE7000
heap
page read and write
94418FF000
stack
page read and write
24616B7C000
heap
page read and write
27D80058000
trusted library allocation
page read and write
7FFAAC8F0000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
7FFAAC8B0000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
7FFAAC830000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
527A000
trusted library allocation
page read and write
1D43BAD6000
unkown
page readonly
9441595000
stack
page read and write
187AB275000
heap
page read and write
3313000
heap
page read and write
D5B9FE000
stack
page read and write
7580000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
6CD5000
trusted library allocation
page read and write
248AC180000
trusted library allocation
page read and write
7FFAAC810000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
DD357FE000
stack
page read and write
1ACC0449000
heap
page read and write
1B35ABFA000
heap
page read and write
75A0000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7FFAAC746000
trusted library allocation
page execute and read and write
18A91144000
heap
page read and write
2EA0000
trusted library allocation
page read and write
18A90EB7000
heap
page read and write
2069C5D0000
heap
page read and write
7FFAAC640000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
A72A33C000
stack
page read and write
1D43C93A000
heap
page read and write
1EE851F0000
heap
page read and write
D5B8FD000
stack
page read and write
7FFAAC910000
trusted library allocation
page read and write
1D43CB50000
heap
page read and write
7FFAAC920000
trusted library allocation
page execute and read and write
7560000
trusted library allocation
page read and write
3260000
heap
page read and write
79545FE000
stack
page read and write
7FFAAC960000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
364B7FE000
stack
page read and write
2056C02D000
heap
page read and write
1D43C91A000
heap
page read and write
728E000
stack
page read and write
248AC1DA000
heap
page read and write
6D30000
trusted library allocation
page read and write
4420000
trusted library allocation
page read and write
7549000
trusted library allocation
page read and write
79543FF000
stack
page read and write
7FFAAC8D0000
trusted library allocation
page execute and read and write
206B4F0F000
heap
page read and write
6B90000
trusted library allocation
page read and write
306F000
stack
page read and write
282B3040000
unkown
page readonly
7540000
trusted library allocation
page read and write
758C000
trusted library allocation
page read and write
1FCAC281000
heap
page read and write
248C5239000
heap
page read and write
1C53EEE0000
heap
page read and write
7560000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
2A329A10000
heap
page execute and read and write
7FFAAC8B0000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
7FFAAC840000
trusted library allocation
page execute and read and write
248ACBCA000
trusted library allocation
page read and write
2056CA91000
heap
page read and write
246175C0000
heap
page read and write
7540000
trusted library allocation
page read and write
A7299FD000
stack
page read and write
6CF0000
trusted library allocation
page read and write
7FFAAC673000
trusted library allocation
page execute and read and write
1D423190000
heap
page read and write
467B000
heap
page read and write
6CF0000
trusted library allocation
page read and write
1ACC046C000
heap
page read and write
7FFAAC8D0000
trusted library allocation
page read and write
25A1BBF0000
heap
page read and write
4581000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
1ACC0502000
heap
page read and write
24BAEC80000
heap
page read and write
9C8CDFE000
unkown
page readonly
6D40000
trusted library allocation
page read and write
6F4E000
stack
page read and write
CE4C3D0000
stack
page read and write
7560000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
27D80537000
trusted library allocation
page read and write
2E50000
heap
page read and write
51F1000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
27D800BB000
trusted library allocation
page read and write
1ACC0468000
heap
page read and write
1D422A8C000
heap
page read and write
27D806AE000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
7FFAAC970000
trusted library allocation
page read and write
1D4239B2000
trusted library allocation
page read and write
7FFAAC8F0000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
248AC645000
heap
page read and write
7590000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7FFAAC802000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
29025DD5000
heap
page read and write
D6A88FF000
stack
page read and write
1FCAC1C0000
heap
page read and write
7590000
trusted library allocation
page read and write
D4B00FA000
stack
page read and write
2F9E000
stack
page read and write
68FE000
stack
page read and write
6FC8BAD000
stack
page read and write
D1D3AF1000
stack
page read and write
18A90ED3000
heap
page read and write
7FFAACC91000
trusted library allocation
page read and write
1DD6023A000
heap
page read and write
94420FE000
stack
page read and write
282CD4FC000
heap
page read and write
CE4CAFE000
stack
page read and write
7FFAAC653000
trusted library allocation
page read and write
248C5261000
heap
page read and write
1851EEBD000
heap
page read and write
7FFAACA50000
trusted library allocation
page read and write
6C20000
trusted library allocation
page read and write
24616A91000
heap
page read and write
7FFAACB72000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
24616AEE000
heap
page read and write
6D30000
trusted library allocation
page read and write
29516402000
trusted library allocation
page read and write
2056CA39000
heap
page read and write
6CF0000
trusted library allocation
page read and write
187AB255000
heap
page read and write
6D20000
trusted library allocation
page read and write
2ECE000
stack
page read and write
246174A1000
heap
page read and write
4801000
trusted library allocation
page read and write
2056CAD9000
heap
page read and write
6D20000
trusted library allocation
page read and write
7FFAAC890000
trusted library allocation
page execute and read and write
7560000
trusted library allocation
page read and write
7FFAAC68B000
trusted library allocation
page execute and read and write
27DEB219000
heap
page read and write
1D422AC7000
heap
page read and write
6C40000
trusted library allocation
page read and write
7FFAAC663000
trusted library allocation
page execute and read and write
4460000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7FFB23B20000
unkown
page read and write
7FFB0BB10000
unkown
page readonly
24BB05D0000
trusted library allocation
page read and write
1F111B80000
heap
page read and write
4F35000
trusted library allocation
page execute and read and write
7FFAAC850000
trusted library allocation
page read and write
248C5259000
heap
page read and write
7540000
trusted library allocation
page read and write
1EE9E162000
unkown
page readonly
187AB20E000
heap
page read and write
4730000
heap
page read and write
6D40000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
27DEB161000
heap
page read and write
20AD4213000
heap
page read and write
7580000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
1D43BAF0000
unkown
page readonly
7FFAAC816000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
1D422DC4000
unkown
page readonly
6CF0000
trusted library allocation
page read and write
7FFAAC670000
trusted library allocation
page read and write
7FFAAC990000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7FFAACBE0000
trusted library allocation
page read and write
D4AFEFE000
stack
page read and write
1ACC0467000
heap
page read and write
24617437000
heap
page read and write
6CD0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
D4B05FF000
stack
page read and write
7580000
trusted library allocation
page read and write
27DEC668000
heap
page read and write
2A329FD5000
trusted library allocation
page read and write
1DD60180000
heap
page read and write
6CF0000
trusted library allocation
page read and write
7FFAAC7D0000
trusted library allocation
page read and write
4684000
trusted library allocation
page read and write
27D8007C000
trusted library allocation
page read and write
27D90021000
trusted library allocation
page read and write
282CD81F000
heap
page read and write
7FFAAC71C000
trusted library allocation
page execute and read and write
187AB317000
heap
page read and write
6D30000
trusted library allocation
page read and write
1DD4712E000
heap
page read and write
1DD47130000
heap
page read and write
7580000
trusted library allocation
page read and write
BE3AC3E000
stack
page read and write
2500000
heap
page read and write
46C7000
trusted library allocation
page execute and read and write
2056CA66000
heap
page read and write
7FFAACC20000
trusted library allocation
page execute and read and write
7FFAAC82C000
trusted library allocation
page read and write
27DEB950000
trusted library allocation
page read and write
CE4D03E000
stack
page read and write
426E000
stack
page read and write
7540000
trusted library allocation
page read and write
27DEB3C0000
trusted library allocation
page read and write
7FFAACC80000
trusted library allocation
page read and write
2A32913D000
heap
page read and write
7FFAAC900000
trusted library allocation
page execute and read and write
454E000
stack
page read and write
24617450000
heap
page read and write
24616D55000
heap
page read and write
7FFAACB56000
trusted library allocation
page read and write
131AC416000
heap
page read and write
24616B3A000
heap
page read and write
1EE85B45000
trusted library allocation
page read and write
27D800C9000
trusted library allocation
page read and write
7591000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7FFAACA10000
trusted library allocation
page read and write
20AD44D0000
heap
page read and write
3555000
heap
page read and write
2A32915F000
heap
page read and write
7580000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
BE3A9F5000
stack
page read and write
7580000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
29025A10000
heap
page read and write
1FCACB00000
heap
page read and write
7FFAAC70C000
trusted library allocation
page execute and read and write
2461743D000
heap
page read and write
7FFAAC680000
trusted library allocation
page read and write
1D423994000
trusted library allocation
page read and write
CE4CBFE000
stack
page read and write
D1D44FE000
stack
page read and write
2056CA91000
heap
page read and write
There are 3696 hidden memdumps, click here to show them.